Today, you can’t talk about security without mentioning zero trust. What is it and why is it such a prevalent principle and practice that dominates cybersecurity speak whether you are talking about an enterprise network, the emerging edge cloud or the 5G network? John Kindervag, creator of Zero Trust, joins neXt Curve to recalibrate our understanding of his brainchild and to discuss why it has become an important part of our cybersecurity vernacular.
- Resetting our understanding of Zero Trust – what is it? – John shares the origin story of Zero Trust and the out-of-the-box thinking that led him to view security in a very different way. He also breaks down the common misconceptions of Zero Trust that have colored product marketing in the tech world.
- What are the criteria for applying Zero Trust to your network?– John lays down the approach for applying Zero Trust principles in your network. He also goes over the key mindset shift that an enterprise needs to make to properly adopt and support Zero Trust.
- How do you implement Zero Trust and maintain it? – We discuss the 5-phase approach that John developed during his time at Forrester that help organizations systematically build Zero Trust into their network and computing environments.
- What are the key capabilities needed for Zero Trust? – John shares his thoughts on the tools and organizational capabilities that make implementing Zero Trust easier and scalable.
Our reThink Media Center features the YouTube video podcast of this episode.