Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Lamont Orange - Fostering a security-first culture with SASE adoption

By Maria Henriquez
5mw Lamont Orange
June 25, 2021

Lamont Orange, Netskope's Chief Information Security Officer (CISO), talks to Security magazine about how to foster a security-first culture with Security Access Service Edge (SASE) adoption.

 

Security: What is your background, current role, and responsibilities?

Lamont: I have more than 20 years of experience in the information security industry, having previously served as vice president of enterprise security for Charter Communications (now Spectrum) and as the senior manager for the security and technology services practice at Ernst & Young.

At Netskope, I am charged with providing Security Services that will protect our company and enable our business. My role, working with customers and partners within Netskope, also allows me to work closely with other security leaders, so I can fully understand their point of view and current challenges. Together we can demonstrate the modern approach to security.

Security: Why is maintaining optimal security efforts no longer just the sole responsibility of the company, but also that of its employees?

Lamont: Security is no longer confined to the four walls of an office building. Today's world is perimeter-less and revolves around the individual, regardless of where they are. Therefore, maintaining optimal security is no longer just the sole responsibility of the company, but also that of its employees.
 
As external and internal security threats are increasing, organizations must empower employees to take equal ownership over security and instill the concept that security belongs to everyone. This can be achieved by fostering a security-first culture where security needs are emphasized and maintained throughout the organization.
 
Security: How can companies foster a security-first culture? 

Lamont: Fostering a security-first culture must start with Zero Trust, enforcing the assumption that at all times, any user may be up to no good while ensuring data is always protected no matter where it needs to go.

Implementing such a security model means evaluating the company’s security capabilities and understanding which users require access to which resources. Security measures must prioritize protecting users and data, but also must adapt in real-time to keep pace with fast-changing requirements. This flexibility provides users with a security team the opportunity to lessen friction, and foster a smooth, productive work experience wherever they are, letting them access the data they need while using whatever tools necessary to remain successful at their jobs.

Security: Can you outline the benefits of SASE?

Lamont: The reasons for adopting a SASE model closely align with the benefits of cloud adoption. The cloud makes it possible for people and businesses to work more effectively, collaboratively, quickly, flexibly, and cost-efficiently - SASE makes that progress safe.

Implementing a SASE model will provide secure access regardless of where users, data, applications, or devices are located by unifying networking and security services in a cloud-delivered architecture to protect users, applications, and data everywhere. Given that users and applications are no longer on a corporate network, security measures can’t depend on conventional hardware appliances at the network edge. Instead, SASE promises to deliver the necessary networking and security as cloud-delivered services. Done properly, a SASE model eliminates perimeter-based appliances and legacy solutions. Instead of delivering the traffic to an appliance for security, users connect to the SASE cloud service to safely use applications and data with the consistent enforcement of security policy.

Security: What are some of the best practices for the adoption of this initiative?

Lamont:  When adopting SASE, organizations must evaluate their current security measures and determine exactly how they want them to grow. This means increasing awareness and visibility while placing core inspection points between users and apps.

By approaching SASE as a series of informed investments and implementations, each game-changing in its own right, organizations can deliver continuous, dramatic results as they steer themselves away from their parochial data center–centric worldview to one able to fully and securely reap the many benefits of the cloud.

At a minimum, organizations need thorough visibility into cloud user activity if they want to be confident in any new solution and to ensure an organization’s decision-makers are on board.

Whether it’s the result of shadow IT that has been knowingly ignored or a more deliberate process of business digitalization, old and outmoded security systems have been blind to these details.

By replacing old Secure Web Gateway (SWG) and similar appliances, organizations can finally have complete visibility into who’s using non-enterprise-grade applications and services and what enterprise data is being sent “out there” beyond their control.

KEYWORDS: Chief Information Security Officer (CISO) cyber security risk management zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with julian waits

    5 minutes with Julian Waits - How Security Operations Center leaders can create a culture of growth

    See More
  • 5 mins with John Scimone

    5 minutes with John Scimone, CSO, Dell Technologies, on how to navigate a culture of security convergence

    See More
  • People working together at long desks

    CISOs aren’t scapegoats: Fostering a security-first culture

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing