Site Search

Illumio

Illumio

Zero Trust advocate talks about cyberattack countermeasures centered on segmentation

Introduction

The importance of zero trust in security measures has been emphasized in recent years, but many companies have difficulty putting it into practice.

What do experts think about this current situation?

This time, we interviewed John Kinderberg, an advocate of the zero trust model and currently the chief evangelist at Illumio.

He will talk about his thoughts on the basics of zero trust and the latest trends in security overseas.

This was interviewed by Tsunemoto Kazuki, Chief of the 2nd Sales Department, 3rd Security Business Division, Macnica Networks Company.

table of contents

  • The basis of zero trust is to "isolate what is being protected"
  • Two incidents highlight the importance of zero trust
  • Three conditions for cyber attacks to occur
  • Missed Opportunities to Prevent Ransomware Attacks
  • A culture of care should also be applied to security
  • If the person to be protected cannot be identified, isolation and protection are not possible.
  • Irumio: Easily promote zero trust and achieve efficient operations
ジョン・キンダーバーグ 氏

Chief Evangelist, Illumio
John Kinderberg

A world-class cybersecurity expert with over 25 years of experience as an expert and industry analyst, he is known for creating an innovative "zero trust" model in cybersecurity. As the Chief Evangelist at Illumio, he is responsible for raising awareness and promoting the adoption of zero trust segmentation. Prior to joining Illumio, he was Senior Vice President at On2I T, leading the company's cybersecurity strategy. He previously served as Field CTO at Palo Alto Networks and previously served as Vice President and Principal Analyst at Forrester Research on the Security and Risk team for over eight years. In 2021, he was appointed to the Zero Trust Subcommittee of the National Security Telecommunications Advisory Committee (NSTAC) and was the lead author of NSTAC's report on zero trust to the President. In the same year, he was selected as "Cybersecurity Person of the Year" by CISO Magazine. He also serves as an advisor to several organizations, including the Cloud Security Alliance and venture capital firm NightDragon.

恒本 一樹

Macnica Networks Company
Security Division 3, Sales Department 2, Manager
Kazuki Tsunemoto

For over 10 years, he has been supporting the network transformation of Japanese companies, mainly in major manufacturing companies, with SD-WAN and other initiatives. Since 2020, he has advocated the realization of zero trust network access through a "three-point defense" that combines SASE, IDaaS, and EDR, and is an evangelist who promotes zero trust for companies.
In 2024, we will begin a new initiative to achieve zero trust for internal communications using host-based segmentation to combat new threats such as ransomware.

The basis of zero trust is to "isolate what is being protected"

Tsunemoto: Mr. Kinderberg, how did you end up working in the security field?

Kinderberg: My career began in an era when there was no modern computer, let alone the Internet. I started out as a broadcast engineer, or more precisely, a television engineer, learning to design television networks. Then broadcast technology went digital.
With the advent of IT systems, I started assembling computers and creating computer animations, which led me to start my career as a network engineer.
After that, he started to pay attention to the security of IT systems, and studied security for eight and a half years at Forrester Research, an American research institute. Through his research, he discovered that the existing model (perimeter defense model) of "trusting internal networks and not trusting external networks" had problems from a security perspective. In 2010, he advocated the zero trust model of "not trusting anything."
So far, I have proposed the zero trust model all over the world. What I have been talking about there is that the basis of the zero trust model is to "isolate important data and IT assets". It is not necessary to strictly protect all data and IT assets. For example, when trying to protect the people in this conference room, it is much easier to isolate and protect the people to be protected than to protect everyone in Tokyo.

Two incidents highlight the importance of zero trust

Tsunemoto: By reducing the scale of what is being protected, you can reliably protect data and IT assets. Is the zero trust model that Mr. Kinderberg has advocated around the world currently being applied globally?

Kinderberg: Of course. In 2021, President Biden issued an executive order ordering federal agencies to transition to zero trust, which was one of the triggers for the promotion of zero trust strategies around the world.
Although the importance of zero trust has been recognized within the US government since the 2010s, it took some time for an executive order to be issued. There were two cases of damage that triggered the momentum for a zero trust strategy to grow.
The first is the case of a large supermarket chain in 2013, where a large data breach occurred, resulting in the leaking of consumer personal information, including credit card numbers. This incident prompted the Securities and Exchange Commission to look at cyberattacks and data breaches in a different light. This incident brought the promotion of a zero trust strategy to Board Director level meetings.
The second case is the data breach that occurred in 2015 at the federal government's Office of Personnel Management. This incident, in which the personal information of nearly 22 million American citizens was stolen, was widely covered within the U.S. government. In response to this incident, the U.S. House of Representatives issued a data breach report in 2016, calling on all agencies to move to a zero trust model.

If you want to see the full article, click here

Inquiry/Document request

In charge of Macnica Illumio Co., Ltd.

Weekdays: 9:00-17:00