Learning Library

← Back to Library

Zero Trust: Driving Modern Cybersecurity

Key Points

  • Zero trust has surged to the top of cybersecurity priorities because hybrid‑cloud adoption exposes “elephants in the room,” especially the difficulty of knowing where sensitive data resides—only about 7 % of organizations feel confident about their data visibility.
  • The practical implementation of zero trust focuses on the four‑R principle: ensuring only the right users get the right access to the right data for the right reason.
  • Companies are concentrating on a core set of controls—most notably identity governance—to verify who has access to what, which is considered the foundational, “table‑stakes” element of a zero‑trust strategy.
  • IBM’s experience with hundreds of clients shows that successful zero‑trust projects are built around a handful of repeatable controls rather than abstract philosophy, translating the concept into concrete, actionable measures.

Sections

Full Transcript

# Zero Trust: Driving Modern Cybersecurity **Source:** [https://www.youtube.com/watch?v=FMMWSLIcaME](https://www.youtube.com/watch?v=FMMWSLIcaME) **Duration:** 00:17:55 ## Summary - Zero trust has surged to the top of cybersecurity priorities because hybrid‑cloud adoption exposes “elephants in the room,” especially the difficulty of knowing where sensitive data resides—only about 7 % of organizations feel confident about their data visibility. - The practical implementation of zero trust focuses on the four‑R principle: ensuring only the right users get the right access to the right data for the right reason. - Companies are concentrating on a core set of controls—most notably identity governance—to verify who has access to what, which is considered the foundational, “table‑stakes” element of a zero‑trust strategy. - IBM’s experience with hundreds of clients shows that successful zero‑trust projects are built around a handful of repeatable controls rather than abstract philosophy, translating the concept into concrete, actionable measures. ## Sections - [00:00:00](https://www.youtube.com/watch?v=FMMWSLIcaME&t=0s) **Zero Trust in Hybrid Cloud** - Bob from IBM highlights zero trust as a key cybersecurity trend, noting its rise due to hybrid cloud challenges and organizations' lack of visibility into sensitive data. - [00:03:14](https://www.youtube.com/watch?v=FMMWSLIcaME&t=194s) **Key Identity Controls in Zero Trust** - It outlines core identity governance, identity analytics, privileged account management for insider threats, and adaptive authentication as essential controls for implementing zero‑trust security. - [00:06:23](https://www.youtube.com/watch?v=FMMWSLIcaME&t=383s) **Zero Trust: Access Monitoring & Fraud Detection** - The speaker outlines how zero‑trust initiatives incorporate data/file activity monitoring, encryption key management, and “data risk insights” to audit user access over time and apply fraud‑detection analytics to protect sensitive information. - [00:09:39](https://www.youtube.com/watch?v=FMMWSLIcaME&t=579s) **From Needles to Real‑Time Analytics** - The speaker outlines the difficulty of filtering true security incidents from overwhelming alerts, describes a three‑step process of detection, risk assessment, and remediation, and notes that organizations usually begin with SIEM log aggregation before progressing to real‑time network flow analytics. - [00:12:49](https://www.youtube.com/watch?v=FMMWSLIcaME&t=769s) **Missing Incident Response Playbooks** - The speaker points out that roughly 75% of organizations lack current, comprehensive incident‑response playbooks, forcing ad‑hoc reactions during cyber events, and urges greater awareness through cyber‑range exercises, automation of response procedures, and adoption of zero‑trust models to mature security posture. - [00:15:52](https://www.youtube.com/watch?v=FMMWSLIcaME&t=952s) **Federated Cloud‑Native Threat Intelligence** - The speaker proposes replacing centralized data ingestion with a federated, cloud‑native microservice approach that queries each cloud provider in real time for threat indicators, enabling faster, more scalable investigations. ## Full Transcript
0:00Hi, I'm Bob with IBM, 0:01and I'd like to take a few minutes and share with you what we're seeing as 0:05the 3 trends that are driving cybersecurity forward right now. 0:10All three of these are having a profound effect on the industry, so let's dive in. 0:15The first one won't be a surprise to anyone, and that is zero trust. 0:20This has become a top shelf issue around the industry. 0:25It's a concept which has been around over a decade, 0:28which is based on the thought of "never trust, always verify". 0:32The reason why this topic has gotten hot in the last couple of years is because 0:38as organizations move to hybrid cloud, 0:42they're learning about a lot of elephants in the room around cybersecurity that either they didn't realize were there 0:49or tried to ignore that were there. 0:51For example, 0:53when you move to hybrid cloud, one of the big issues is: 0:56do you really know where all of your sensitive data is across the organization? 1:01I saw a study not long ago that asserted 1:04that only 7%, I mean, singularly, number 7 percent, 1:08only 7% of organizations are confident they know where all of their sensitive data is in a hybrid cloud deployment. 1:16And frankly, 2 of the 3 last clients that I've talked to said to me, 1:20"... and that 7% are probably lying", right. 1:23So zero trust has gotten super hot in the last year or two because 1:27it helps you address the elephants in the room around cybersecurity, such as 1:33proper focus on sensitive data: where is it, and are we protecting it? 1:39Now, I'm not going to give you a philosophical view of zero trust 1:43because frankly, everybody's got their own point of view on it. 1:46What I'm going to show you is, based on our experience with hundreds and hundreds of clients, 1:51are what are people actually doing for zero trust? 1:54So what we've seen is very, very interesting 1:57is that you can describe every zero trust engagement as some combination of the following topics. 2:04First of all, we want to make sure that only the right users can come in. 2:12Right? 2:12So only the right users can come into our systems. 2:17You want to make sure that only the right users can get only the right access. 2:23Then you want to make sure that they can only get access to the right data, for only the right reason. 2:34So essentially, what people are doing for zero trust today to implement the philosophy 2:39is make sure that only the right users can get only the right access to only the right data for only the right reason. 2:45So as we look at how organizations are addressing this, 2:48we're seeing that they're really focusing on 2:52about a dozen different controls to really implement the core concepts here. 2:58So when you look at what are the controls, out of the hundreds of risk management controls that are out there, 3:04the ones that we see people spending most of their time on these days, 3:08on zero trust engagements, are really easy to notice because they keep showing up. 3:14So for example, first, we have identity governance. 3:19What does that mean? 3:20That means, do you know who has access to what? 3:22That's just table stakes, right? 3:24If you don't know who has access to what, then how can you possibly protect anything? 3:29So that's the first control. 3:31The second one, which has gotten hotter very recently, is identity analytics. 3:36What that means is it's one thing to know who has access to wha, but does that really make sense? 3:42Should that group of people have access to all of these different things? 3:46And this control helps us address that. 3:48The third one is around insider threats, and that's privileged account management. 3:55It is amazing that 19 years after Sarbanes-Oxley came out 3:59and that that regulation said, "Thou shalt do privileged account management", 4:03it's amazing that this is still a huge topic for people. 4:07But because it's focused on insider threat, 4:09oftentimes organizations will naturally prioritize external threats more. 4:14And this one also often gets a short thrift 4:17and so privileged account management is showing up in every one of these projects. 4:21Now what about right access? 4:23The things people are focusing on there is, first of all, access management itself. 4:28Can this person get access to this application, for example. 4:33But probably the whitest hot control in all of these zero trust projects is around adaptive authentication. 4:42What does that mean? 4:44That means that in a hybrid cloud world, 4:47every time someone wants to access something that's sensitive, you should develop a risk score around it. 4:54In other words, OK, is it someone that I recognize, from a device I recognize, at a time of day I recognize? 5:01Or is it someone that, maybe I recognize them, but they're on a jailbroken device that I've never seen before, 5:08coming at me from a part of the world they've never been in before, at least when they've connected to me. 5:12So adaptive authentication allows me to set what level of multifactor authentication do I use 5:19to actually allow someone to come in based on the risk score. 5:23What's really cool is what's happened in the industry is there's been a lot of focus on 5:27taking some of the fraud detection algorithms from the banking sector, for example, 5:32and marrying them into the identity and access management stack 5:36to allow you to do this advanced capability. 5:39And so this one probably is the one who gets the most of attention of all here. 5:44Now what about data itself? 5:47Once you get the right users getting the right access, then how do we actually handle the data piece of this? 5:52Well, look at it this way. 5:54The first thing that everybody focuses on is discovery and classification, 6:00meaning let's make sure we know where all the sensitive data is both on-prem and in whatever cloud providers that we use. 6:08Secondly, once I know that data is there, I need to lock it down. 6:11And so that's where you get into, of course, encryption, which is one of the most popular controls here. 6:17Then once you encrypt it, you want to make sure that when you do have access to it, you can limit access. 6:23So you can say, OK, this person should have access to this, but not this particular set within that data. 6:30And that's typically called data and file activity monitoring. 6:33And then finally, you get into making sure that you can manage 6:37the encryption keys that are protecting that data and you get into key management. 6:43So that is a topic on every one of these zero trust engagements. 6:47Finally, you get to the sort of artistic side of this 6:50because once you make sure that only the right users have only the right access to only right data, 6:54how do you figure out if they're only accessing it for the right reason? 6:58So one of the things that everybody wants to be able to do but has always struggled to do 7:02is say, "Well, can I look at all the access to my sensitive data over some period of time 7:09and run fraud detection algorithms against it and look for accesses that maybe I didn't catch when they happened?" 7:15Everybody wants to do that, but few organizations actually store much, if any, of that kind of data in their systems. 7:22So the control that is emerged that addresses this is what some folks call data risk insights. 7:30And what that means is if we go to a cloud-based architecture, 7:36you can look at large swaths of data being used over long periods of time 7:41and find things that you just missed the first time. 7:45It's very powerful. 7:46And part of almost every single zero trust project out there. 7:49You then also want to make sure that you can handle transactional fraud. 7:54And then finally, a big, big, big one here is configuration and management. 8:02What does that mean in a zero trust environment? 8:05Meaning in a hybrid cloud environment where you're applying the zero trust model of never trust, always verify, 8:12there's three kinds of configuration and management you need to worry about. 8:15First of all, is that devices, right? 8:17Laptops, mobile devices, servers, etc.. 8:20Secondly, is network configuration and management a huge topic and zero trust. 8:25And in third is the configuration management of the cloud native stack 8:30that the modernizing organization is doing when they run an agile DevOps project and put workloads and sensitive data out to potentially multiple clouds. 8:39That's the one that hurts a lot of cyber organizations today 8:43because they don't have much insight, let alone wisdom in how to manage that and configure it properly. 8:49And that's something that clearly is something that needs a lot of focus in the industry is something that certainly we do. 8:55So those are the 12 controls that we see are showing up in almost every single zero trust project out there. 9:02But there's another side of the story here. 9:05What happens is that if you've ever read the zero trust spec from NIST, 9:09they talk about a trust algorithm 9:11and how one of the big influencers and how you implement these controls 9:15is around how do you actually do your threat management? 9:20So the second trend that is seeing a resurgence these days is around threat management. 9:30Now, the way the typical organization does threat management is through a very simple model, 9:36it's simple to say, but of course not necessarily simple to do. 9:39And that's based on a model that says the first thing that I need to be able to do is find the needles in the haystack. 9:48Find this suspicious things going into my systems that could indicate something wrong is going on over here. 9:55As one client said to me recently, it's not finding the needle in the haystack, 9:59it's finding needles in the needle stack because that's how it looks. 10:02It looks like everything's a problem. 10:04So how do I find that? 10:05Then once I find the needles in the haystack, how do I confirm whether each needle is sharp enough to take action on? 10:15Because cyber ultimately is a form of risk management, not just compliance management. 10:20And so an indicator of compromise needs to be evaluated against whether it will really impact us. 10:26And then when you do find the things that you do need, some kind of response, you need to go fix what you find. 10:33So if you look at the tip of the organization, you find the needles in the needle stack. 10:36You confirm whether they're sharp enough to take action on. 10:39And then you go fix what you find. 10:41Now, organizations have different levels of maturity, for example, around finding needles in the needle stack. 10:48The first thing everybody does is collect, normalize, correlate, report and monitor and logs. 10:54That's often called a SIEM tool, or Security Information Event Management. 11:00But that only looks at what's already happened. 11:02That's all old news, right? 11:04And so where most people go is they'll then mature and go up into real time network flow analytics and then up into user behavior analytics. 11:12And some even go beyond there. 11:14But helping get more mature of how you do that is actually a really big topic for organizations of how do we get better at actually doing that? 11:25Now, once we get into, how do you confirm that a needle, an indicator of compromise, is sharp enough to take action on? 11:32Well, in that case, we did an informal study a couple of years ago of level one SOC analysts, Security Operations Center analysts, 11:40and learned the most common practice around the world is a technique called Google Search, or whatever your favorite search engine is. 11:48They typically say, "Well, I'm seeing this and this, is anybody else seen this?". 11:52The problem, of course, with that approach is A) It's manual, 11:55and B) our X-Force research team tells me that roughly only 20% of the world's threat intelligence is indexed and searchable. 12:02So, it means the most common practice around the world is to actually manually search through 20% of the data, which makes no sense. 12:09But people haven't felt like there's an alternative. 12:11So the way to improve on this one is by leveraging artificial intelligence, right? 12:18Some people have gotten cynical a bit in the industry around cyber and AI because everybody claims to do everything. 12:24Clearly from our point of view, we've been doing Watson for decades, and we've been teaching Watson for over five years now to ingest and digest threat intelligence. 12:32So we have over a million sources a day coming into it, so you can use an engine like that 12:37to actually radically speed up how you confirm whether a given needle in the haystack generates enough risk for you to actually take action on. 12:46Then finally, we get to the piece of how do you fix what you find? 12:50The latest study I saw says that three quarters of organizations still don't have well-defined, up-to-date incident response playbooks 12:57for all of the cyber events they're worried about. 13:00So what that means is that when you get one of those cyber events and you haven't built a plan to respond to it, 13:07it means you have to make it up as you go. 13:09So I was a math minor in college, so I like math symbols. 13:12I'm going to write null set. 13:1475% of organizations are making it up as they go. 13:17It does not take a social psychologist to point out that the worst time to come up with a plan 13:24to respond to a cyber event - a collaborative plan across an organization to respond to a cyber event - 13:30the worst time is when everybody's running around pointing fingers at each other, trying to figure out what happened. 13:35And yet that's what three quarters of the organizations do. 13:38So the way to get better at that is, first of all, 13:41is grow awareness through things like cyber range activities, to go through live fire exercises. 13:48And then the ultimate here is, of course, to also not only address, but automate 13:54the incident response playbooks to actually make that happen. 13:58So helping organizations get more mature on all of these things is something, right, that is a big focus in the industry. 14:06So let me close now with the third trend that we see happening in cybersecurity today. 14:11First is implement the zero trust model 14:14because of all the cyber elephants in the room that hybrid cloud deployments are exposing for clients. 14:20Secondly is refine how you do threat management, 14:24so you're much better at detecting the threats that influence how you implement these controls over here. 14:30Finally, the third trend in Cyber Today and this one is the most profound one, 14:35and that is, how do you support the modernization of your organization? 14:44I will tell you something that we see all over the world is that every organization is modernizing now digital transformation. 14:53And yet most cyber teams are trying to support this modernization of the organization around them 15:00by taking the same approach they've used for the last two or two decades or more to address cyber. 15:05What is that? 15:07Well, the way everybody does it is when there's a new source of threats and stuff, 15:10then the idea is, "Oh, I know what I'm going to do, I'm going to take all that data 15:13and I'm going to put it into whatever technology I'm using over here for my fine bubble, my security analytics platform." 15:19This does not scale to hybrid cloud. 15:23Why? 15:23Because when you get to hybrid cloud, a lot of that cyber data is being generated in one or more public cloud providers 15:30like AWS, Azure, Google Cloud, IBM Cloud. 15:33And so why wouldn't I just take that data and move it over here? 15:37Well, the cloud providers charge you an egress fee to take that data out and put it into your tool, 15:44and depending on what tool you're using, you might even get charged to ingest it in there by the tool that you're using. 15:49And so that causes huge problems. 15:52And that approach does not scale. 15:55So what the alternative is is we started thinking about this about three years ago and realized that there was a missing scope here. 16:05The missing step is that instead of forcing everything to come into the same place, even from the public cloud providers, 16:13instead, what if we could do a federated approach to threat investigations and applying threat intelligence. 16:22What does that mean? 16:24Well, when you see a new indicator, a compromise crop up anywhere 16:28instead of waiting for all the data to end up over here, instead, ask your security analytics platform, 16:36ask your various security tools, ask AWS, and Azure, and Google Cloud and IBM Cloud, 16:42what are they seeing at this? 16:44And then make a decision right there. 16:47That approach is simple, it's fast and it's effective. 16:52So we started building that about three years ago 16:55and going to a cloud native version of doing that, of doing federated searches and investigations 17:02and tying it into this entire process has a radical impact 17:07on not only your ability to threat management, but it allows you to modernize your approach to 17:15providing cyber services to the modernizing organization around you because it's all built on cloud native microservices. 17:23So this ability to move from standalone products and ingestion from all over the place 17:30into cloud native microservices that use a federated approach 17:34is far more powerful, and with the clients we've seen using it has a huge impact. 17:39So that's the three trends we see that are having the biggest impact on Cyber today, and I thank you for your time. 17:47Thank you. 17:47If you like this video and want to see more like it, please like and subscribe. 17:52If you have questions, please drop them in the comments below.