
Zero Trust Journey
Zero Trust Journey isn’t about taking sides—it’s about real conversations, sharing research, and learning together. Our goal is to explore Zero Trust from every angle and help cybersecurity practitioners make sense of it in a practical, no-fluff way. And yes, we do love to chat about coffee and listen to the occasional dad joke along the way.
Here’s what we do:
- Conversations with Experts: We chat with subject matter experts who share their opinions, experiences, and Zero Trust journeys.
- Research and Product Insights: We explore Zero Trust products and solutions in the market that may fit into a Zero Trust architecture.
- A Zero Trust Architecture: We’re building and refining an ever-growing architecture focused solely on the needs of cybersecurity practitioners.
- CSA CCZT Study Group: We host a study group for the Cloud Security Alliance (CSA) Certificate of Competence in Zero Trust (CCZT).
If you’re a cybersecurity professional looking for honest discussions, practical insights, and tools that evolve with your Zero Trust strategy (plus the occasional coffee tip), Zero Trust Journey is for you. Join us!
Zero Trust Journey
Episode 9: How do I reduce network reachability?
In this episode of Zero Trust Journey, host Victor Monga is joined by Snehal Antani, CEO and co-founder of Horizon3.ai, to break down the complexities of Zero Trust and the practical steps organizations can take to reduce network reachability and minimize the blast radius of cyberattacks. Snehal shares insights from his career spanning Fortune 500 companies, the Department of Defense, and his current role as a cybersecurity innovator, emphasizing the importance of continuous security validation and understanding the difference between vulnerable and exploitable systems.
Snehal offers actionable advice on how to prioritize security efforts based on return on effort (ROE) and how organizations can shift their focus from simply buying tools to adopting methodical, measurable approaches to risk reduction. Whether you're starting your Zero Trust journey or refining your strategy, this episode delivers real-world lessons to help you build a resilient security program.
What You’ll Learn in This Episode:
- Vulnerable vs. Exploitable: Why understanding this difference is crucial for smart security decisions.
- Reducing Reachability: How limiting network, credential, and device reachability minimizes risk.
- Return on Effort (ROE): Prioritizing high-impact actions that deliver maximum risk reduction with minimal effort.
- Continuous Security Validation: Why regular pen testing is vital to understanding your exploitable attack surface.
- Zero Trust as an Evolution: How Zero Trust is an evolution of existing security practices—not a product or one-size-fits-all solution.
Key Takeaways:
- Start with Reachability: Focus on reducing network, credential, and device reachability as a foundation for Zero Trust.
- Continuous Validation Matters: Regular testing ensures your controls are effective over time.
- Prioritize High-Impact Fixes: Maximize your return on effort by focusing on what reduces the most risk with the least effort.
- Cultural Shifts Are Critical: Successful Zero Trust requires aligning technology, processes, and people.
- Measure and Evolve: Zero Trust is a continuous journey—track progress and adapt as needed.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.