CFO Insights: Zero Trust: In the face of escalating cyber-attacks, companies target a new level of security

Published on: Oct 25, 2021

These days, companies spend an abundance of time, energy, and dollars building trust with their various stakeholders—except, that is, when it comes to those accessing their computer networks. The goal there is to thwart cyber attackers even as they become ever-more sophisticated. And that means removing implicit trust from internal networks.

To achieve a “Zero Trust” security framework, companies start with the assumption that all network traffic, no matter its pedigree, may be malicious. The aim: restrict network access for all users (including insiders), apply security controls that hide applications not required by the user, and authenticate identities before allowing them to connect only to the applications they need.

CFOs can clearly see the potential costs of not investing in Zero Trust. The average cost of a data breach has reached $4.24 million, an increase of nearly 10% over last year, according to a recent study. Implementing Zero Trust, however, is far from quick, easy, or cheap.

In this edition of CFO Insights, we’ll explain what makes a borderless security strategy so vital, which impediments CFOs can expect to encounter during implementation, and how they can maximize investments by prioritizing business drivers and associated use cases.

This publication was released by our US firm.

Download

Correction list for hyphenation

These words serve as exceptions. Once entered, they are only hyphenated at the specified hyphenation points. Each word should be on a separate line.