The Current and Future State of Zero Trust With Forrester’s David Holmes
Adopting Zero Trust28 Maalis 2024

The Current and Future State of Zero Trust With Forrester’s David Holmes

Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.

Zero Trust is a concept, a strategy, a philosophy, and, for some poor souls, a solution you can buy (it’s not). Through our three seasons, we have heard about MVPs, learned from the godfather of Zero Trust, been aided by Dr Zero Trust, and even heard from current and former federal officials about their stance on the concept. However, we have yet to touch on the current an future state of Zero Trust, and for that, we look to Forrester Principal Research Analyst on Zero Trust, David Holmes.

Prior to joining Forrester, David spent a decade researching, writing, and speaking about cybersecurity topics for network and application security vendors. Before entering the cybersecurity space, he was a C/C++ software developer specializing in authentication and authorization, network protocols, and cryptography. So you could say he knows a thing or two about the subject at hand.

TL;DR
  • Holmes explains that Zero Trust's core principles remain unchanged: all networks are untrusted, least privilege access is enforced, and everything is inspected and monitored.
  • The COVID-19 pandemic has accelerated the adoption of Zero Trust as organizations were forced to work remotely and faced VPN overloads.
  • David shares his perspective on the current and future state of Zero Trust, as well as areas he would like to see the vendor market seek to solve.
  • The biggest example of successful Zero Trust implementation is Google. Since implementing Zero Trust, no major breaches have been reported.
  • In addition to Google, there is a smaller organization that successfully implemented Zero Trust using existing tools, indicating that Zero Trust can be achieved without significant financial investment.
  • However, achieving full Zero Trust is a journey rather than a destination, similar to cybersecurity itself. It's an ongoing process of adaptation and improvement.

Hosted on Acast. See acast.com/privacy for more information.

Jaksot(58)

Adopting Zero Trust with J. R. Cunningham: The Moat Has Dried Up

Adopting Zero Trust with J. R. Cunningham: The Moat Has Dried Up

This week we chat with J. R. Cunningham, Chief Security Officer at Nuspire, and we dig into Zero Trust as a journey. Nuspire is a managed security service provider that provides support ranging from m...

20 Loka 202248min

Adopting Zero Trust With Maureen Rosado: Selling Zero Trust

Adopting Zero Trust With Maureen Rosado: Selling Zero Trust

This week we chat with Maureen Rosado, a Zero Trust Strategist for BT, who has an outstanding history of business development for enterprise companies like IBM and Microsoft. This week we break away f...

6 Loka 202249min

Adopting Zero Trust with Christine Owen: Searching For the Finish Line

Adopting Zero Trust with Christine Owen: Searching For the Finish Line

This week we chat with Christine Owen, Director at Guidehouse, and we dig into Zero Trust as an approach to harden your identity and access management strategy, her dislike of passwords, and phishing-...

22 Syys 202259min

Adopting Zero Trust with Lexmark’s Bryan Willett: Culture of Security

Adopting Zero Trust with Lexmark’s Bryan Willett: Culture of Security

This week we chat with Bryan Willett, Lexmark’s CISO, who has built a legacy over the past 25 years working for the global company. Starting from his early days as a firmware developer, transitioning ...

8 Syys 202249min

Adopting Zero Trust with Dom Glavach: Staffing Up

Adopting Zero Trust with Dom Glavach: Staffing Up

This week we chat with Dom Glavach, Chief Security Officer (CSO) of CyberSN (Cyber Security Network) and a security consultant, and we dig into Zero Trust as a journey, the delta between buzzwords and...

25 Elo 202241min

Adopting Zero Trust With Nicolas Chaillan: From Policy to DHS

Adopting Zero Trust With Nicolas Chaillan: From Policy to DHS

Nicolas Chaillan is an Entrepreneur who became a US citizen about six years ago, and immediately joined the DHS where he became the chief architect and special advisor for cyber, leading him to become...

11 Elo 202244min

Adopting Zero Trust with Ryan Alford: IoT Secured

Adopting Zero Trust with Ryan Alford: IoT Secured

This week we chat with Ryan Alford, Founder and CEO of Engineering Design Group (EDG), and we dig into how Zero Trust impacts the future of hardware, software, IoT, and access (both human and machine)...

27 Heinä 202247min

Adopting Zero Trust With Andrew Abel: Translating Zero Trust Into Business Concepts

Adopting Zero Trust With Andrew Abel: Translating Zero Trust Into Business Concepts

This week we chat with Andrew Abel, our defacto Zero Trust expert who is currently the EUC Cyber Security Strategy and Architecture Lead for an energy company out of Brisbane Australia.Andrew has been...

14 Heinä 202242min