Skip to Content

Cybersecurity Part 3: Establishing a New Zero-trust Boundary

Global Knowledge Brief The IIA Dec 16, 2024

Cybersecurity

Part 3: Establishing a New Zero-trust Boundary

It should be a baseline requirement for every organization to have processes and controls in place to keep their networks secure. However, as technology has advanced and networks have grown larger and almost unfathomably complex, the standard for what is needed to constitute a secure network has changed. One of the most important changes lies with the transition from a location-centric security model to a more data-centric one. We call this model “zero trust.”

The IIA

The Institute of Internal Auditors