THE CISO VIEW
Independent peer-to-peer guidance from industry-leading CISOs.
ABOUT THE CISO VIEW RESEARCH SERIES
The CISO View report series is developed in conjunction with the independent research firm Robinson Insight and brings together leading CISOs for peer-to-peer information sharing to help security teams build effective cybersecurity programs.
Protecting Privileged Access While Transitioning to Zero Trust
Digital transformation and enterprise mobility are rapidly eroding the traditional perimeter-based model. As the perimeter dissolves, how can organizations protect access to their most valuable resources – data, applications, and infrastructure – on-premises or in the cloud?
We interviewed a panel of 12 Global 1000 CISOs on the changing risk picture, including evolving attack techniques that target privileged access. They offered specific recommendations to mitigate risks using a Zero Trust model. This report is one of the first to offer practical and operational insights for CISOs and their teams on implementing a Zero Trust model.
A companion to this report is The CISO View 2021 Survey: Zero Trust and Privileged Access. After hearing from our panel, we wanted to know if the larger security community shared their outlook. Therefore, we surveyed 100 security executives from large enterprises ($1 billion+ annual revenue), about their perspectives. The survey respondents and the panel both suggest a broad consensus around the value of Zero Trust and a growing sense of urgency for securing privileged access.
MORE FROM THE SERIES
Protecting Privileged Access in Robotic Process Automation
Securing RPA Workflows
Robotic Process Automation (RPA) is a fast route to increased efficiency, productivity and quality. From a cyber security perspective, RPA also brings a new and attractive attack surface with the proliferation of privileged access as a prime concern.
This CISO View research report examines issues such as: What techniques might an attacker use to exploit privileged access in RPA systems? What are the most significant risks? What controls are the most useful and feasible? What are the key success factors in working with business stakeholders?
Protecting Privileged Access
Securing Devops and Cloud Environments
The rewards of rapid software development and automated IT operations are clear – faster time-to-market and reduced costs. But, what about the risks? How do you successfully secure DevOps and cloud environments?
This CISO View research report drew from the experiences of CISOs from the Global 1000, as well as security professionals and technical experts who have adapted and secured DevOps environments.
Rapid Risk Reduction
A 30-Day Sprint to Protect Privileged Credentials
How do you avoid a data breach? Ultimately, you need to know what techniques attackers use and what security controls can stop them. This CISO View research report provides an inside look at the lessons learned from several high-profile data breaches, as well as recommendations and a 30 day sprint framework to guide rapid implementation of key controls.
The Balancing Act
The CISO View on Improving Privileged Access Controls
This report provides practical guidance for CISOs to improve privileged access controls based on the first-hand knowledge of leading organizations. The guidance includes recommendations for establishing the balance between enabling and restricting high-levels of access to information assets.
ABOUT THE CISO VIEW RESEARCH APPROACH AND PANEL
Today, organizations face increasingly sophisticated and challenging cyber threats. At CyberArk, we believe that sharing insights and guidance across the CISO community will help strengthen security strategies and lead to better-protected organizations.
CyberArk has commissioned an independent research firm, Robinson Insight, to develop The CISO View which explores topics related to improving privileged access controls. The initiative brings together CISOs from leading organizations across the globe to share their insights into critical issues facing security leaders with the goal of establishing valuable peer-to-peer guidance and dialog. Contributors to current and past reports, and members of The CISO View Research Panel include the following individuals.
CONTRIBUTORS TO PRIOR REPORTS INCLUDE THE FOLLOWING INDIVIDUALS
*Represents role at time of contribution.
Leverage the expertise of the industry’s most innovative CISOs to help you build an effective cybersecurity program today.