Reader small image

You're reading from  A CISO Guide to Cyber Resilience

Product typeBook
Published inApr 2024
PublisherPackt
ISBN-139781835466926
Edition1st Edition
Right arrow
Author (1)
Debra Baker
Debra Baker
author image
Debra Baker

Debra Baker has 30 years of experience in Information Security. As CEO of TrustedCISO, Debra provides strategic cybersecurity CISO Advisory Services. She has an AI first startup aiming to power through the pain of Third Party Vendor Assessment and Compliance. Previously, Debra was CISO at RedSeal where she led the security program successfully getting SOC2 Type 2. Previously, she served as Regulatory Compliance Manager at Cisco. While at Cisco she founded the cryptographic knowledge base, CryptoDoneRight in collaboration with Johns Hopkins University. Debra was named one of the top 100 Women in Cybersecurity, "Women Know Cyber: 100 Fascinating Females Fighting Cybercrime."
Read more about Debra Baker

Right arrow

Network access control (NAC) and Zero Trust

Another option is to scan all devices that attempt to connect to your work network. Typically, this is part of Zero Trust offerings, but it’s actually NAC that has been around since the late 2000s. NAC provides scanning, ensuring that the operating system (OS) is patched. In addition, NAC will ensure that your antivirus and anti-malware are up to date on all devices prior to being allowed to access your network. If your machine is company-issued, but the OS isn’t patched or the antivirus needs to be updated, then NAC would place you on a separate network to upgrade the software. This was set up at Cisco years before the Zero Trust became a big topic. NAC is considered a building block of Zero Trust. At Cisco, if I brought in my personal laptop, it would not automatically connect to the Cisco internal Wi-Fi network. There was a website you would go to to register your device. NAC would scan your device to ensure the OS and antivirus...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
A CISO Guide to Cyber Resilience
Published in: Apr 2024Publisher: PacktISBN-13: 9781835466926

Author (1)

author image
Debra Baker

Debra Baker has 30 years of experience in Information Security. As CEO of TrustedCISO, Debra provides strategic cybersecurity CISO Advisory Services. She has an AI first startup aiming to power through the pain of Third Party Vendor Assessment and Compliance. Previously, Debra was CISO at RedSeal where she led the security program successfully getting SOC2 Type 2. Previously, she served as Regulatory Compliance Manager at Cisco. While at Cisco she founded the cryptographic knowledge base, CryptoDoneRight in collaboration with Johns Hopkins University. Debra was named one of the top 100 Women in Cybersecurity, "Women Know Cyber: 100 Fascinating Females Fighting Cybercrime."
Read more about Debra Baker