Remove Business Continuity Remove CTO Remove Recruiting Remove Reference
article thumbnail

So you’re a new CISO? Let’s navigate your first 90 days

Lacework

What we really mean when we refer to “zero trust” is that you should commit to continuous permissions pruning and implement a mix of perimeter-based and fine-grained, identity-centric controls. Continuous pruning takes work but gives a healthy amount of friction to identity and access controls. ? Ask what they care about.