Zero trust

How Dow Jones used the pandemic to undergo a zero trust overhaul

Flags and the Dow logo at the main entrance of the Dow world headquarters complex is shown April 12, 2007 in Midland, Michigan. (Photo by Bill Pugliano/Getty Images)

While zero trust may be ill defined for some in the research community, the concept is helping to translate previously abstract or technical concepts about risk to a new audience, and spurring systemic transformation of security operations across companies in a way that other frameworks or guidance have failed to do.

One example of this is the way Dow Jones Chemical used the coronavirus pandemic as an excuse to fundamentally overhaul its security practices.

Like many large companies in the wake of the coronavirus pandemic, Dow Jones had to adapt to a “new reality” that meant more than simply re-architecting their networks to manage more remote users. It changed what was considered normal within that network, introducing more users overall, more mobile devices popping up on the network, and new cloud applications and IoT devices.

“What zero trust is helping us [to do] is manage the new environment, the new ecosystem we have to support now,” said Mauricio Guerra, Dow Jones Chemical's director of global information security in keynote at the RSA Conference May 18.

Click here for more coverage of the 2021 RSA Conference.

Not surprisingly, one of the first priorities Dow Jones focused on was providing employees secure access to the internet and company IT resources while they worked from home. That’s often where most companies start (and a fair amount end) their zero trust journey, but Guerra said they then established a new conditional access and authentication regime for users across the company. They replaced their telecommunications network and built a new software-defined wide area network to handle policy, security and networking functions. The manufacturing company will continue to rely heavily on connected devices, and are also developing security models to manage IoT device security.

While more and more C-Suite executives are embracing the idea, Guerra said these advocates need to go into “selling mode” internally to get similar buy in from their IT and security teams. While zero trust essentially draws from classic, fundamental cybersecurity principles around risk management, it’s a shift from how most corporate IT networks are defended today. That means time before the approach will replace that status quo with processes that treat every device, user and system on a network as if it could be turned against the business at any time.

“We need to convince, we need to engage our IT workforce that this is the way to work, because it’s completely different from what we used to do before, with firewalls that are either on or off,” said Guerra. “Now it’s different. We need to engage our IT workforce and train them to do something different.”

Derek B. Johnson

Derek is a senior editor and reporter at SC Media, where he has spent the past three years providing award-winning coverage of cybersecurity news across the public and private sectors. Prior to that, he was a senior reporter covering cybersecurity policy at Federal Computer Week. Derek has a bachelor’s degree in print journalism from Hofstra University in New York and a master’s degree in public policy from George Mason University in Virginia.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds