Visibility, consistency, and control.
For Stephen Coraggio and Greg Tkaczyk of IBM Security, these are the three basic building blocks of any good Zero Trust security program.
"Zero Trust is a broad topic," said Greg, "but I think ultimately those are the three things that all of our clients are trying to achieve, regardless of what area of Zero Trust we're talking about."
Stephen and Greg are helping IBM Security clients apply these core Zero Trust components across their network to build risk reduction and improve cyber resilience.
The pair sat down with me to discuss the Zero Trust challenges they see clients facing in the new episode of The Segment: A Zero Trust Leadership Podcast.
Haven't heard my other episodes with Zero Trust experts? Listen here.
The Segment episode 5: IBM Security's Stephen Coraggio and Greg Tkaczyk
In this episode, Stephen and Greg talk about the business value of cybersecurity, defining your crown jewels, and overcoming "analysis paralysis" and other Zero Trust challenges.
Stephen is an IBM Managing Partner who leads America's Financial Services Cybersecurity practice. He is responsible for all aspects of client engagement, from pre-sales support to service delivery and budget management. Stephen has over 22 years of financial services and cybersecurity experience focusing on cybersecurity projects ranging from program strategy and design to implementation and operations.
He is a recognized cybersecurity thought leader with a demonstrated ability to successfully integrate business process, technology and information risk management priorities to achieve measurable business transformation.
Greg is an Executive Consultant in the IBM Global Security Center of Competency, focusing on cloud and infrastructure security, including the design, implementation, and system integration of cloud security posture management (CSPM), container security, and micro-segmentation technologies.
Greg is a CISSP, CISA, as well as a Payment Card Industry Qualified Security Assessor (QSA), and has obtained a masters degree in Information Security. Greg is also an inventor, with four patents granted by the USPTO.
Get these 6 Zero Trust insights in the episode
- 10:17: Defining your "crown jewels"
- 13:09: Overcoming "analysis paralysis"
- 22:35: ZT as a framework: "It's a set of guiding principles"
- 28:55: How does cyber resilience come up in conversations?
- 30:30: What comes next in cyber (a case for AI/automation)
- 34:10: Using data to demonstrate ROI
Read the full episode transcript here.
Listen to the next episode on April 12
Be the first to listen! Subscribe to The Segment: A Zero Trust Leadership Podcast on Spotify, Apple Podcasts, or wherever you get your podcasts to be notified when new episodes are released.