Noy Cio, 35x to threats AI and zero confidence in the threats


Join our daily and weekly newsletters for the latest updates and exclusive content in the industry’s leading AI coverage. Learn more


National Oilwell Varco (November) Sweeper under the Philips of Cio Alex strengthens the defense of the zero trust, covers the defense of the zero trust and leads the EI to security operations. Even if the trip is not completed, results, all accounts, dramatic – a 35 times in security measuresEliminate the PC related to the harmful program and millions of « device hell » device.

Venturebeat, when Noy Noy Nova reached these consequences, this depth interview (virtually) sat in this deep interview (virtually) ZscalerZero Power of Trustees, a generative AI « Compatriis » for aggressive personality protectors and security groups.

It also keeps the board of cyber risk between the global threat landscape of November 79% Attacks are unsuspected to get initial access and can move to get less than enemies violation 51 seconds.

The partition of expositions related to the latest interview of Philips:

Venturebeat: Alex, November, November, a few years ago « All » gone « all » – what was your constant gains?

Alex Philips: When we started, we were a traditional castle and Moat model. We did not know what zero confidence was, just the basis and condition of everything needed. Our journey changed everything by accepting an identification in Zscaler’s Zero Trust Exchange. Our appearance and protection coverage increased sharply while experiencing 35,000 decline in the number of security events. Previously, our team chased thousands of harmful events; Now is a small part of this. About 100 harmful programs of about 100 harmful programs have almost raised almost to zero. This made a lot of time and money. Since the solution is cloud-based, Hell of the device As I said, he went.

The zero trust approach, 27,500 voices and third parties, these applications provide third parties based on thousands of internal applications without exposing internet.

Then, as a temporary step and re-architect, we were able to use the Internet-based connection to our network and increased our average speed of 10-20 months, more than 4,000 deposits (network changes) have already achieved more than $ 6.5 million, « Philips said.

VB: How to put your trust in zero How did the security noise by a great factor reduced?

Philips: A great reason is that our Internet traffic is from the edge of security service (SSE) by prevention of full SSL inspection, sand boxes and information loss. Peers with Zscaler directly MicrosoftThus, the Office 365 traffic was faster and safer – users tried to pass the controls as the performance was improved. Once the SSL was rejected on the SSL on-Prem equipment, we got a legal agreement to decipher the SSL traffic because the Cloud Proxy did not provide access to the data itself. Hidden Program Hiding in encrypted streams caught previous to score to end points. In short, we reduce the attacking surface and allow good traffic. In general less threat to say less warnings.

John McLeod, the Ciso of November, complies with « Old network perimeter model does not work in the hybrid world » And a cloud of identity was needed by a security stack. Redirecting all enterprise traffic through cloud safety sheets (and even in isolate risky web sessions through zero confidence browser in zero confidence), traffic reduced the intrusional attempts. This comprehensive inspection ability is the thing that is working to spot and stop the threats that slipped in the previously sliding, 35x.

VB: Is there an unexpected benefit to accept zero confidence in which you do not expect?

Alex Philips: Yes, our users actually preferred the experience of zero-confidence in Miras VPN, so adoption was simple and has given an unprecedented agility to achieve and even call « black black blacks. » For example, when hit the COVID-19, November was already prepared! I said my leadership team that when we need to work 27,500 of our users, our dog systems can handle it. My leadership was astonished and our company continued to move forward without losing a shot.

VB: The personnel based on personality are growing – you have recorded amazing statistics on the theft of credentials. How is NOY amplifier personality and access management?

Philips: The attackers are easier to access with the stolen credentials than throwing a malicious program. In fact, 79% of the attacks in 2024, according to the latest threats, relying on stolen credentials, EU-link phaking and deep clashes, harmful program, AI-staining tasks and depefrake friends and depefigice cheats. Last year, there is a reliable credential in one of three clouds. We squeezed the personality policy to make these tactics more difficult.

For example, we combined our ZScaler platform Octa for identity and conventional access checks. We have devices to check our conditional login policy Sentinelon Antivirus agent adds an additional handling check that works before you run before entry. We also limited the password or MFA reset. No admin should be able to manage the authentication control alone. Allocation of these duties prevent our protection of an insider or concessive account.

VB: You mentioned to find a gap after turning off a user’s account. Can you explain?

Philips: If you discover a discounted user account and turn off, we have found that the signs of the attacker can still be active. Not enough to reset passwords; You really need to cancel the session verses to prevent an attacker. Token in real time for our most common sources, we partner with a start to create invalid solutions. In fact, we want to make a token stolen in a few seconds. Zero confidence architecture is re-approved via a proxy or identity provider, gives us a choking point to cancel the verses globally. In this way, if the aggressor catches a VPN cookie or cloud session, this will kill it quickly.

VB: How do you provide the identity in November?

Philips: We apply a lot of factor identification (MFA) for almost anywhere and monitor for abnormal access patterns. October, Zscaler and Sentinelone organize a security perimeter managed by an identity of each entry and the personality confirmed by the device posture. Although someone steals the user’s password, still device checks, MFA problems, conventional entry rules and something that appears to the risk of liquidation of an instant session. Reset the password is no longer enough – we must immediately cancel the Session verses to stop lateral movements. This philosophy is under the defense strategy of NOYL personality threat.

VB: You have also been an early admission of AI in Cybereturity. How do AI and generative models use NOY and generative models in COC?

Philips: We have a relatively small security group for our global tracks, so we have to work smarter. An approach brings AI to our center of security operations (SOC). Sentinelon, we were in favor and start using the AI ​​security analyst instruments, we started using an AI that could write and work in our records in our car speed. Analysts became a game change that allows them to ask questions in English and get answers per second. Instead of preparing SQL inquiries, the AI ​​offers the next request or even automatically generates it, which is less of our time to answer.

We saw the success stories of threat hunts to 80% of the AI ​​assistants. Microsoft’s own data shows that adding a generative AI can reduce the time for 30% resolution to reduce the incident. Outside of seller tools, we also practice with internal AI boots for exploitation analysts Open Quick survey of the body AI models to help non-technical staff. Of course, these AI solutions have the occupation of data protection to prevent sensitive data.

VB: CyberSecurity is no longer this problem. How do you deal with the board and executives cyber risk?

Philips: In our cyber travel, I prioritized our management staff. There is no need for deep technical minutuae, but we need to understand our risk posture. As a result, for example, I informed them about both advantages and risks. This education helps you when I offer control to prevent information leaking – it’s already alignment because it is necessary.

The Board looks at the core risk of core in CyberCTime. Each meeting is not once a year, but it is reported. We did train with them to show how an attack will play and play the scale of an attack, turning abstract threats to material decision points. This causes more powerful supports.

I am a point to constantly strengthen cyber risk reality. Even the number of millions invested in our cybersem program is never completely eliminated. If there was an incident, but when not.

VB: Any last advice based on the journey of November, there for other CIOS and CIS?

Philips: First, accept the transformation of a security transformation and digital transformation. We could not migrate in the cloud or helped to improve the safety of the savings effectively effectively and without zero confidence in remote work. It really was a « pot, pot, pot ».

Second, pay attention to the separation of tasks at identity and entrance. No human security should be unable to disrupt your control – I have myself. The small process can protect the MFA’s MFA for an Exec or high-privileged IT staff, harmful insiders, mistakes and aggressors.

Finally, a careful but actively embrace with AI. AI is already a reality on the aggressor side. A well-applied AI assistant may multiply your team, but you must manage the risk of information leaks or inaccurate models. To create a « brain » in AI, make sure you combine the AI ​​output with the team’s ability.

We know the threats are developing, but zero confidence, strong personality security and the AI ​​on the AI, now help us to give us a chance to a battle.



Source link

Leave a Reply

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *