In this episode, we chat with Phil Vachon, Head of Information Security Architecture at Bloomberg, about how they transformed their security organization with Zero Trust. Zero trust involves three principles: trust but verify, assume compromise, and strong posture. It is a continuing journey, not a destination, requiring a good mindset about implementing controls and reasoning about security architecture.
Zero trust involves three principles: trust but verify, assume compromise, and strong posture.
Adopting Zero Trust is an ongoing journey rather than a one-time implementation.
Adopting Zero Trust requires a careful balance between implementing effective controls and minimizing friction for users.
Deep dives
The Importance of Zero Trust in Cybersecurity
Zero Trust is becoming a critical concept for cybersecurity, emphasizing the need to secure technology and infrastructure. Bloomberg's head of Information Security Architecture discusses their role in securing Bloomberg's technology and the adoption of Zero Trust as part of their overall strategy.
Understanding the Principles of Zero Trust
Zero Trust principles include continuous identity verification, assuming compromise, and enforcing strong posture. The focus is on continuously checking the identity of participants, assuming that devices and users may be compromised, and ensuring a least trust posture to minimize privilege.
Zero Trust as a Journey, Not a Destination
Adopting Zero Trust is an ongoing journey rather than a one-time implementation. It involves continuously improving controls, considering user perspectives, and adapting to evolving technology. Zero Trust philosophy aims to minimize risk and ensure a good mindset for technology and security architecture.
Considerations for Zero Trust Adoption
Adopting Zero Trust requires a careful balance between implementing effective controls and minimizing friction for users. Usability, especially for edge cases such as forgotten passwords or lost authentication devices, remains a challenge. The process of integrating Zero Trust principles into legacy systems and cloud-based services like email and collaboration tools requires an understanding of dependencies and supply chain risk management.
Challenges and Opportunities in Passwordless Environments
The move towards passwordless environments is seen as a positive step in improving security. However, challenges still exist with usability, especially for non-technical users. Managing these environments requires balancing security with ease of use, ensuring that the user experience is not compromised. Additionally, while passwordless authentication is promising, there are still edge cases and dependencies to address for successful implementation.
What does implementing a Zero Trust strategy actually look like in an organization? Nearly a year into our podcast’s journey covering how practitioners view, define, and apply zero trust, it’s time to look under the hood at how a notable organization put its strategy into motion. This week we chat with Bloomberg’s Head of Information Security Architecture and the Information Security Program, Phil Vachon, about how they transformed their security organization with Zero Trust.
Most interestingly though, while many organizations are just now exploring how they will start their zero trust journey, Bloomberg was ahead of the curve even before covid thrust the concept into the limelight.
“I will always say it is continuing to be a journey. It's not a destination,” said Vachon.
Key Takeaways
Zero Trust Principles
Zero trust is not a new concept but has been repackaged and branded as a solid ideology.
Zero trust involves three principles: trust but verify, assume compromise, and strong posture.
Zero Trust Journey
Zero trust is a continuing journey, not a destination.
Zero trust requires a good mindset about how to implement controls and how to reason about security architecture.
Zero trust is not just about securing the corporate IT estate but also about securing the data center estate and the communications between components.
Challenges in Implementing Zero Trust
Balancing security with usability is a challenge that must be addressed to enable a high-collaboration, low-friction workflow.
Bloomberg leverages many SaaS services for collaboration, but they also have their own core services that are still on-premises. They focus heavily on their offerings on-premises and have a big drink-your-own champagne culture around them.
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode