Skip to content

Tech Insight: Zero Trust in a Trust-challenged World

Share:

Today, you can’t talk about security without mentioning zero trust. What is it and why is it such a prevalent principle and practice that dominates cybersecurity speak whether you are talking about an enterprise network, the emerging edge cloud or the 5G network? John Kindervag, creator of Zero Trust, joins neXt Curve to recalibrate our understanding of his brainchild and to discuss why it has become an important part of our cybersecurity vernacular.

neXt Curve is joined by John Kindervag, SVP of Cybersecurity Strategy at ON2IT to explore the following topics:

  • Resetting our understanding of Zero Trust – what is it? – John shares the origin story of Zero Trust and the out-of-the-box thinking that led him to view security in a very different way. He also breaks down the common misconceptions of Zero Trust that have colored product marketing in the tech world.
  • What are the criteria for applying Zero Trust to your network?– John lays down the approach for applying Zero Trust principles in your network. He also goes over the key mindset shift that an enterprise needs to make to properly adopt and support Zero Trust.
  • How do you implement Zero Trust and maintain it? – We discuss the 5-phase approach that John developed during his time at Forrester that help organizations systematically build Zero Trust into their network and computing environments.
  • What are the key capabilities needed for Zero Trust? – John shares his thoughts on the tools and organizational capabilities that make implementing Zero Trust easier and scalable.

Zero Trust Rethinking security
reThink Podcast featuring John Kindervag, SVP of Cybersecurity Strategy at ON2IT

Our reThink Media Center features the YouTube video podcast of this episode.

This material may not be copied, reproduced, or modified in whole or in part for any purpose except with express written permission or license from an authorized representative of neXt Curve. In addition to such written permission or license to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced.

If you would like to engage with a neXt Curve analyst on this topic, please:

If you would like to be notified of our latest research by email, please:

Related Content

Discover more from neXt Curve

Subscribe now to keep reading and get access to the full archive.

Continue reading

Subscribe to neXt Curve!

By subscribing to the neXt Curve site you will registered with our reThink research blog and have an opportunity to engage with one of the most vibrant and independent discussions on our digital future. As a subscriber, you will receive newly published research articles and content as well as invitations to exclusive events by mail.

By subscribing you acknowledge and accept the terms of neXt Curves privacy policy.

Request an Inquiry

Send us an email

Request a Briefing