/
Zero Trust Segmentation

The 5 Best Zero Trust Tips from Infosys CISO Vishal Salvi

Every year theres a new security strategy, but the fundamentals of good cyber hygiene remain the same. Every organization should make sure they're doing routine tasks like patching systems and backing up data.

Another one of these fundamentals is Zero Trust: making sure nothing is granted implicit access on the network.

Tactics like these are what Vishal Salvi, Chief Information Security Officer and Head of the Cybersecurity Practice at Infosys, calls "doing the boring stuff." It's often thankless, and not always the most glamorous of tasks, but doing these little things right contributes exponentially to building cyber resilience.

Vishal sat down with me to discuss his approach to getting security fundamentals like Zero Trust right in the new episode of The Segment: A Zero Trust Leadership Podcast.

Haven't heard my other episodes with Zero Trust experts? Listen here.

The Segment episode 4: Vishal Salvi on The Evolving CISO

As the Chief Information Security Officer and Head of the Cybersecurity Practice at Infosys, Vishal is responsible for overseeing the overall security strategy and its implementation across the business.

Prior to joining Infosys, Vishal held various leadership roles in cybersecurity and information technology at PWC, Standard Chartered Bank, Crompton Greaves, and many others.

In this episode, Vishal discusses the evolution of the CISO over the past 25 years, getting ROI from your security stack, and why being consistent with the boring things matters most.

Vishal shares these 5 insights in the episode

  • 6:02: Evolving as the profession evolves
  • 9:30: Being an empathetic business leader
  • 16:30: Back to basics, doing the boring stuff right
  • 20:52: Democratizing cybersecurity within your organization
  • 31:50: How to maximize your cyber investments

Read the full episode transcript here.

Listen to the next episode on March 29

Be the first to listen! Subscribe to The Segment: A Zero Trust Leadership Podcast on Spotify, Apple Podcasts, or wherever you get your podcasts to be notified when new episodes are released.

Related topics

No items found.

Related articles

What Makes Illumio's Agent More Reliable Than Inline Agents
Zero Trust Segmentation

What Makes Illumio's Agent More Reliable Than Inline Agents

Focusing on risk reduction goals and taking a hands-off approach to packets, Illumio lets you think about security without worrying about a reliable agent.

9 Reasons Why Energy Operators Should Implement Illumio Zero Trust Segmentation
Zero Trust Segmentation

9 Reasons Why Energy Operators Should Implement Illumio Zero Trust Segmentation

Learn why energy providers should implement Illumio ZTS to stay resilient against ransomware and breaches.

What You Need to Distribute a Zero Trust Policy
Zero Trust Segmentation

What You Need to Distribute a Zero Trust Policy

In this series, we have discussed Policy Discovery and Policy Authoring so far. Once you have a policy to implement, you need to get it calculated, turned into rules and distributed to enforcement points.

6 Zero Trust Insights from IBM Security's Stephen Coraggio and Greg Tkaczyk
Zero Trust Segmentation

6 Zero Trust Insights from IBM Security's Stephen Coraggio and Greg Tkaczyk

Hear how Stephen Coraggio and Greg Tkaczyk are helping IBM Security clients apply these core Zero Trust components across their network to build risk reduction and improve cyber resilience.

Gerald Caron Shares 5 Zero Trust Insights for Federal Agencies
Zero Trust Segmentation

Gerald Caron Shares 5 Zero Trust Insights for Federal Agencies

Gerald Caron, former CIO at the U.S. Dept. of Health and Human Services, discusses Zero Trust insights and implementing cybersecurity at government agencies.

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham
Zero Trust Segmentation

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham

Chase Cunningham, also known as Dr. Zero Trust, shares his thoughts in this Zero Trust Leadership Podcast episode.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?