
Zero Trust Journey
Zero Trust Journey isn’t about taking sides—it’s about real conversations, sharing research, and learning together. Our goal is to explore Zero Trust from every angle and help cybersecurity practitioners make sense of it in a practical, no-fluff way. And yes, we do love to chat about coffee and listen to the occasional dad joke along the way.
Here’s what we do:
- Conversations with Experts: We chat with subject matter experts who share their opinions, experiences, and Zero Trust journeys.
- Research and Product Insights: We explore Zero Trust products and solutions in the market that may fit into a Zero Trust architecture.
- A Zero Trust Architecture: We’re building and refining an ever-growing architecture focused solely on the needs of cybersecurity practitioners.
- CSA CCZT Study Group: We host a study group for the Cloud Security Alliance (CSA) Certificate of Competence in Zero Trust (CCZT).
If you’re a cybersecurity professional looking for honest discussions, practical insights, and tools that evolve with your Zero Trust strategy (plus the occasional coffee tip), Zero Trust Journey is for you. Join us!
Zero Trust Journey
Episode 12: There's no Zero Trust certified product
Host
Steve Turner (Linkedin)
Co-Host
Zach Pugh (LinkedIn)
Guest
Chase Cunningham, also known as Dr. Zero Trust (Linkedin)
Highlights:
- No Zero Trust Certified Product: Chase debunks the myth of a one-size-fits-all, certified solution—exposing vendor hype and unrealistic promises.
- Red Teaming as the Foundation: Learn why actionable red team assessments are critical for uncovering vulnerabilities and accelerating your security journey.
- Simplifying Micro Segmentation: Discover how modern policy engines and ZTNA are transforming a once complex concept into practical, scalable security measures.
- Small Business Cybersecurity: Understand why every organization—regardless of size—is a target, and explore budget-friendly, high-impact strategies.
- Portfolio Over Platform: Explore the benefits of integrated, API-enabled best-of-breed solutions versus monolithic vendor platforms.
Key Takeaways:
- Operational Over Compliance: A real Zero Trust strategy focuses on continuous, threat-based validation rather than merely ticking compliance checklists.
- Red Teaming Delivers ROI: Proactive testing and real-world assessments not only expose gaps but can also recover budgets tied up in redundant security solutions.
- Practical Strategies for Every Business: From centralized identity management to optimized asset inventories, start small and build a resilient security posture over time.
- Debunking Vendor Myths: With no certified Zero Trust product on the market, focus on proven operational tactics rather than buzzwords.
- Cyber Warfare Awareness: Recognize that in today’s digital battlefield, every asset—from your enterprise network to IoT devices—is valuable to adversaries, making proactive defense a must.
Dive into this unfiltered conversation with Chase Cunningham to get real-world insights and actionable strategies that cut through industry buzz and prepare you for the realities of cyber warfare.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.