
Zero Trust Journey
Zero Trust Journey isn’t about taking sides—it’s about real conversations, sharing research, and learning together. Our goal is to explore Zero Trust from every angle and help cybersecurity practitioners make sense of it in a practical, no-fluff way. And yes, we do love to chat about coffee and listen to the occasional dad joke along the way.
Here’s what we do:
- Conversations with Experts: We chat with subject matter experts who share their opinions, experiences, and Zero Trust journeys.
- Research and Product Insights: We explore Zero Trust products and solutions in the market that may fit into a Zero Trust architecture.
- A Zero Trust Architecture: We’re building and refining an ever-growing architecture focused solely on the needs of cybersecurity practitioners.
- CSA CCZT Study Group: We host a study group for the Cloud Security Alliance (CSA) Certificate of Competence in Zero Trust (CCZT).
If you’re a cybersecurity professional looking for honest discussions, practical insights, and tools that evolve with your Zero Trust strategy (plus the occasional coffee tip), Zero Trust Journey is for you. Join us!
Zero Trust Journey
Episode 21: Prototype your Zero Trust solution
Guest: https://www.linkedin.com/in/stahltom/
Host: https://www.linkedin.com/in/victorvirtual
Co-host: https://www.linkedin.com/in/beingageek/
In this episode, the hosts are joined by Tom Stahl, a seasoned Senior Solutions Architect supporting end-user computing in one of the top six U.S. banks. Tom brings a wealth of frontline experience from the trenches of implementing Zero Trust—from mobile to desktop, from networking to identity. If you're an engineer, architect, or admin who's ever been told to “go implement Zero Trust,” this episode is your playbook.
Highlights:
--| Why enterprise mobility was Zero Trust before Zero Trust was cool.
--| Building strong internal and vendor relationships as the key to implementation success.
--| Conditional Access, device compliance, and identity: how to align these critical pieces.
--| Certificates: useful until they’re not—why PKI planning still matters.
--| Tactical advice for prototyping, passwordless, and building your Zero Trust baseline.
This episode kicks off our “Field Stories” series—real-world, technical deep-dives from practitioners who’ve had to make Zero Trust work under real constraints.
Subscribe to our LinkedIn to never miss news, updates, and quizzes to earn digital badges.
Disclaimer: The views expressed are those of the speakers.