
Zero Trust Journey
Zero Trust Journey isn’t about taking sides—it’s about real conversations, sharing research, and learning together. Our goal is to explore Zero Trust from every angle and help cybersecurity practitioners make sense of it in a practical, no-fluff way. And yes, we do love to chat about coffee and listen to the occasional dad joke along the way.
Here’s what we do:
- Conversations with Experts: We chat with subject matter experts who share their opinions, experiences, and Zero Trust journeys.
- Research and Product Insights: We explore Zero Trust products and solutions in the market that may fit into a Zero Trust architecture.
- A Zero Trust Architecture: We’re building and refining an ever-growing architecture focused solely on the needs of cybersecurity practitioners.
- CSA CCZT Study Group: We host a study group for the Cloud Security Alliance (CSA) Certificate of Competence in Zero Trust (CCZT).
If you’re a cybersecurity professional looking for honest discussions, practical insights, and tools that evolve with your Zero Trust strategy (plus the occasional coffee tip), Zero Trust Journey is for you. Join us!
Zero Trust Journey
Episode 26 – Centralized Policy, Multiple Enforcement Points
00:00 Introduction to Zero Trust and Anupam's Background
00:55 Evolving Perspectives on Zero Trust
03:04 Common Misconceptions in Zero Trust Implementation
05:32 Key Pillars of Zero Trust: Identity, Segmentation, and Control
08:59 Cultural Challenges in Adopting Zero Trust
11:29 The Role of Centralized Policy in Zero Trust
13:32 AI and Automation in Security
16:37 Future Security Challenges and the Role of AI
18:27 Adapting Zero Trust Principles for AI
In this episode, we unpack how true Zero Trust isn't about controlling everything in one box — it's about creating a single source of policy truth, and pushing that enforcement to where users, devices, and data live.
Guest: Anupam Upadhyaya (https://www.linkedin.com/in/anupamupadhyaya)
Host: Dr. Victor Monga (https://www.linkedin.com/in/victorvirtual)
Highlights:
--| Why Zero Trust and least privilege are not the same thing—and why that matters.
--| The three pillars every ZT program must get right: identity posture, segmentation, and security posture.
--| Why centralized policy is key, even when enforcement is distributed across users, devices, and apps.
--| How point solutions and disconnected consoles are the biggest blocker to Zero Trust success.
--| The role of AI in reducing false positives—and why human feedback still matters.
--| Future challenges: AI agents, faster ransomware, and the need to adapt ZT principles to emerging threats.
Another Zero Trust Journey episode packed with strategic clarity, operational insight, and real-world lessons from the front lines—minus the marketing fluff.
Subscribe to our LinkedIn to never miss news, updates, and quizzes to earn digital badges.
Disclaimer: The views expressed are those of the speakers.