This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice ( for more information on the cookies we use and how to delete or block them.
The full functionality of our site is not supported on your browser version, or you may have 'compatibility mode' selected. Please turn off compatibility mode, upgrade your browser to at least Internet Explorer 9, or try using another browser such as Google Chrome or Mozilla Firefox.

CFO Insights: Zero Trust: In the face of escalating cyber-attacks, companies target a new level of security

Published on: Oct 25, 2021

These days, companies spend an abundance of time, energy, and dollars building trust with their various stakeholders—except, that is, when it comes to those accessing their computer networks. The goal there is to thwart cyber attackers even as they become ever-more sophisticated. And that means removing implicit trust from internal networks.

To achieve a “Zero Trust” security framework, companies start with the assumption that all network traffic, no matter its pedigree, may be malicious. The aim: restrict network access for all users (including insiders), apply security controls that hide applications not required by the user, and authenticate identities before allowing them to connect only to the applications they need.

CFOs can clearly see the potential costs of not investing in Zero Trust. The average cost of a data breach has reached $4.24 million, an increase of nearly 10% over last year, according to a recent study. Implementing Zero Trust, however, is far from quick, easy, or cheap.

In this edition of CFO Insights, we’ll explain what makes a borderless security strategy so vital, which impediments CFOs can expect to encounter during implementation, and how they can maximize investments by prioritizing business drivers and associated use cases.

This publication was released by our US firm.


Correction list for hyphenation

These words serve as exceptions. Once entered, they are only hyphenated at the specified hyphenation points. Each word should be on a separate line.