Endpoint Security , Governance & Risk Management , Internet of Things Security

Zero Trust and the Role of Internet Isolation

Menlo Security's Jack Miller on How to Face Up to the Fundamental Zero Trust Challenge
Jack Miller, Head of Professional Services, Menlo Security

It isn’t that we struggle to define the zero trust security model. It’s that we ignore the real challenge, says Jack Miller of Menlo Security. We need to shift our view of authentication and access from “innocent until proven guilty” to “guilty until proven innocent.”

In this video interview with Information Security Media Group, Miller discusses:

  • The application of this new view to access.
  • The role of Internet isolation in this model.
  • The need for new education to ensure maximum adoption.

For over 20 years, Miller has been at the forefront of information security. After 16 years of building and running enterprise security programs and operations as a CISO for 4 multibillion-dollar organizations, he shifted his focus to the startup world, first working as an executive in residence for a leading VC and then running security, strategy, operations, and services for multiple U.S. and European security startups. Currently, he serves as head of global professional services for Menlo Security, where he leverages his experience with enterprise deployments to build people and processes to decrease time to value and ensure a successful onboarding experience for Menlo customers. Miller has written numerous articles and blogs on information security and regularly presents at industry conferences, sharing his insights to help mold the next generation of security leaders.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 28 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.