Security landscape has been steadily changing due to proliferation of cloud computing and online services coupled with increasingly mobile workforce. The traditional perimeter and segmentation-based approaches alone no longer match the needs of this new security landscape. With static, well-defined perimeters eroding, organizations need to implement dynamic security approaches that are flexible and continuous in nature. Identity is quickly becoming a new perimeter and frameworks and architectures such as Zero Trust and Secure Access Service Edge (SASE) are redefining how cybersecurity is tackled. But novel approaches don’t change the fundamentals. That's why I advocate for a time tested defense in-depth strategy that combines multiple and different methods of protection, both traditional and new, and infuses them with the cutting edge Machine Learning (ML) and Artificial Intelligence (AI) technologies that add behavioral dimension and automation to further enhance the practice
A while ago I wrote on Driving Towards Digital Transformation in Federal Government with a focus on background, legislative landscape, and timing. Now, I would like to circle back with a slightly different message of highlighting the three pillars on which (IMHO) the success of the Digital Transformation can be built and sustained. First, let's rehash a couple of things - Definition (credit to i-SCOOP , well put): Digital Transformation – is a profound transformation of business and organizational activities, processes, competencies and models to fully leverage the changes and opportunities of a mix of digital technologies and their accelerating impact in a strategic and prioritized way. And a quick reminder that while we use Technology as a catalyst for transformation, there are other parts of equal, if not higher, importance - like People , Policy , and Process : This leads us to a - Problem Statement: Technology and organizations are typically govern by a different rate of c