Zero Trust Journey

Episode 26 – Centralized Policy, Multiple Enforcement Points

Victor Monga Season 1 Episode 26

00:00 Introduction to Zero Trust and Anupam's Background
00:55 Evolving Perspectives on Zero Trust
03:04 Common Misconceptions in Zero Trust Implementation
05:32 Key Pillars of Zero Trust: Identity, Segmentation, and Control
08:59 Cultural Challenges in Adopting Zero Trust
11:29 The Role of Centralized Policy in Zero Trust
13:32 AI and Automation in Security
16:37 Future Security Challenges and the Role of AI
18:27 Adapting Zero Trust Principles for AI

In this episode, we unpack how true Zero Trust isn't about controlling everything in one box — it's about creating a single source of policy truth, and pushing that enforcement to where users, devices, and data live.

Guest: Anupam Upadhyaya (https://www.linkedin.com/in/anupamupadhyaya)
Host: Dr. Victor Monga (https://www.linkedin.com/in/victorvirtual)

Highlights:
--| Why Zero Trust and least privilege are not the same thing—and why that matters.
--| The three pillars every ZT program must get right: identity posture, segmentation, and security posture.
--| Why centralized policy is key, even when enforcement is distributed across users, devices, and apps.
--| How point solutions and disconnected consoles are the biggest blocker to Zero Trust success.
--| The role of AI in reducing false positives—and why human feedback still matters.
--| Future challenges: AI agents, faster ransomware, and the need to adapt ZT principles to emerging threats.

Another Zero Trust Journey episode packed with strategic clarity, operational insight, and real-world lessons from the front lines—minus the marketing fluff.

Subscribe to our LinkedIn to never miss news, updates, and quizzes to earn digital badges.

Disclaimer: The views expressed are those of the speakers.

People on this episode