
Zero Trust Journey
Zero Trust Journey isn’t about taking sides—it’s about real conversations, sharing research, and learning together. Our goal is to explore Zero Trust from every angle and help cybersecurity practitioners make sense of it in a practical, no-fluff way. And yes, we do love to chat about coffee and listen to the occasional dad joke along the way.
Here’s what we do:
- Conversations with Experts: We chat with subject matter experts who share their opinions, experiences, and Zero Trust journeys.
- Research and Product Insights: We explore Zero Trust products and solutions in the market that may fit into a Zero Trust architecture.
- A Zero Trust Architecture: We’re building and refining an ever-growing architecture focused solely on the needs of cybersecurity practitioners.
- CSA CCZT Study Group: We host a study group for the Cloud Security Alliance (CSA) Certificate of Competence in Zero Trust (CCZT).
If you’re a cybersecurity professional looking for honest discussions, practical insights, and tools that evolve with your Zero Trust strategy (plus the occasional coffee tip), Zero Trust Journey is for you. Join us!
Zero Trust Journey
Episode 22: Super Users, Super Endpoints: Securing IT, OT, IoT in a Zero Trust World
Guest: Ben Tyminski
Host: Dr. Victor Monga
Co-host: Steve Turner
In this episode, the hosts are joined by Ben Tyminski, a security architect whose hands-on experience spans from finance to media, and from traditional endpoints to the ever-expanding universe of OT and IoT. Ben breaks down why “endpoint” is a moving target in today’s Zero Trust landscape—covering everything from laptops and servers to containers, appliances, and industrial controls. If you think endpoint security is just about laptops, think again.
Highlights:
--| The evolution of endpoints: why they now include OT, IoT, containers, and even Fargate.
--| Asset management and device posture: what’s actually possible in a hybrid, always-changing environment.
--| Microsegmentation, host firewalls, and how real-world Zero Trust controls get deployed.
--| Navigating the tension between super user/admin flexibility and organizational risk.
--| Cross-industry lessons learned: why working closely with help desk and SOC unlocks smarter security.
Another candid “Geek Show” discussion with technical deep-dives and real stories from the front lines of Zero Trust transformation.
Subscribe to our LinkedIn to never miss news, updates, and quizzes to earn digital badges.
Disclaimer: The views expressed are those of the speakers.