/
Zero Trust Segmentation

5 Zero Trust Takeaways from Higher Ed CSO George Finney

Higher education does it all — from student loan regulations and health center HIPAA compliance to credit card processing and protecting student records. Not to mention implementing effective security training and safeguards for thousands of campus employees, faculty, and students.

Because of this dynamic juncture, higher ed CSOs face several unique security challenges — and this is what keeps George Finney excited about his role as Chief Security Officer at Southern Methodist University (SMU).

George sat down with me to discuss his work in implementing and advocating for Zero Trust security at SMU in the new episode of The Segment: A Zero Trust Leadership Podcast.

Haven't heard my first episode with Zero Trust pioneer Chase Cunningham yet? Listen here.

Episode 2 of The Segment: George Finney, CSO at Southern Methodist University

At Southern Methodist, George oversees all aspects of cyber and physical security, finding creative ways to enhance new and existing protections.

He is also the bestselling author of several cybersecurity books, including most recently, Project Zero Trust: A Story about a Strategy for Aligning Security and the Business — with a foreword by former Forrester analyst and the "founder" of Zero Trust, John Kindervag. If you haven't read the book already, I highly recommend you check it out.

Get these 5 security insights from George Finney in the episode

George joins The Segment to discuss his experiences with implementing Zero Trust security initiatives in higher education.

In this episode, we unpack topics like the cultural elements of cybersecurity, what Zero Trust isn't, and why some Zero Trust projects fail.

Make sure to listen for these key takeaways from our discussion:

  • 5:40: Establishing a unified security culture
  • 11:10: What Zero Trust isn't: "Don't take the cynical approach"
  • 16:50: The secret sauce to being a CSO today is building in security from day 1
  • 24:00: Understanding your "protect surface" to maximize ROI
  • 28:30: The reason some Zero Trust projects fail isn't because of tools - it's people

Read the full transcript here.

Listen to the next episode on March 1

Be the first to listen! Subscribe to The Segment: A Zero Trust Leadership Podcast on Spotify, Apple Podcasts, or wherever you get your podcasts to be notified when new episodes are released.

Related topics

Related articles

5 Reasons Your Firewall Team Will Love Microsegmentation
Zero Trust Segmentation

5 Reasons Your Firewall Team Will Love Microsegmentation

The upgrade firewall administrators have long needed, micro segmentation moves the enforcement point to the application instance itself. Here’s how it works.

Illumio’s CTO and Co-founder Shares 5 Zero Trust Tips
Zero Trust Segmentation

Illumio’s CTO and Co-founder Shares 5 Zero Trust Tips

Learn how Illumio CTO and Co-founder PJ Kirner work to align Illumio's growth and success with Zero Trust security goals.

How Illumio Helps Protect OT Networks From Ransomware and Other Security Attacks
Zero Trust Segmentation

How Illumio Helps Protect OT Networks From Ransomware and Other Security Attacks

Illumio protects OT networks and IT devices from cyberattacks with improved visibility and a fast, easy way of micro-segmenting OT networking.

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham
Zero Trust Segmentation

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham

Chase Cunningham, also known as Dr. Zero Trust, shares his thoughts in this Zero Trust Leadership Podcast episode.

How Brooks Uses Illumio to Stop Ransomware from Running Rampant
Ransomware Containment

How Brooks Uses Illumio to Stop Ransomware from Running Rampant

See why Brooks chose Illumio Zero Trust Segmentation to ensure reliability for their retail and ecommerce businesses.

Get Reliable ROI with Illumio Zero Trust Segmentation
Zero Trust Segmentation

Get Reliable ROI with Illumio Zero Trust Segmentation

Today’s hybrid, hyper-connected networks have rendered prevention alone ineffective, Zero Trust containment delivers a better solutions call center ROI.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?