WashingtonExec
  • News & Headlines
  • Executive Councils
  • Videos
  • Podcast
  • Events
    • 🏆 Pinnacle Awards
    • 🏆 Chief Officer Awards
  • About
  • Contact Us
Twitter Feed
LinkedIn Facebook Twitter Instagram YouTube
LinkedIn Facebook Twitter Instagram YouTube
WashingtonExec
Subscribe To The Daily
  • News & Headlines
  • Executive Councils
  • Videos
  • Podcast
  • Events
    • 🏆 Pinnacle Awards
    • 🏆 Chief Officer Awards
  • About
  • Contact Us
WashingtonExec
You are at:Home»News»Greg Touhill: ‘The Perimeter is Dead’
News

Greg Touhill: ‘The Perimeter is Dead’

By Bradford GrossmanJune 11, 2019
Share
LinkedIn Facebook Twitter Email
Greg Touhill, President of Cyxterra Federal
Greg Touhill, Cyxtera Federal

A strategic shift from perimeter-based security toward a more zero trust approach needs to happen in order for network security to adapt to new threats and changing technologies, according to one industry expert.

In a recent episode of “Government Matters,” WashingtonExec Cybersecurity Council Chairman and President of Cyxtera Federal Group Greg Touhill discussed the changes in zero trust security strategy. Zero trust networks are “an acknowledgment that you can’t trust anybody on the outside of your networks, and you can’t trust anybody on the inside of the networks,” he said.

Zero trust security places an emphasis on requiring verification for people trying to access information regardless of whether they are inside or outside a particular network. This security protocol is different from the traditional “castle and moat” approach that makes an entire network’s information available to whoever gains access.

A strategic change needs to be made regarding our approach to network security because the traditionally protective perimeter is “gone… the real perimeter is the individual,” said Touhill, who previously served as the nation’s first chief information security officer.

He believes the zero trust strategy is best suited to protect networks but warns that we look at the “people, process and technologies” when implementing it. Virtual Private Networks are outdated and they, along with other old technologies, “need to go,” Touhill said.

“VPNs are clogging the firewalls and taxing our already-stressed cyber workforce,” he said. “I think if you do it right, you can lessen the impact on the personnel.”

The implementation of zero trust, Touhill points out, must begin with authenticating personnel and their roles. Once this happens, people should only have access to the data and information they are authorized to see. This practice is called “least privilege,” which Touhill defines as “where you can only see and do what you are authorized to do.”

Achieving the micro-segmentation of networks down to the individual level is the “acme of skill with zero trust,” as it allows for stronger security within a given network, he said.

While the government at the turn of the millennium was at the forefront of security research, it’s now falling behind and needs to be using the best practices to implement security models, Touhill said.

Government partners should recognize “the perimeter is dead,” and “we need to take the zero trust security strategy, take an identity-centric approach and pick tools that are going to simplify our environment, reducing our overhead costs, and the burden on our people, and getting our people that are using their systems to do it more securely,” he said.

Previous ArticlePeraton’s Reggie Brothers Discusses Changes in FY20 NDAA Proposal
Next Article An Astronaut’s Life in Space: Zero Gravity and Shuttle Launches

Related Posts

‘Givers of GovCon’ Podcast: Accenture Federal Services’ Shawn Roman and Boulder Crest Foundation’s Ken Falke

Nathan Jones on How TaxBit is Helping Government Agencies Navigate the Crypto Space

2022 Chief Officer Awards Winner: Accenture Federal Services’ Deborah Ringel

Comments are closed.

Trending

‘Givers of GovCon’ Podcast: Accenture Federal Services’ Shawn Roman and Boulder Crest Foundation’s Ken Falke

May 18, 2022

Nathan Jones on How TaxBit is Helping Government Agencies Navigate the Crypto Space

May 18, 2022

2022 Chief Officer Awards Winner: Accenture Federal Services’ Deborah Ringel

May 18, 2022

Top Chief Financial Officers to Watch in 2022: Arcfield’s Lori Becker

May 18, 2022

Top Chief Financial Officers to Watch in 2022: Red River’s Warren Kohm

May 18, 2022
Quick Links
  • Executive Councils & Committees
  • Chief Officer Awards
  • Pinnacle Awards
  • K-12 STEM Symposium
  • Advertise With Us
  • About WashingtonExec
  • Contact

Subscribe to The Daily

Get federal business news & insights delivered to your inbox.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
Copyright 2021 © WashingtonExec, Inc. | All Rights Reserved. Powered by J Media Group

Type above and press Enter to search. Press Esc to cancel.