Access Management , Governance & Risk Management , Identity & Access Management

Case Study: Where to Begin Your Zero Trust Journey

Amit Basu of International Seaways on the Various Approaches to Zero Trust
Amit Basu, CIO and CISO at International Seaways

As one embarks on a zero trust journey, it's best to start with a network approach, according to Amit Basu, who is vice president, chief information officer and chief information security officer at International Seaways, a New York-based tanker company that provides energy transportation services for crude oil and petroleum products worldwide.

See Also: OnDemand Crowdsourced Security and DevOps: A Few Things You Probably Didn't Know

"I consider network as the lowest-hanging fruit that could provide quick benefits. A zero trust network approach demands that the networks use technologies like the next-generation firewall to segment access to networks. The next step would be applications like Office 365. Having a zero trust framework there will allow mitigation of any operational risk to the business," he says.

In a video interview with Information Security Media Group, Basu also discusses:
  • His company's zero trust journey;
  • The various approaches to zero trust and which one works best;
  • How he overcame the challenges in his zero trust journey.

Basu has more than 30 years of IT experience and almost 25 years of experience in maritime IT leadership roles. Prior to International Seaways, he served as CIO at Overseas Shipholding Group from 2013 to 2016.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.