Scott Hesford has over a decade of experience in IT security. Before joining BeyondTrust in 2019, he worked as Principal Consultant for CA Technologies and other large enterprises in Australia and New Zealand. A trusted cyber security advisor to enterprise customers, his experience spans across several industries such as banking, insurance, energy and utilities, in addition to state and federal governments. At BeyondTrust, Mr Hesford is an essential contributor in the regional security engineering department, helping enterprises and government agencies improve their security posture against internal and external threats.
Zero Trust security models eliminate persistent trust and enforce continuous authentication, least privilege and adaptive access control. In doing so, a zero-trust strategy reduces the threat surface and minimizes threat windows.
Organizations who adopt zero trust can look to get off the hamster wheel of compliance-as-a-strategy, needing to continually meet new compliance mandates as they impact the business. Instead, zero trust allows IT security leaders to build a business-enabling strategy that can then be mapped against whatever mandates come down the pipe. At the core of zero trust is identity. It has an important role to play in least privilege with the need to manage the access and privileges of identities, both human and machine, is key.
Whether it is a corporate user on a work-issued laptop or an employee of a third-party maintenance company, providing the right amount of access for just the right length of time to both IT and OT systems is critical for the security of critical infrastructure.
Join us for a discussion of cyber security leaders and practitioners as they discuss how zero trust has strengthened their cyber defences while enabling their business.