/
Zero Trust Segmentation

6 Zero Trust Insights from IBM Security's Stephen Coraggio and Greg Tkaczyk

Visibility, consistency, and control.

For Stephen Coraggio and Greg Tkaczyk of IBM Security, these are the three basic building blocks of any good Zero Trust security program.

"Zero Trust is a broad topic," said Greg, "but I think ultimately those are the three things that all of our clients are trying to achieve, regardless of what area of Zero Trust we're talking about."

Stephen and Greg are helping IBM Security clients apply these core Zero Trust components across their network to build risk reduction and improve cyber resilience.

The pair sat down with me to discuss the Zero Trust challenges they see clients facing in the new episode of The Segment: A Zero Trust Leadership Podcast.

Haven't heard my other episodes with Zero Trust experts? Listen here.

The Segment episode 5: IBM Security's Stephen Coraggio and Greg Tkaczyk

In this episode, Stephen and Greg talk about the business value of cybersecurity, defining your crown jewels, and overcoming "analysis paralysis" and other Zero Trust challenges.

Stephen is an IBM Managing Partner who leads America's Financial Services Cybersecurity practice. He is responsible for all aspects of client engagement, from pre-sales support to service delivery and budget management. Stephen has over 22 years of financial services and cybersecurity experience focusing on cybersecurity projects ranging from program strategy and design to implementation and operations.

He is a recognized cybersecurity thought leader with a demonstrated ability to successfully integrate business process, technology and information risk management priorities to achieve measurable business transformation.

Greg is an Executive Consultant in the IBM Global Security Center of Competency, focusing on cloud and infrastructure security, including the design, implementation, and system integration of cloud security posture management (CSPM), container security, and micro-segmentation technologies.

Greg is a CISSP, CISA, as well as a Payment Card Industry Qualified Security Assessor (QSA), and has obtained a masters degree in Information Security. Greg is also an inventor, with four patents granted by the USPTO.

Get these 6 Zero Trust insights in the episode

  • 10:17: Defining your "crown jewels"
  • 13:09: Overcoming "analysis paralysis"
  • 22:35: ZT as a framework: "It's a set of guiding principles"
  • 28:55: How does cyber resilience come up in conversations?
  • 30:30: What comes next in cyber (a case for AI/automation)
  • 34:10: Using data to demonstrate ROI

Read the full episode transcript here.

Listen to the next episode on April 12

Be the first to listen! Subscribe to The Segment: A Zero Trust Leadership Podcast on Spotify, Apple Podcasts, or wherever you get your podcasts to be notified when new episodes are released.

Related topics

No items found.

Related articles

Is Intent-Based Networking a "Failed" Technology?
Zero Trust Segmentation

Is Intent-Based Networking a "Failed" Technology?

Learn how the reliable, scalable nature of IBN in turn allows platforms like Illumio to offer reliable, scalable security in the cloud.

Improving Security ROI, ZTS for Endpoints, and Federal Security Challenges
Zero Trust Segmentation

Improving Security ROI, ZTS for Endpoints, and Federal Security Challenges

As ransomware and other cyberattacks grow in sophistication, building cyber resilience through containment is showing a better security ROI.

Why Healthcare Must Take a Breach Containment Approach to Cybersecurity
Zero Trust Segmentation

Why Healthcare Must Take a Breach Containment Approach to Cybersecurity

Get insight into the healthcare industry's rapid digital transformation in the context of the UK's NHS 75th anniversary.

Gerald Caron Shares 5 Zero Trust Insights for Federal Agencies
Zero Trust Segmentation

Gerald Caron Shares 5 Zero Trust Insights for Federal Agencies

Gerald Caron, former CIO at the U.S. Dept. of Health and Human Services, discusses Zero Trust insights and implementing cybersecurity at government agencies.

The 5 Best Zero Trust Tips from Infosys CISO Vishal Salvi
Zero Trust Segmentation

The 5 Best Zero Trust Tips from Infosys CISO Vishal Salvi

Vishal Salvi, who is responsible for information security at Infosys, discusses the evolution of the CISO over the past 25 years and Zero Trust tips.

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham
Zero Trust Segmentation

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham

Chase Cunningham, also known as Dr. Zero Trust, shares his thoughts in this Zero Trust Leadership Podcast episode.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?