• About
  • Subscribe
  • Contact
Tuesday, October 21, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Process Compliance and Governance

PodChats for FutureCISO: ZTNA and CSMA dual shield for cloud security

Allan Tan by Allan Tan
October 21, 2025
PodChats for FutureCISO: ZTNA and CSMA dual shield for cloud security

PodChats for FutureCISO: ZTNA and CSMA: A dual shield for cloud security

Share on FacebookShare on Twitter

For ASEAN enterprises, the digital future is not a choice between legacy and cloud, but a complex convergence of both. In this hybrid reality, cybersecurity cannot rely on monolithic, perimeter-based defences.

The new imperative is a dynamic, intelligent security posture that protects data and access wherever they reside. This is where two powerful concepts—Zero Trust Network Architecture and Cybersecurity Mesh Architecture (CSMA)—evolve from competing concepts into a symbiotic dual shield.

As Steve Riley, vice president and field CTO at Netskope, clarifies, the first step is understanding their distinct roles. "We need to differentiate between zero trust as a strategy and zero trust network access as a market," he states.

Zero Trust is the overarching philosophy: "ensuring that the right people have the right access to the right resources at the right times for the right reasons." Cybersecurity Mesh Architecture, meanwhile, is the enabling framework that allows security tools to interoperate and share the critical signals needed to make that strategy work.

The ASEAN imperative: Agility amidst regulation

The drive toward this model in ASEAN is not merely theoretical; it's operational. Regulatory mandates from Singapore's MAS TRM, Malaysia's BNM CSF, Indonesia's OJK, and Thailand's PDPA demand granular control over data residency and access. This creates a complex tension: the pressure to innovate and adopt cloud technologies at speed, against the absolute necessity of compliance.

Riley observes a positive shift in this landscape. In his interactions with customers in Southeast Asia and Africa, he sees "a renewed awareness and desire to finally stop analysing too much and start deploying."

The prevailing sentiment is that within their specific regulatory frameworks, organisations can "make some interesting use of cloud technologies and the emerging artificial intelligence." The question is no longer if they will adopt the cloud, but how they will do so securely.

Striking the balance: From Department of "No" to "OK"

The core challenge for CISOs and CIOs is balancing security with business agility. The goal, as Riley puts it, is "striking the right balance between staying secure and getting work done."

Historically, security was often seen as the "department of NO," a friction point that impeded productivity. Zero Trust, powered by a mesh, flips this script.

The magic lies in granular, adaptive access control. Riley provides a compelling example: an employee on a managed corporate device may have full access to public, private, and confidential data.

If that same employee switches to an unmanaged personal device, the security system—using combined signals about device posture and data sensitivity—can dynamically adjust access. Public data remains fully accessible, private data becomes read-only, and confidential data is blocked entirely.

Related:  PodChats for FutureCISO: Counter-tactics against artificially intelligent ransomware

"This is sort of one example of being able to provide some agility that didn't exist when it wasn't possible to evaluate and combine these signals," Riley explains. This nuanced approach enables the business without introducing undue risk, transforming the security team into the "department of OK."

CSMA: The nervous system for a zero trust strategy

A Zero Trust strategy is only as good as the data it runs on. It requires a constant stream of signals—user identity, device behaviour, data location, application type—to generate the context for access decisions. This is where Cybersecurity Mesh Architecture proves its value.

CSMA acts as the nervous system, allowing different security tools to share information seamlessly.

"The more that tools can communicate amongst themselves, the greater volume of signals we'll have," says Riley. "I want as many signals as possible to allow me to have the best and the most refined sets of policies."

Netskope's Cloud Exchange is a practical manifestation of this. It provides modules for sharing threat intelligence (Threat Exchange) and risk data (Risk Exchange) with other vendor tools. "In a way, you could say that our cloud exchange is the beginning of a CSMA," Riley notes.

This interoperability is crucial. It allows, for instance, a security tool to use an API from Zoom to analyse video frames for deepfakes, and then instruct the application to remove a detected threat—a powerful example of tools and applications collaborating in real time to mitigate risk.

The new adversary: Mitigating AI-amplified risks

The rise of AI introduces a new dimension of risk that this dual shield is uniquely positioned to address. Riley highlights two key concerns. First, AI-powered adversaries can attack at unprecedented scale and speed. Second, and more immediately, the proliferation of AI in enterprise SaaS applications creates new data exposure points.

"One recommendation I have for any purchaser of a SAS app that includes AI is to ask, well, what are those AI models within the SAS app?" Riley advises. Using a public AI model that ingests corporate data is a significant risk.

Furthermore, the emergence of AI "agent frameworks" that autonomously execute tasks and access data represents a new form of "prolific shadow IT." Security platforms must now be able to track what these agents are doing, which models they connect to, and what data they share.

The Roadmap: Platforms and interoperability over point solutions

Faced with these challenges and budget constraints, how can CISOs and CIOs build a realistic roadmap? Riley advocates for a platform approach, moving away from dozens of disjointed point solutions.

Related:  State of IT risk in Singapore

He suggests focusing on four key platform types:

  1. An Identity Platform (including governance).
  2. An Endpoint Protection Platform (beyond just anti-malware).
  3. A Network and Data Security Platform (that handles all traffic consistently).
  4. An Analytics and Threat Response Platform (combining SIEM and SOAR).

However, the most critical evaluation criterion is not features, but interoperability. "It's more important to evaluate how the platforms interact with each other than the features of the platforms themselves," Riley emphasises.

Steve Riley

"Don't buy that network and data security platform even though it has the best features, because it doesn't interact with anything else. You can't build a mesh architecture with that thing." Steve Riley

This focus on interoperability is the bedrock upon which an effective CSMA—and, by extension, a powerful Zero Trust strategy—is built.

The ROI of this consolidated, platform-based approach is clear: increased agility through finer-grained control, reduced risk as employees are guided toward secure behaviours, and optimised costs by consolidating vendor sprawl.

For ASEAN leaders, the path forward is clear. By weaving together the strategic philosophy of Zero Trust with the interoperable framework of a Cybersecurity Mesh, they can construct a resilient, adaptive security posture.

This dual shield does not just protect the modern hybrid enterprise; it actively enables it to innovate and grow with confidence in a regulated, AI-driven world.

Click the PodChats player and listen as Riley explains how zero trust and cybersecurity together form the dual shield for cloud security.

  1. How can CISOs effectively integrate Zero Trust Network Access (ZTNA) principles to secure access in multi-cloud environments without impeding business agility?
  2. In what ways might Cybersecurity Mesh Architecture (CSMA) unify its fragmented security tools across hybrid IT infrastructures?
  3. What role will AI and emerging technologies play in amplifying cloud security risks, and how can CIOs/CISOs mitigate them proactively?
  4. What has worked regarding how organisations approach ZTNA and CSMA?
  5. Any recommendation for quantifying the ROI of shifting from perimeter-based firewalls to a zero-trust + mesh model—not just in cost savings, but in risk reduction?
  6. What long-term metrics should CISOs track to evaluate the success of their cloud security strategy in a rapidly changing Southeast Asian landscape?
  7. Why platforms in cybersecurity? How does it map to defence-in-depth?
  8. How will we address the increased complexity of managing a distributed security model while adhering to Zero Trust principles?
  9. What would be a realistic roadmap for evolving security posture to embrace both CSMA and Zero Trust?

Tags: CSMANetskopePodchatsZTNA
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • PodChats for FutureCISO: ZTNA and CSMA dual shield for cloud security
  • Legacy systems hinder zero trust implementation, finds research
  • 79% of APAC security leaders prioritise threat intelligence
  • Forcepoint enhances data security with AI-Native DSPM
  • NetApp integrates data breach detection into storage offerings

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl