The Current and Future State of Zero Trust With Forrester’s David Holmes
Adopting Zero Trust28 Maalis 2024

The Current and Future State of Zero Trust With Forrester’s David Holmes

Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.

Zero Trust is a concept, a strategy, a philosophy, and, for some poor souls, a solution you can buy (it’s not). Through our three seasons, we have heard about MVPs, learned from the godfather of Zero Trust, been aided by Dr Zero Trust, and even heard from current and former federal officials about their stance on the concept. However, we have yet to touch on the current an future state of Zero Trust, and for that, we look to Forrester Principal Research Analyst on Zero Trust, David Holmes.

Prior to joining Forrester, David spent a decade researching, writing, and speaking about cybersecurity topics for network and application security vendors. Before entering the cybersecurity space, he was a C/C++ software developer specializing in authentication and authorization, network protocols, and cryptography. So you could say he knows a thing or two about the subject at hand.

TL;DR
  • Holmes explains that Zero Trust's core principles remain unchanged: all networks are untrusted, least privilege access is enforced, and everything is inspected and monitored.
  • The COVID-19 pandemic has accelerated the adoption of Zero Trust as organizations were forced to work remotely and faced VPN overloads.
  • David shares his perspective on the current and future state of Zero Trust, as well as areas he would like to see the vendor market seek to solve.
  • The biggest example of successful Zero Trust implementation is Google. Since implementing Zero Trust, no major breaches have been reported.
  • In addition to Google, there is a smaller organization that successfully implemented Zero Trust using existing tools, indicating that Zero Trust can be achieved without significant financial investment.
  • However, achieving full Zero Trust is a journey rather than a destination, similar to cybersecurity itself. It's an ongoing process of adaptation and improvement.

Hosted on Acast. See acast.com/privacy for more information.

Jaksot(58)

The Unstoppable Phish: A Discussion with Vivek Ramachandran

The Unstoppable Phish: A Discussion with Vivek Ramachandran

Season 3, Episode 10: Elliot chat’s with Vivek Ramachandran of SquareX about his approach to tackling the impossible: Social engineering.Catch this episode on YouTube, Apple, Spotify, Amazon, or Googl...

2 Heinä 202426min

Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall

Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall

Season 3, Episode 9: We chat with SonicWall’s Doug McKee about the top 5 threats targeting SMBs based on recent research.Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read ...

13 Kesä 202446min

Decoding Emerging Threats: MITRE, OWASP, and Threat Intel

Decoding Emerging Threats: MITRE, OWASP, and Threat Intel

Season 3, Episode 8: AZT and Dr. Zero Trust have a crossover episode where we chat with reps from MITRE and OWASP about challenges associated with emerging threats.Catch this episode on YouTube, Apple...

6 Kesä 202425min

Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata

Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata

Season 3, Episode 7: Though regulation impacting cybersecurity moves slow, when new laws are introduced it often puts significant strain on companies. Lacework’s Tim Chase and Drata’s Matt HIllary dis...

30 Touko 202430min

Ransomware: To Pay or Not to Pay?

Ransomware: To Pay or Not to Pay?

Season 3, Episode 6: Two seasoned cybersecurity professionals, Bryan Willett and Kris Lovejoy, shed light on the dilemma organizations face when hit by ransomware: Should they pay the ransom or not?Ca...

30 Huhti 202459min

Cyber Insurance: Sexy? No. Important? Critically yes.

Cyber Insurance: Sexy? No. Important? Critically yes.

Season 3, Episode 5: Cyber Insurance may not be the sexiest topic, but it’s an important piece of any mature cyber program. We chatted with a lawyer and a VC who share their perspective.Catch this epi...

11 Huhti 20241min

Canva's Kane Narraway on Building a Zero Trust MVP

Canva's Kane Narraway on Building a Zero Trust MVP

Season 3, Episode 3: Canva’s Head of Enterprise Security, Kane Narraway, discusses how to deploy a Zero Trust strategy in under a year.Catch this episode on YouTube, Apple, Spotify, Amazon, or Google....

7 Maalis 202446min