Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Leverage Cybersecurity and Zero Trust as Business Enablers
Cybersecurity

How to Leverage Cybersecurity and Zero Trust as Business Enablers

John SiefertBy John SiefertDecember 1, 2022Updated:December 16, 20225 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In this cybersecurity special report, John Siefert, Chris Hughes, and Tom Smith discuss the role of cybersecurity in business, and why it’s now about more than just mitigating threats, and not just for highly-regulated industries such as the public sector and financial services. Today’s conversation delivers the CISO perspective, from innovative startups to zero trust and cybersecurity, and their roles as business enablers in today’s acceleration economy.

Highlights

01:19 — From the perspective of a CISO, what is the current state of the cybersecurity market?

01:30 — There has been a strong increase in energy and interest as it relates to viewing cybersecurity as a business enabler. Whereas cybersecurity was previously viewed as an impediment, the use of technology to power the modern business ecosystem has led to a new demand for cybersecurity — specifically zero trust. There has been much emphasis placed on the cloud and cloud security that is empowering businesses.

02:02 — Tom asks Chris if cybersecurity as a business enabler is a mindset and cultural approach, or if it’s more about the tools that enable a more proactive stance.

02:24 — Chris responds that cybersecurity as a business enabler is a combination of tools and a cultural approach. It means making risk-informed decisions to achieve desired business outcomes.

03:39 — How does one get access to systems that pull security intelligence out and use it to make better decisions?

03:45 — Companies that are leaders in process mining and artificial intelligence are increasingly becoming focused on democratizing access to the specific technologies that will inform leaders on security and business outcomes. At the recent Celosphere 2022 in Munich, Germany, Tom spoke with a number of organizations that said they want to put their technology in the hands of more customers. This can introduce security implications, however. Who gets access? And when? How is this controlled?

05:08 — As far as how data is accessed to enable businesses to run, zero trust almost becomes a mindset in cybersecurity as a business enabler, John says.

05:25 — Chris agrees that John is “spot on.” Zero trust is about “getting the right people access to the right data at the right time. Zero trust is built on the lack of implicit trust, but granting it as needed, and pulling access back when it is no longer needed.

06:12 — What is the rate of market adoption for zero trust as a mindset and framework? What tools are being applied to this concept?

06:23 — There has been tremendous market adoption of zero trust in the federal and commercial sectors. However, Chris adds there is still a lot of confusion around whether zero trust is a product or service, or even if it’s something that can be purchased in the first place. Users are still “maturing and learning” when it comes to zero trust but the world, overall, is headed in the right direction.

06:50 — At Cloud Wars Expo 2022, Chris led an entire track on zero trust with a focus on its use in the business world.

07:14 — In what other industries is zero trust being embraced or considered especially appropriate?

07:52 — Aside from government, other highly regulated industries such as financial technology and healthcare are two notable examples of industries in which zero trust is being rapidly adopted, Chris says.

08:20 — John highlights how there is a dire need for zero trust in the healthcare industry, considering all of the patient privacy data and HIPPA regulations that require this.

09:23 — The architectural approach by the healthcare industry is a unification of people, processes, and technology.

10:14 — Lookout is a mobile security company that enables zero trust frameworks for various organizations. Recently, Lookout published a research study on attacks targeting government entitites and employees. The findings suggest that one in eight government employees was exposed to phishing threats. The data reiterates the importance of zero trust principles since security attacks are bound to occur.

11:50 — Lookout provides a unified security platform that includes everything from mobile devices to the cloud. Lookout’s platform is a cohesive solution that spans the entire architecture and ecosystem of a company.

13:59 — Tom reviews a specific use case of how Lookout is assisting customers. Its customer, Schneider Electric, is using Lookout technology — 50,000 of its Android and Apple devices are secured by Lookout, and the company is looking to secure 25,000 more. Lookout supports privacy and security laws in more than 100 countries.

15:32 — In the upcoming weeks, Acceleration Economy analysts will be gathering with Lookout executives to learn about the company.

16:22 — Chris emphasizes the importance of looking at cybersecurity as a business enabler. How can security teams help businesses achieve successful outcomes and not “lock everything down”?

16:42 — Tom feels that having centralized tools that enable more users to get their hands on cybersecurity technologies represents a significant benefit.

17:45 — John suggests that the only way to enable co-creation, modernization, and the acceleration of businesses is to consider cybersecurity as a business enabler.

click here to join the conversation on linkedin

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Interested in Lookout?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Cybersecurity cybersecurity as an enabler Cybersecurity channel data privacy featured Featured Post financial services healthcare innovation Practitioner Roundtables zero trust
Share. Facebook Twitter LinkedIn Email
Analystuser

John Siefert

CEO
Cloud Wars, Dynamics Communities

Areas of Expertise
  • AI
  • Cloud
  • LinkedIn

John Siefert is the CEO of Dynamics Communities and Cloud Wars, where he leads the strategic direction, business, and community-based focus of the organization by collaborating with colleagues, customers, partners, and friends. Prior to DCI, Siefert has worked in multiple leadership positions, including President roles at Questex and Informa, SVP at UBM, CMO at STYR Labs, and CEO at Virgo, LLC. Siefert’s passion for creating unique content, community, and event-based programming has helped to build some of the largest media brands in the B2B market, serving the business technology and health/nutrition categories. In his personal life, Siefert is a father of two, married to the love of his life, and digs beaches, barbecues, boats, astrophysics, and road-tripping.

  Contact John Siefert ...

Related Posts

AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls

May 8, 2025

ServiceNow Re-Invents CRM for End-to-End Enterprise

May 8, 2025

Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT

May 7, 2025

Bill McDermott Calls Out ‘Collapse of 20th-Century Software-Industrial Complex’

May 7, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls
  • ServiceNow Re-Invents CRM for End-to-End Enterprise
  • Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT
  • Bill McDermott Calls Out ‘Collapse of 20th-Century Software-Industrial Complex’
  • With Latest Agentic AI Products, ServiceNow Embraces Third-Party Platforms, Data Sources

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.