Saturday, April 19, 2025

NOV CIO fused AI and Zero Belief to slash threats by 35x


Be a part of our day by day and weekly newsletters for the newest updates and unique content material on industry-leading AI protection. Study Extra


Nationwide Oilwell Varco (NOV) is present process a sweeping cybersecurity transformation underneath CIO Alex Philips, embracing a Zero Belief structure, strengthening id defenses and infusing AI into safety operations. Whereas the journey will not be full, the outcomes, by all accounts, are dramatic – a 35-fold drop in safety occasions, the elimination of malware-related PC reimaging and thousands and thousands saved by scrapping legacy “equipment hell” {hardware}.

VentureBeat just lately sat down (just about) for this in-depth interview the place Philips particulars how NOV achieved these outcomes with Zscaler’s Zero Belief platform, aggressive id protections and a generative AI “co-worker” for its safety staff.

He additionally shares how he retains NOV’s board engaged on cyber danger amid a worldwide risk panorama the place 79% of assaults to achieve preliminary entry are malware-free, and adversaries can transfer from breach to interrupt out in as little as 51 seconds.

Beneath are excerpts of Philips’ latest interview with VentureBeat:

VentureBeat: Alex, NOV went “all in” on Zero Belief a variety of years in the past – what have been the standout beneficial properties?

Alex Philips: After we began, we have been a conventional castle-and-moat mannequin that wasn’t maintaining. We didn’t know what Zero Belief was, we simply knew that we would have liked id and conditional entry on the core of every part. Our journey started by adopting an identity-driven structure on Zscaler’s Zero Belief Alternate and it modified every part. Our visibility and safety protection dramatically elevated whereas concurrently experiencing a 35x discount within the variety of safety incidents. Earlier than, our staff was chasing 1000’s of malware incidents; now, it’s a tiny fraction of that. We additionally went from reimaging about 100 malware-infected machines every month to just about zero now. That’s saved a substantial quantity of money and time. And because the answer is cloud-based, Equipment hell is gone, as I prefer to say.

The zero belief strategy now offers 27,500 NOV customers and third events policy-based entry to 1000’s of inside purposes, all with out exposing these apps on to the web.

We have been then in a position to take an interim step and re-architect our community to benefit from internet-based connectivity vs. legacy costly MPLS. “On common, we elevated velocity by 10–20x, lowered latency to vital SaaS apps, and slashed price by over 4x… Annualized financial savings [from network changes] have already achieved over $6.5M,” Philips has famous of the challenge.

VB: How did shifting to zero belief really scale back the safety noise by such an unlimited issue?

Philips: An enormous motive is that our web site visitors now goes via a Safety Service Edge (SSE) with full SSL inspection, sandboxing, and knowledge loss prevention. Zscaler friends instantly with Microsoft, so Workplace 365 site visitors obtained quicker and safer – customers stopped making an attempt to bypass controls as a result of efficiency improved. After being denied SSL inspection with on-prem gear, we lastly obtained authorized approval to decrypt SSL site visitors because the cloud proxy doesn’t give NOV entry to spy on the information itself. Meaning malware hiding in encrypted streams began getting caught earlier than hitting endpoints. Briefly, we shrunk the assault floor and let good site visitors circulation freely. Fewer threats in meant fewer alerts general.

John McLeod, NOV’s CISO, concurred that the “outdated community perimeter mannequin doesn’t work in a hybrid world” and that an identity-centric cloud safety stack was wanted. By routing all enterprise site visitors via cloud safety layers (and even isolating dangerous internet periods through instruments like Zscaler’s Zero Belief Browser), NOV dramatically minimize down intrusion makes an attempt. This complete inspection functionality is what enabled NOV to identify and cease threats that beforehand slipped via, slashing incident volumes by 35x.

VB: Have been there any unexpected advantages to adopting Zero Belief you didn’t initially count on?

Alex Philips: Sure, our customers really most popular the cloud-based Zero Belief expertise over legacy VPN purchasers, so adoption was easy and gave us unprecedented agility for mobility, acquisitions, and even what we prefer to name “Black Swan Occasions”. For instance, when COVID-19 hit, NOV was already ready! I instructed my management staff if all 27,500 of our customers wanted to work remotely, our IT methods may deal with it. My management was surprised and our firm stored transferring ahead with out lacking a beat.

VB: Identification-based assaults are on the rise – you’ve talked about staggering stats about credential theft. How is NOV fortifying id and entry administration?

Philips: Attackers understand it’s typically simpler to log in with stolen credentials than to drop malware. In reality, 79% of assaults to achieve preliminary entry in 2024 have been malware-free, counting on stolen credentials, AI-driven phishing, and deepfake scams, in line with latest risk stories. One in three cloud intrusions final 12 months concerned legitimate credentials. We’ve tightened id insurance policies to make these ways more durable.

For instance, we built-in our Zscaler platform with Okta for id and conditional entry checks. Our conditional entry insurance policies confirm units have our SentinelOne antivirus agent working earlier than granting entry, including an additional posture verify. We’ve additionally drastically restricted who can carry out password or MFA resets. No single admin ought to be capable of bypass authentication controls alone. This separation of duties prevents an insider or compromised account from merely turning off our protections.

VB: You talked about discovering a spot even after disabling a person’s account. Are you able to clarify?

Philips: We found that should you detect and disable a compromised person’s account, the attacker’s session tokens would possibly nonetheless be lively. It isn’t sufficient to reset passwords; it’s important to revoke session tokens to really kick out an intruder. We’re partnering with a startup to create close to real-time token invalidation options for our mostly used sources. Primarily, we need to make a stolen token ineffective inside seconds. A Zero Belief structure helps as a result of every part is re-authenticated via a proxy or id supplier, giving us a single choke level to cancel tokens globally. That approach, even when an attacker grabs a VPN cookie or cloud session, they will’t transfer laterally as a result of we’ll kill that token quick.

VB: How else are you securing identities at NOV?

Philips: We implement multi-factor authentication (MFA) nearly in every single place and monitor for irregular entry patterns. Okta, Zscaler, and SentinelOne collectively type an identity-driven safety perimeter the place every login and gadget posture is constantly verified. Even when somebody steals a person password, they nonetheless face gadget checks, MFA challenges, conditional entry guidelines, and the chance of on the spot session revocation if something appears off. Resetting a password isn’t sufficient anymore — we should revoke session tokens immediately to cease lateral motion. That philosophy underpins NOV’s id risk protection technique.

VB: You’ve additionally been an early adopter of AI in cybersecurity. How is NOV leveraging AI and generative fashions within the SOC?

Philips: We’ve got a comparatively small safety staff for our world footprint, so we should work smarter. One strategy is bringing AI “co-workers” into our safety operations middle (SOC). We partnered with SentinelOne and began utilizing their AI safety analyst instrument—an AI that may write and run queries throughout our logs at machine velocity. It’s been a sport changer, permitting analysts to ask questions in plain English and get solutions in seconds. As an alternative of manually crafting SQL queries, the AI suggests the following question and even auto-generates a report, which has dropped our imply time to reply.

We’ve seen success tales the place risk hunts are carried out as much as 80% quicker utilizing AI assistants. Microsoft’s personal knowledge reveals that including generative AI can scale back incident imply time to decision by 30%. Past vendor instruments, we’re additionally experimenting with inside AI bots for operational analytics, utilizing OpenAI foundational AI fashions to assist non-technical workers shortly question knowledge. After all, we’ve knowledge safety guardrails in place so these AI options don’t leak delicate info.

VB: Cybersecurity is not simply an IT challenge. How do you have interaction NOV’s board and executives on cyber danger?

Philips: I made it a precedence to deliver our board of administrators alongside on our cyber journey. They don’t want the deep technical trivia, however they do want to grasp our danger posture. With generative AI exploding, for instance, I briefed them on each the benefits and dangers early on. That schooling helps once I suggest controls to stop knowledge leaks—there’s already alignment on why it’s essential.

The board views cybersecurity as a core enterprise danger now. They’re briefed on it at each assembly, not simply yearly. We’ve even run tabletop workout routines with them to point out how an assault would play out, turning summary threats into tangible choice factors. That results in stronger top-down help.

I make it some extent to always reinforce the fact of cyber danger. Even with thousands and thousands invested in our cybersecurity program, the chance isn’t absolutely eradicated. It’s not if we can have an incident, however when.

VB: Any ultimate recommendation, primarily based on NOV’s journey, for different CIOs and CISOs on the market?

Philips: First, acknowledge that safety transformation and digital transformation go hand in hand. We couldn’t have moved to the cloud or enabled distant work so successfully with out Zero Belief, and the enterprise price financial savings helped fund safety enhancements. It actually was a “win, win, win.”

Second, concentrate on the separation of duties in id and entry. Nobody individual ought to be capable of undermine your safety controls—myself included. Small course of adjustments like requiring two individuals to vary MFA for an exec or extremely privileged IT workers, can thwart malicious insiders, errors, and attackers.

Lastly, embrace AI rigorously however proactively. AI is already a actuality on the attacker aspect. A well-implemented AI assistant can multiply your staff’s protection, however you have to handle the dangers of knowledge leakage or inaccurate fashions. Be sure that to merge AI output together with your staff’s talent to create an AI-infused “brAIn”.

We all know the threats preserve evolving, however with zero belief, sturdy id safety and now AI on our aspect, it helps give us a preventing likelihood.


Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles