/
Zero Trust Segmentation

Cyber Consultant Stephen J. White on How to Align Security With Business Outcomes

Stephen J. White, CEO of Viking Technology Advisors

If your business is adopting cloud and AI technology, it’s time to rethink your approach to cybersecurity.  

Over the past three decades, networks have undergone major transformation. And each new piece of tech has only added more pressure and demand on networks and their security.  

In the latest episode of The Segment: A Zero Trust Leadership Podcast, I sat down with Stephen J. White, CEO of Viking Technology Advisors, to discuss what organizations need to do to modernize their security strategies and better align cybersecurity with business outcomes.

About Stephen J. White, CEO of Viking Technology Advisors

Stephen J. White is the CEO and founder of Viking Technology Advisors. His company specializes in helping clients move from physical data centers to secure, efficient cloud environments. They focus on providing holistic oversight and ongoing support.

Previously, he was the senior vice president of network services at Citizens Bank, managing network services and leading the Network Transformation program. Stephen is a prominent figure in the fintech space, known for his strong advocacy of innovative security solutions.

Building modern – not just transformed – cybersecurity

We reflected on the evolution of network security over the past 30 years. And it's clear that digital transformation isn't a new concept.  

“It's something we've been living through for many, many years,” Stephen explained. “And each of these new technologies has actually had one thing in common: increased pressure and demand on networks and cybersecurity.”

For Stephen, this trend highlights the need for businesses to rethink how they’re securing the network perimeter. This is especially true with the rise of cloud adoption and AI.  

To modernize their security strategies, he recommends teams focus on:

  • Automating security tasks
  • Holistic oversight of security to better manage risks and compliance  
"It's people, process, and technology – all of that needs to come together to make this transition,” he said.

In particular, the cloud brings its own challenges but can also bring better, more streamlined security. “The real challenge is delivering what customers need today while supporting the future,” Stephen said. “It's about modernization, not just transformation."

Zero Trust is key to modern cybersecurity

For Stephen, the starting point for modern security is always a Zero Trust strategy. This means moving away from perimeter-based security to more granular controls that are closer to applications and data.  

“Trying to port over security capabilities that were best-of-breed 25 years ago and expecting them to meet today's needs is madness,” he explained. “It's not granular enough to keep pace as companies are trying to move to the cloud.”

In today’s complex network, Zero Trust provides end-to-end security, helping businesses extend consistent security across all environments, from on-premises to endpoints and the cloud.  

Stephen called out Zero Trust Segmentation (ZTS) as an essential Zero Trust technology.

"The simplicity of being able to deploy [Illumio] on every workload in the environment, establish a set of tags, create visibility on the flows, and execute policy at scale is super cool," he said.  

What makes Zero Trust technologies like ZTS so transformative is that they’re business enablers – not just more rules. Security teams can now manage, control, and secure the network invisible to app owners. They can do their jobs no matter where they are without security interrupting. “It’s a really pivotal time,” Stephen noted.

Aligning security with business outcomes

The cyber industry is full of new technologies. Stephen points to innovations in Zero Trust tech, cloud adoption, and AI that are making security better and helping businesses operate more smoothly.

But modernizing isn't just about adding new tools to your security stack. Stephen stresses the importance of having a strategic plan that is tailored to business outcomes.  

He outlined the key recommendations he makes to teams working towards aligning security with the rest of the organization:

  • Have the right plan, including transparency about the right starting point and a phased approach to adoption.
  • Consider risks, funding, and business value throughout the journey.
  • Look for opportunities to consolidate your tech stack and improve efficiency.
  • Be transparent with the C-suite about their investment’s ROI.

The end goal? For Stephen, it’s always taking steps on the Zero Trust journey. “This isn't just about replacing one component within your environment; this is a holistic change and strategic shift,” he said.

Listen, subscribe, and review The Segment: A Zero Trust Podcast

Want to learn more? Listen to the full episode with Stephen on our website, Apple Podcasts, Spotify or wherever you get your podcasts. You can also read a full transcript of the episode.  

We'll be back with more Zero Trust insights soon!

Related topics

No items found.

Related articles

Zero Trust Segmentation for Dummies: A Simple Guide to Stopping Breach Spread
Zero Trust Segmentation

Zero Trust Segmentation for Dummies: A Simple Guide to Stopping Breach Spread

Get your free copy of Zero Trust Segmentation for Dummies for a simple guide to stopping the spread of ransomware and breaches.

FedRAMP In Process Designation, 2023 Cybersecurity Expectations, and Channel Sales Growth
Zero Trust Segmentation

FedRAMP In Process Designation, 2023 Cybersecurity Expectations, and Channel Sales Growth

Learn what you can expect from the cybersecurity industry in 2023 from Illumio's January news coverage.

5 Tips to Simplify Workload Labelling for Microsegmentation
Zero Trust Segmentation

5 Tips to Simplify Workload Labelling for Microsegmentation

Here are five tips to simplify for your workload labelling process.

Sean Connelly Shares How Zero Trust Modernized Federal Cybersecurity
Zero Trust Segmentation

Sean Connelly Shares How Zero Trust Modernized Federal Cybersecurity

Get insight into the transformative changes in federal cybersecurity, the evolution of network perimeters, and practical advice for anyone embarking on a Zero Trust journey.

How Armis CTO Carlos Buenano’s OT Security Journey Led to Zero Trust
Zero Trust Segmentation

How Armis CTO Carlos Buenano’s OT Security Journey Led to Zero Trust

Learn about Buenano's journey into OT security, the pivotal role Zero Trust principles play in safeguarding industrial environments, and the challenges to get there.

API Security CISO Richard Bird on the Power of Cyber Creativity
Zero Trust Segmentation

API Security CISO Richard Bird on the Power of Cyber Creativity

Learn from Richard Bird, CISO at Traceable AI, about the transformative power of creative storytelling and the integration of Zero Trust and API security.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?