November 19, 2020 By Koos Lodewijkx 4 min read

To see more client stories like this, please visit www.ibm.com/case-studies.

As the chief information security officer (CISO) for IBM, I’m often asked by peers and colleagues, “What do you think of Zero Trust?”

Or, perhaps more often, “What strategies are you using to keep IBM protected?”

First, many vendors in the security industry are looking at zero trust security from the wrong perspective. Security isn’t something you can just ‘do.’ Sure, you may be able to buy security tools or products. As a security professional, you might have a lot of experience at adjusting firewall or provisioning policies, or have specialized training to investigate incidents. While these things can be helpful in applying security to your organization’s business practices, they are not really advancing the business in a secure way.

That is an important distinction and provides the basis of our view of zero trust. Zero trust isn’t something you can buy or implement. It’s a philosophy and a strategy. And to be frank, at IBM, we wouldn’t even characterize zero trust as a security strategy. It’s an IT strategy done securely.

Cloud First — More than an IT Strategy

Consider this. For the last several years, our IT strategy has followed a simple rule: cloud first. Everything we build or buy — from our marketing tools to our developer technology to our collaboration applications — is delivered as a service or is available to be hosted on our public cloud. This strategy addresses two critical business objectives:

  • Enabling end-user productivity. First and foremost, end-user productivity is paramount. We need to connect our employees to the tools they need in the most fluid and cost-effective way possible. Moving everything to the cloud allows us to provide a consistent and seamless experience for our users no matter where they are or what device they use. The pandemic provided a great test of our strategy and, generally speaking, it was pretty painless. Our employees were able to continue working with little to no disruption.
  • Protecting critical data. Moving everything to the cloud also helps us from a security standpoint. Delivering employee tools and applications from the cloud allows us to be independent of our internal network. In turn, we can treat our internal network as a hostile environment. This allows us to put in more controls to help protect our most sensitive data.
If you’re looking to connect with other IBM users, please join our community.

A Deeper Dive into Securing Our Users

So how do we provide our users with seamless, fluid experience no matter where they are and protect our most critical data at the same time? Here are my areas of focus:

Identity as Essential Control Point for Authentication

Our centralized enterprise identity project is a cloud-based program that securely connects our users to the resources they need. The basic elements of this program are:

  • Providing single sign-on (SSO) to all applications using IBM Security Verify with OpenID Connect, Security Assertion Markup Language and other open standards. This helps employees limit the passwords they need to manage.
  • Deploying passwordless authentication wherever possible using FIDO2, QR codes and device trust. This makes it easy for employees to log in, while at the same time offering more security than relying solely on passwords.
  • Supporting modern verification factors using the IBM Security Verify solution for quicker, more convenient multifactor authentication (MFA) experiences with additional transaction information for users to correlate requests back to what they see on screen, reducing phishing attempts.

Device Flexibility Underpinned With Integrated Security Capabilities

A key tenet of our IT and security strategy is flexibility, so we offer our users a choice of devices to work from. This requires us to take extra steps — more integration — ensuring not only the integrity of the device, but also how it is being used.

We rely on user risk management technologies from IBM Security MaaS360, as well as endpoint visibility tools like JAMF and Intune to help us consider the risks of the endpoint at the time of access. These are a key part of our project and provide critical data to isolate endpoints in the event of a compromise.

Automation to Quickly Respond to Incidents at the Endpoint

While the practices outlined above go a long way toward insulating our most sensitive data, we know that it’s not enough. When nation-states attack, we have only minutes to respond before they move laterally from the endpoint to another area deeper within the organization.

As highlighted above, we offer our users flexibility in their devices; this translates to hundreds of thousands of endpoints to monitor. Using integrated endpoint detection and response, we can identify a threat and isolate or kill the device within minutes before the attackers have a chance to move. In addition to protection, we are using these use cases to increasingly automate the response process. This helps us intercept attacks at an earlier stage, which significantly decreases investigation time. It also allows our highly trained analysts to focus on the most significant risks.

Zero Friction, Zero Trust

At IBM, we are committed to building and maintaining trusted relationships with our customers. This trust is built on an expectation for delivering innovation, as well as protecting and safeguarding our intellectual property, customer data and employee information. For us, this requires a comprehensive IT strategy executed securely.

This requires flexibility to empower our lines of business to access and use the tools they need to create, deliver and market the innovations our customers expect. It means providing a stable, reliable environment for teams and individuals to connect to the applications and technologies they need to do their job — even in the midst of a pandemic. And perhaps most importantly, our approach is underpinned with multi-faceted security integrated tightly into the daily operations of our business, providing ambient protection of both our users and our data.

For more information on IBM’s implementation of zero trust, please reach out to your local sales representative (if a current customer) or contact us here.

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today