3235: How Zscaler Is Building Resilience by Design into Modern Cybersecurity
Tech Talks DailyApril 08, 2025
3235
27:4522.22 MB

3235: How Zscaler Is Building Resilience by Design into Modern Cybersecurity

In this episode of Tech Talks Daily, I sit down with Marc Lueck from Zscaler to explore a security mindset shift that more businesses are beginning to embrace. The conversation revolves around the "Resilient by Design" principle, which encourages organizations to stop relying on reactive threat detection and start building systems that anticipate risk and limit impact from the outset.

Marc explains how today's cyber landscape demands more than traditional firewalls and legacy systems. He breaks down why Zero Trust should no longer be seen only as a remote access solution, but as a consistent, context-driven access model for all environments. From on-premises communication to lateral traffic between applications, Marc outlines how this model helps reduce vulnerabilities and prevent attacker movement inside the network.

We also dive into the challenges posed by AI-driven attacks, where phishing, malware, and reconnaissance are increasingly automated and customized to each target. With these tactics becoming more advanced, Marc stresses the importance of shifting away from pattern-based detection toward a strategy based on real-time context and intent.

He shares insights into Continuous Threat and Exposure Management (CTEM), a new class of tools that help security teams understand where problems are likely to occur before they happen. This proactive focus is key to designing systems that are resilient under pressure, rather than relying on alerts after the fact.

From his analogies of planning for hurricanes rather than rainstorms, to his thoughts on legacy systems and the future role of automation in threat response, Marc offers a practical look at what resilient infrastructure truly involves.

So the question is, are your systems designed to recover and continue when something breaks, or are they waiting for the next emergency to arrive? Let's find out.

[00:00:04] In cybersecurity, there's an age-old saying that used to be, it's not if, but when an attack will happen. But in today's world, even that's not enough. So what if businesses could shift from reacting to attacks to proactively minimizing risks before threats even emerge?

[00:00:25] That's exactly what Zscaler, or as they say in the US, Zscaler is aiming to achieve with its Resilient by Design principle. It's a new approach that moves away from traditional detect and response security and focuses on identifying and mitigating risks before they're able to cause harm.

[00:00:43] And to explore this shift, I'm joined by my friend Mark Lueck, CISO EMEA at Zscaler, where we will discuss how Zero Trust Architecture is evolving beyond remote access to become a holistic security model for all business traffic, including on-premises environments.

[00:01:02] And we'll also explore the rise of AI-powered cyberattacks where custom-built malware and hyper-targeted phishing campaigns are all becoming increasingly sophisticated. We're seeing it in our news feeds. But with organizations struggling to balance agility with resilience, Mark is going to share practical steps for improving security posture, even when dealing with legacy systems and technical debt and all those areas that weren't designed for the modern threats that we're against today.

[00:01:33] So, as AI continues to lower the barrier of entry for attackers, how will your business keep up with the pace of these evolving threats, especially if you're still stuck in a reactive mode? Well, it's time to get today's guest on. Who's going to help us all avoid nasty incidents like that? So, enough from me. Let's get Mark onto the podcast now.

[00:01:55] So, a big warm welcome back to the show. We last spoke almost 12 months ago, but for anyone that missed that conversation, can you just remind everyone listening who you are and what you do? Thank you so much, Neil. My name is Mark Lewick. I'm the CISO in residence at Zscaler here in the UK. CISO in residence is a fairly new title for us because we were trying to figure out what our title should be.

[00:02:16] I am customer facing at Zscaler, but I bring to Zscaler a 30-year career, 29, 28-year career in security where I was a practitioner. I was on the other side of the commercial equation. And what I do at Zscaler is I bring that customer experience. You know, how do you build out security? How do you leverage and utilize technology? Not how do you sell it? How do you configure it? How do you architect it? How do you deploy it?

[00:02:46] But really, how do you consume it within a business? And I also represent all of our internal security to those same customers. There's so much hype around resilience and cyber resilience at the moment. It's almost drifting with the buzzword status. But what does resilience mean to you? One of the ways I like to think about resilience or cyber resilience as opposed to the methods or the philosophy we've had before is that it's very much akin to what we look at, the ways we protect ourselves against weather.

[00:03:17] And the classic way that you protect yourself from a rainstorm is an umbrella, right? You go outside, you have an umbrella. Resilience is more about landing for a hurricane because it's not just about having an umbrella. It's much more than that. And when you're planning for a hurricane in Florida, you have to understand, do your building regulations support the building of buildings that will be resistant to those level of winds?

[00:03:42] What level of winds they happen to be resistant to? Do you have the right laws around what people should do? How do you do evacuations? Do you have good weather reporting? Are you able to understand when it's going to land? Do you have priority paths so you can ensure you know what to clear first so that ambulances and other emergency services can get through? When you look at it, it's much more than carrying an umbrella, which is fundamentally we've been done with our response up to now.

[00:04:09] And it's more about ensuring that you're able to weather that storm appropriately. One of the reasons I was excited to get you back on here with me is I was reading at the very beginning of the year that you were releasing or Zscaler was releasing resilient by design principle, shifting from a detect and respond model to a more proactive identify and mitigate strategy.

[00:04:32] So I've got to ask, I mean, what drove that shift and how does it better address today's cyber threat landscape, which seems to be evolving before our eyes? Well, let's let's I mean, I want to debunk it a little bit. Yes, we have released this new resilient by design resilience. But there is a there's a bit of sophistry and language change here rather than fundamental change. Yeah.

[00:04:56] What we have seen as an industry and those of us in the in the security intelligentsia, as it were, you know, the people who were in the know, we've been talking about the fact that that having protective controls, having the, you know, preventing things from happening in the first place was only so successful and that we needed to. And you've probably heard other CISOs and other security professionals say this.

[00:05:22] You know, it's not a matter of if it's a matter of when we're all going to experience some attack, whether successful or not, whether materially impactful or not. That's not really important. The point is, we needed to plan for what happens when it happens rather than making sure it'll never happen because we're so good at our protective controls and protective measures. And that is this shift. And we didn't have a really good name for it.

[00:05:46] We look at our if you look at the frameworks we were using, you know, the the the NIST CSF, for instance, was talking about how respond and recover had equal equal weighting to the protected and detect. However, resilience captures in a single word this whole concept of ensuring that the business can continue even if there's a cyber incident.

[00:06:12] Resilience, of course, is wider than cyber, but that's what we're going to narrow our discussion to today. So resilience is is the practice of being able to survive and continue to even thrive and manage important business capabilities and continue as a business, even if an attack is somewhat successful. So I guess the big question is in this current when not if era of cyber threats and the encroachment of A.I. attacks as well.

[00:06:40] How can businesses effectively plan for failure without compromising agility and operational continuity that that they need a standard now? I mean, I challenge the assertion that those aren't necessarily on the same side of the equation. Yeah. Agility is probably one of the things that actually makes you more resilient. So you're not having to sacrifice agility in order to become more resilient.

[00:07:05] Agility is the ability to move quickly and make changes quickly and make and make decisions quickly, which absolutely is part of a resilient cyber resilient strategy to be able to understand what your environment is and make those decisions on a quick, you know, on a rapid basis is part of that.

[00:07:19] However, primarily, it is about ensuring that you have a, you know, obviously a defense in depth and ability to defend, but also that you have well-practiced and deep response capabilities so that you know what you're going to do when these things happen. And you have that connected to the business going back to that agility so that if something does happen, you know what you're going to do.

[00:07:48] How do you, you follow the money or you follow your process. If this is unavailable, how will I continue? When you have that sort of conversation and that kind of exploratory discussions in advance, it very much makes the response itself easier. And I think many enterprises are feeling the pressure and want to modernize and they keep adding more technology onto their legacy stacks. And one area that particularly springs to mind is the airline industry.

[00:08:17] They don't have the luxury of downtime and much of the modern technology that we see in airports and on airlines now is built from the, built on top of technology from the 60s. So how do you help organizations better streamline their IT estates for better agility and better security? Well, I'm going to shamelessly talk about the change in architecture. Yeah. Legacy technology is a given. The architecture used to access that legacy technology is not a given.

[00:08:47] That is the flex point at which you can make significant change. The idea of taking an air traffic control system from that is fundamentally built or programmed in the 80s and 90s, 60s is the more hard technology, but the actual, some of the stuff that they're using, the software stuff is built ages ago. And yes, is it secure? No, it's not secure. Is it written? Did they understand what security was back then? Probably not.

[00:09:15] But the key point is that treating it and accessing it the way we've always accessed it is the significant problem. If we look at an architecture as an element of our resilience, as an element of our security, rather than just saying, let's layer this and wrap it in cotton wool and wrap it in protective controls. If we look at that architecture as an enabler for a resilient capability, well, then we're on a much better footing. And I hate to say it.

[00:09:44] I hate the term myself, zero trust. I think I mentioned this last year with you as well. However, that zero trust architecture, not a technology, but the architecture is saying that any session anywhere has to prove itself before it's ever allowed. Rather than there is this element of implicit trust that, hey, this is coming from somewhere I know, so I'm just going to let it happen. That is a key factor in actually making legacy technology more secure.

[00:10:12] And the other big challenge is the pace of technological advancement. It keeps ramping up the speed. A lot of people say it will never move this slow again, but threat actors, they're evolving equally as quickly. How can businesses stay ahead of sophisticated cyber threats, especially because AI makes it even easier now, while pursuing responsible digitization? It feels like quite a delicate balance. Well, let's look at that in two halves.

[00:10:41] The AI challenge, which is a significant, it's a real challenge, right? This has made the barrier to attack lower. It's made attacks more efficient and more targeted with a lower cost. So that is a significant concern. So the defense against AI, however, is just being better at what we do. We talked about resilience. And if the attacks are getting better through AI, then we just have to be better at our resilience capability.

[00:11:06] But the other one I wanted to talk about is the fact that most organizations or significant number of organizations are kind of expecting this to happen. And the barriers to entry are really that self-same complexity, the complexity of their security infrastructure, the legacy that you were talking about before. You know, we've done a questionnaire recently that we were saying that we asked business leaders, what were those top three barriers?

[00:11:36] And they were exactly as you were, Matt, this past two questions I've talked about, which is complexity of IT security infrastructure at a pretty large, over 40%. That legacy security and IT infrastructure, which is 35%. And of course, that last problem, which we haven't discussed, is the lack of people to do a good job with it. That skills gap, as it were, a third of people were saying that. So the key for me is doing what we do best, doing it better, but being aware of our environment.

[00:12:06] We cannot do security in isolation. And that's where I come back to this architecture point. When you're looking at an architecture, which is fundamentally an access philosophy, it has wide-reaching change to the environment without layering in additional complexity and potentially making tomorrow's legacy. And if we zoom out, the resilient by design principle seems to emphasize proactive risk management at the heart of everything.

[00:12:34] So for business leaders listening, what practical steps should their organization be taking to adopt the right mindset and integrate it into their existing security frameworks and avoid drifting back to those old mistakes? Well, that's a really good question. Because the fundamental approach before was find a sensitive data flow and chuck a control in there, call firewall, call IPS, whatever it was, and find sensitive data or sensitive application or sensitive compute and chuck some controls around it.

[00:13:04] If you imagine drawing back like you are, that is a giant game of whack-a-mole. As the business changes, you're having to keep up with it. And as the business becomes more and more complex, you're guaranteed. And I know this is a hackneyed phrase, but I'll use it anyway, is that we have to succeed 100% of the time. The attacker only has to succeed once. Yeah.

[00:13:31] And when you're playing whack-a-mole, it is you're bound to fail once. And therefore, the cards are stacked against us. To practically address this problem, actually, we need to stop playing that whack-a-mole and start thinking a little bit more like an attacker, a little bit more like a planner, and to follow these risks.

[00:13:50] Instead of just saying, there is a risk of ransomware, to say, where's the risk of ransomware, and start embarking on an activity we call, here at Zedskid, in our CISO team at least, we call it risk hunting. We have, for far too long, our SOCs have been mired in this detect and respond cycle and never get there to look above the parapet and see what's coming in the future.

[00:14:15] By spending cycles and looking a little bit more proactively in your environments and looking wider in your environments, you actually look for what is the potential problem next. You have new tools being released into the market, like CTEM, so Continuous Threat and Exposure Management, which are actually able to start looking at where the problems will be rather than where the problems already happened.

[00:14:37] And this is a great way of refocusing our operational capability to better address that problem, to better address how and where we should be looking for the next problem, where our controls should be applied in a more holistic fashion to avoid the whack-a-mole that we've always played. And, of course, legacy systems continue to be a challenge for many enterprises who have built up a significant amount of technical debt over the years.

[00:15:03] So how does your approach help organizations transition from reactive to proactive security without needing that complete scary overhaul of existing infrastructure? Well, that, I guess, comes back to that same architecture and that same access philosophy I was talking about before. And to go into a little bit more depth.

[00:15:23] When you have a typical classic security, network security-focused architecture, what you're saying is everything is forbidden except that this I'm allowing. And you define that you're allowing. And that definition historically has been based on very little. I mean, at its most basic, a firewall is looking at four different numbers and saying, must be good because these four numbers match what I've already got. And I know that sounds – I know I'm spinning firewalls a little bit.

[00:15:52] I get it. But fundamentally, destination port, source port, destination IP address, source IP address, and you've got some state information and things like that. But that's what you're basing it on. So really, a firewall is not about stopping traffic. A firewall is about allowing traffic. But that's implicitly trusting that that's okay. What's it communicating to? What is on the other end? Who is on the other end? What context do I have? It was safe yesterday. Is it safe today?

[00:16:19] And that's the zero-trust architecture that says, every time that this thing comes through, I want to be able to apply context. Contextual threat data. Today is not necessarily the same as yesterday. Do I have identity? Do I have risk? Do I have – is this the right capability? Is this the right process on the other end? What possible context do I have in order to make a good risk-based decision on this?

[00:16:45] And by changing this philosophy to say, I am going to deny absolutely everything. There is no, this is allowed because I trusted it yesterday. You move into a far different world. Now, is that a technology? Not really because you could apply the same philosophy to quite a few things that aren't even solved by the technology. That's why I tend to call it a philosophy because it's a way of thinking about these challenges.

[00:17:10] You can imagine zero trust by design would be a process you do during a product or an application design. Do you say, do I have any implicit trust built into the way I'm building the system? Can I eradicate or reduce that implicit trust? And that should hopefully change. Now, with legacy technology, as you asked in your question, that's a slightly different matter.

[00:17:33] But if you stop using that implicit trust model of access and start moving towards this explicit trust and saying, I'm trusting it because of these contextual items I've been able to gather, then you are solving a lot of that problem. And I know the phrase zero trust can borderline trigger you sometimes, but we've talked about it a little today.

[00:17:56] But on a positive note, what role do you see zero trust architecture playing in building these resilient digital infrastructures? And how are you supporting organizations by helping with implementing this approach too? Well, I think the biggest change we're going to see in zero trust is that zero trust up to now has been seen as a remote access alternative.

[00:18:16] In other words, it is a way of changing from a VPN based connectivity when you're at home and connecting to the work environment to a much better. Yes, a much better. The direction we're seeing zero trust move now is becoming this holistic access philosophy is that, yeah, when a person's on site, why would that access be any different when you're on site? Why do you suddenly trust a user when they walk across, you know, in through some revolving glass doors of a specific building?

[00:18:47] Why do you trust that user more than you would if they're at home? What's the big difference? Is it because you are able to look over their shoulder? It's highly likely you're not. So that is a major point is moving that approach to all traffic. And then the even finer control is that why aren't we applying the same level of zero trust philosophy to inter-application communication? In fact, to things that are even on the same network because that is what attackers want.

[00:19:16] The attacker wants to make a single beach head into a vulnerable system and then move laterally, right? Right. If we make everything, even things which would normally be completely invisible to security controls like communication on a VLAN, you know, and if we make those pass through the same model, that begins to provide a huge amount of capability and reduction in the attacker's possibilities, which should have a commensurate effect. And there's no reason that can't work for legacy technology as well.

[00:19:45] Certainly, that's what we're working in. I believe the industry as a whole. We're not working. We're delivering that now. I think the industry as a whole is working in that direction. And I see that as the ultimate goal for the zero trust architecture. And if we dare to look ahead for the rest of 2025, maybe take a peek into next year, what emerging cybersecurity trends or threats do you think will have the most significant impact on enterprise resilience? And how should businesses be preparing?

[00:20:15] And ultimately, what's keeping you up at night? Well, if I was to make it a semi-educated guess, we are going to see more and more heavily targeted attacks. And I know I hate using the term AI. It's just as triggering as zero trust for me. But I'm going to use it just like I use zero trust many times in this call. The AI is lowering that barrier.

[00:20:41] Now, when you are a, you know, you've built a, I don't know, I'm going to use Emotet as an example because Emotet was fantastic malware package built. But it was generic. You'd target, you know, use that to those tools to target an organization or, you know, you buy a targeted organization and already had the beach held built. The point is that it was a generic toolbox used for a very specific breach scenario.

[00:21:11] Imagine the situation where everything is custom, where the code is custom. The code is built based on reconnaissance that was automatically created by AI, where the phishing is custom based on the automatic reconnaissance of all of the, you know, the CXO level people in that organization. Where everything is custom from the malware through to the trusted sites.

[00:21:36] And then to kick it all off, they're going to leverage your implicit trust of these services you use. Good example. Microsoft. Nothing wrong with Microsoft. All the time in the world. What I dislike is our implicit trust of Microsoft. Microsoft. So how many people are really inspecting the traffic destined for 365? Well, probably not many because Microsoft historically has said don't do that.

[00:22:01] However, that's nice to say in SharePoint because you can say in SharePoint, well, I don't want to inspect my traffic. But anything else, you know, if you're going to Tom, Dick and Harry's SharePoint site, I want you to inspect that and look for threats in that. But that's much harder in OneDrive. You can imagine it's much harder to apply those controls. So attackers know this. They're leveraging our trust in these systems and they're ensuring their attacks use that trust against us.

[00:22:29] So going back to that hypothetical, which is not so hypothetical, super custom environment. Not only are they going to customize their communications based on their automated reconnaissance of you, they're going to build malware based on potentially families, but potentially written from scratch. And that will be custom built to leverage the trust that you have as an organization that they were able to determine based on their reconnaissance of you, which was also automated.

[00:22:56] So that for me is the sophisticated attacks. And what can we do about it? Just get better at what we're already trying to do. And I realize I'm playing a dangerous game repeatedly mentioning trigger words like zero trust and AI on the podcast today. So I don't bite. I don't bite. So before I let you go, I'm going to bring you back now. We'll have a little fun before I let you go. And I always like to ask my guests this. Who would you love to have a breakfast or lunch with? They can be alive or have passed on.

[00:23:25] But I'd love to find out more information about how you think and who you'd love to have a sit down and a chat about this stuff with. Well, I think that's a great question. And I was pondering before the call who I would really like to have that lunch with. And the importance of encryption has never been more. I mean, we're looking at quantum resistant encryption algorithms now. We're looking at encryption is literally in everything we do every single day.

[00:23:52] The fondle slabs we have in our pockets, the computers, the applications we use, everything is based on encryption.

[00:23:58] And if you go back to when encryption was first properly broken, I like to think that I'd love to have lunch with Alan Turing and ask him if you really could have possibly envisaged the applications and the absolute universal use of the technologies that he was working in deeply back in the post-war, well, during war period.

[00:24:24] And his understanding of how computing would have expanded to the way it has as well. That fascinating look from the past into the future. I'd love to get a real view of what he thought of or what he would have thought about today's computing world. Wow. What a fantastic answer. Absolutely love that. And for anybody listening wanting to dig a little bit deeper on the subject of resilient by design principle that we explored together today, where would you like to point everyone listening?

[00:24:53] Well, on our website, we have our new questionnaires available, the survey, and talking about resilient by design. We also have an alternative podcast that you can listen in. I was the inaugural interviewee of that podcast called About Resilience, and we can provide links as part of your podcast. Awesome. Well, I will gather those links. I'll embed them into the podcast and the blog post that will be associated with this episode.

[00:25:21] So people can find that nice and easily, including the rival podcast. There's plenty of room for us all out there. And I just, as always, love sitting down and chatting with you about this resilient by design principle, how it's helping businesses move away from the traditional detect and respond reactive approach to threats towards a more proactive identify and mitigate strategy for risk. Pure gold for me.

[00:26:13] And sorry, Mark. Yes, one of my takeaways is that Zero Trust isn't just about securing remote workers anymore. It's about securing everything. Whether that be on-premise applications, cloud services, or inter-application traffic, a context-aware security model is becoming essential in an era where AI-powered attacks are getting more targeted.

[00:26:37] And I think it was also great to touch upon the big challenge of legacy infrastructure and technical debt and how businesses can apply these principles we're talking about without the need for a complete overhaul. And ultimately, cyber resilience must go hand-in-hand with business agility. So, is your business still operating in a reactive security model? Or are you taking steps to build resilience from the ground up?

[00:27:05] Love to hear your thoughts, especially around how your organization is improving your cybersecurity strategy to keep up with these threats. But as always, techblogwriteroutlook.com, LinkedIn, X, Instagram, at Neil C. Hughes. If you're not following me and sending me a DM on those platforms, why not? I'm the easiest guy in the world to find. And if social's not your thing, maybe just come back tomorrow and have a listen to another interview with one of my guests. Good answer. I will see you all then.

[00:27:34] Speak with you tomorrow. Bye for now. Bye for now.