Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Illumio: Stop the Spread, Contain the Chaos

Truth in IT
05/06/2025
95
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at Rsac 2025. There's lots and lots of stuff going on here in the cybersecurity space. Lots of stories to tell about what's new, what's trending, what's the new things that people need to be looking out for? What are the new features they can take advantage of? I've got Trevor here from Illumio, Illumio and Trevor. Let's just start a little bit by what does Illumio do? It's sort of a really high level in this landscape. Yeah. So we, um, we work with organizations to make sure that if they have an attack, it doesn't turn into a disaster. So, you know, I mean, the reality is, you know, we did some research with the Ponemon Institute and, you know, they sort of came back that 58% of the organizations surveyed had to halt operations due to a ransomware attack. And that's, you know, in this day and age, that's ridiculous. So what we do is we help them contain that attack to prevent it, you know, stopping stopping them being able to do their business. Okay. So, uh, is this a rapid response thing or something that's reactive? Is it something how do people know that they're having a ransomware attack, even to begin with and get you involved. Well, I mean, there's several, several layers to that. Um, you know, so there's a lot of technology out there that helps you detect and attack. Um, you know, even if you detect an attack, you need to do something about it. So what we do is we apply zero trust principles, which controls exactly what can communicate with what. So you're, you know, you're obfuscating, obfuscating the rest of your environment to the attacker so they can only go down certain routes and paths. And if we you know, that can be detected quite easily because it's, you know, a much smaller thing. Um, and then what we do is we put policy in place to, to prevent that. Then moving on further and, uh, and stopping it from, you know, getting to the most critical resources. So, so really kind of implementing a response plan that can automatically take off. Yeah. So so you're effectively, um, really following the cybersecurity framework. So we're identifying where potential risks are. We're we're protecting and mitigating against those risks. And then when, um, you know, when an attack is detected, then we can dynamically change the policy to react to that attack and prevent it sort of getting to those critical assets. Attacks are always evolving, as we're seeing here at the show. Like the the threat envelope is always changing, and where the threat is coming from is always changing, too. And you guys are able to keep up with that. Yeah, absolutely. I mean, the reality is that a lot of attacks are successful because of unpatched systems, because of weak passwords, because of, you know, lateral movement, because of open, high risk ports. So, you know, so we actually help people do the fundamentals. So if you can do the fundamentals well, you can, you know, solve half the problem. All right. Looking at the RSA RSA key show broadly there's a lot of like themes and trends going on here. What would you sort of pick out and call out and say something you've noticed. Well obviously I you know so I is replaced zero trust on everyone's everyone's. But actually last year I think it was OT. And this year I so there's there's all of that going on. But I think you know the overall the overall shift is is around. You know there's a danger that there's too much shiny stuff here. So are things going oh we can Analyze the posture of third parties and and things like that. When you know when it's things that people don't really need to do, what they need to do is solve the fundamentals. So, so there's there's on one side people who are saying, yeah, you know, fix the basic problems. And then the other side saying, well, we've got this new shiny thing and, and I, you know, I think there is a danger that going down the shiny route too much is sort of, you know, the law of diminishing returns applies because you're never going to you're never, ever going to hit 100% ability to stop, you know, to prevent an attack. So you have to sort of shift the focus onto mitigating what happens when it when you do have an attack. All right. So let's talk about that. If, if the threat landscape is always changing and evolving and the tooling is always coming along looking shinier and shinier, but if you keep trying to stay too far ahead, you're never getting to the fundamentals. What would be your best advice for someone who's to sort of say, all right, I need to tackle the biggest chunk of that as I can. Where would you start? I'd say take a breath, pause, look at, look at the threats you have. You know, for instance, there's always the challenge with things like digital transformation. So, you know, everyone has become overexcited with being able to connect lots of things ot things into into Ethernet switches. And they've gone, oh yeah, we can use VLANs and all that. Yeah. Don't do that. Buy another Ethernet switch. Keep it. You know do the basics. Keep those networks completely separate. Do some at least hardware hygiene. Yeah. Do hardware hygiene. Network hygiene. Do all of that stuff first. Don't get sucked into the latest funky things. Do the basics first. Yeah. Good. If someone wants to learn a little bit more about Illumio and your approach and your advice, what would what would you recommend they look at? So visit Illumio. Com. There's a lot of resources there. Um there's a lot of information. You know, we keep it very rich in quite detailed content. Um, there's demos, there's videos, there's all sorts of things that are available or just contact us. RSAC. They've got a great orange booth here. Uh, check, check it out if you're coming on by. Otherwise. Uh Illumio.com. Thank you very much. Yeah. Great.

Illumio focuses on containing cyberattacks before they become business disasters. Leveraging zero trust segmentation and dynamic policy response, they help enterprises mitigate ransomware spread and protect critical assets. While some chase shiny new features, Illumio reminds us that doing the basics right—like network hygiene and segmentation—is still the most effective strategy. Their advice? Don’t just prevent breaches—prepare to limit the blast radius when one hits.

Categories:
  • » Data Protection » Backup & Recovery
  • » Small World Big Data
  • » Cybersecurity
  • » Cybersecurity » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • illumio
  • zero
  • trust
  • ransomware
  • containment
  • lateral
  • movement
  • network
  • segmentation
  • incident
  • response
  • cyber
  • hygiene
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Illumio: Stop the Spread, Contain the Chaos

              Upcoming Webinar Calendar

              • 02/26/2026
                01:00 PM
                02/26/2026
                HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders
                https://www.truthinit.com/index.php/channel/1833/human-dialogue-examining-the-effects-of-owasps-top-ten-agentic-risks-on-builders-and-defenders/
              • 02/26/2026
                09:30 PM
                02/26/2026
                Strategies for Safeguarding Data in the AI Era via DSPM
                https://www.truthinit.com/index.php/channel/1827/strategies-for-safeguarding-data-in-the-ai-era-via-dspm/
              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-insights/
              • 03/05/2026
                01:00 PM
                03/05/2026
                "VMware Alternative" or "Private Cloud OS"?
                https://www.truthinit.com/index.php/channel/1834/vmware-alternative-or-private-cloud-os/
              • 03/11/2026
                01:00 PM
                03/11/2026
                AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets
                https://www.truthinit.com/index.php/channel/1838/ai-driven-endpoint-management-scale-it-operations-with-fewer-tools-faster-tickets/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk Through AI-Driven Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-driven-cyber-resilience/

              Upcoming Spotlight Events

              • Mar
                05

                "VMware Alternative" or "Private Cloud OS"?

                03/05/202601:00 PM ET
                • Mar
                  11

                  AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets

                  03/11/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Feb
                    26

                    HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders

                    02/26/202601:00 PM ET
                    • Feb
                      26

                      Strategies for Safeguarding Data in the AI Era via DSPM

                      02/26/202609:30 PM ET
                      • Mar
                        03

                        Energize Your Connections with Netskope and Presidio Insights

                        03/03/202601:00 PM ET
                        More events

                        Recent Spotlight Events

                        • Feb
                          19

                          The CISO Dilemma: Fostering Innovation & Security in the Age of AI

                          02/19/202601:00 PM ET
                          • Feb
                            03

                            Evolution of Cloud Adaptability and AI Performance

                            02/03/202601:00 PM ET
                            • Jan
                              27

                              AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                              01/27/202601:00 PM ET
                              More events

                              Recent Industry Events

                              • Feb
                                19

                                Real Talk w. IT Leaders: Top Trends in 2026

                                02/19/202604:00 PM ET
                                • Feb
                                  19

                                  Preparing for Tomorrow: Strategies to Enhance Your Resilience for the Future

                                  02/19/202610:00 AM ET
                                  • Feb
                                    10

                                    Transforming Secure Access through Netskope One Private Access

                                    02/10/202612:00 AM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version