Zero Trust: From Revolution to Reality
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
-
Narrado por:
-
De:
Zero Trust is easy to say. Hard to execute.
Most organizations try to build it themselves.
Most underestimate the complexity.
Most get stuck in architecture diagrams instead of protecting what actually matters: data.
If execution determines success – should you really be doing it alone?
In this episode of Threat Talks, Lieuwe Jan Koning, Co-Founder and CTO at ON2IT Cybersecurity, sits down with Dr. Chase Cunningham, architect of the Zero Trust Extended (ZTX) framework, to break down what Zero Trust really requires in practice – not in theory.
Zero Trust isn’t a product. It’s not a checkbox.
It’s a decision about what you protect first – and how seriously you take execution.
If your job is to protect critical data without drowning in complexity, this episode will recalibrate your approach.
Because in the end, Zero Trust doesn’t fail on strategy.
It fails on execution.
Timestamps
00:00 – Introduction to Zero Trust Data Protection
00:50 – How Zero Trust Started at Forrester
03:19 – The ZTX Framework and Structuring Zero Trust
05:05 – Data at the Core of Zero Trust Data Protection
08:22 – Success Factors for Effective Zero Trust Data Protection
13:06 – Why Most Organizations Should Not DIY Zero Trust
15:36 – Breaches, Misconfiguration, and Market Reality
18:07 – How COVID Accelerated Zero Trust Adoption
19:25 – Closing Thoughts on Zero Trust Fundamentals
Key Topics Covered
· Where Zero Trust actually started – and how it evolved beyond network segmentation
· The shift from perimeter thinking to data-first protection
· Why most internal Zero Trust programs stall
· The operational discipline required to make Zero Trust work
Resources
· Threat Talks: https://threat-talks.com/
· ON2IT (Zero Trust as a Service): https://on2it.net/
· AMS-IX: https://www.ams-ix.net/ams
· Threat Talks playlist on Zero Trust: https://www.youtube.com/playlist?list=PLF5mXtEG4t5wigSRB3fpyFfMYp3l1Ux2g
· Zero Trust Dictionary: https://on2it.net/resources/zero-trust-dictionary/
Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.