AI’s Future Pathways; The CISOs Guide to Accelerationist Thinking | CISO Inspired Summit


Moderator: Matthew Steel, Former Group CISO – Standard Chartered Bank

Speaker: Deborah Haworth, Director of Information Security – Penguin Random House UK

Speaker: Dan Burns, Head of Cyber Security Operations – NEXT

Speaker: David Whitelegg, European CISO – Compass Group

Zero Trust Cybersecurity is a security model based on the principle of “never trust, always verify.” In traditional security models, once a user gains access to the network, they are often given broad access privileges, and the internal network is considered a safe zone. However, with the increasing sophistication of cyber threats and the rise of cloud computing and remote work, this model has become insufficient.

Zero Trust Cybersecurity assumes that threats could be both outside and inside the network and requires strict identity verification for anyone trying to access resources, regardless of their location or whether they are inside or outside the network perimeter. It aims to minimize the potential damage of a security breach by limiting access to only what is necessary for users and devices to perform their jobs, and continuously monitoring and verifying their identity and behavior.

Overall, Zero Trust Cybersecurity aims to provide a more robust defense against cyber threats by assuming that no entity, whether inside or outside the network, should be trusted by default.

Watch the full panel below