Go offline with the Player FM app!
The Current and Future State of Zero Trust With Forrester’s David Holmes
Manage episode 409211103 series 3462572
Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust.
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.
Zero Trust is a concept, a strategy, a philosophy, and, for some poor souls, a solution you can buy (it’s not). Through our three seasons, we have heard about MVPs, learned from the godfather of Zero Trust, been aided by Dr Zero Trust, and even heard from current and former federal officials about their stance on the concept. However, we have yet to touch on the current an future state of Zero Trust, and for that, we look to Forrester Principal Research Analyst on Zero Trust, David Holmes.
Prior to joining Forrester, David spent a decade researching, writing, and speaking about cybersecurity topics for network and application security vendors. Before entering the cybersecurity space, he was a C/C++ software developer specializing in authentication and authorization, network protocols, and cryptography. So you could say he knows a thing or two about the subject at hand.
TL;DR
- Holmes explains that Zero Trust's core principles remain unchanged: all networks are untrusted, least privilege access is enforced, and everything is inspected and monitored.
- The COVID-19 pandemic has accelerated the adoption of Zero Trust as organizations were forced to work remotely and faced VPN overloads.
- David shares his perspective on the current and future state of Zero Trust, as well as areas he would like to see the vendor market seek to solve.
- The biggest example of successful Zero Trust implementation is Google. Since implementing Zero Trust, no major breaches have been reported.
- In addition to Google, there is a smaller organization that successfully implemented Zero Trust using existing tools, indicating that Zero Trust can be achieved without significant financial investment.
- However, achieving full Zero Trust is a journey rather than a destination, similar to cybersecurity itself. It's an ongoing process of adaptation and improvement.
56 episodes
Manage episode 409211103 series 3462572
Season 3, Episode 4: Forrester Principal Research Analyst on Zero Trust, David Holmes, shares his perspective on the current and future state of Zero Trust.
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.
Zero Trust is a concept, a strategy, a philosophy, and, for some poor souls, a solution you can buy (it’s not). Through our three seasons, we have heard about MVPs, learned from the godfather of Zero Trust, been aided by Dr Zero Trust, and even heard from current and former federal officials about their stance on the concept. However, we have yet to touch on the current an future state of Zero Trust, and for that, we look to Forrester Principal Research Analyst on Zero Trust, David Holmes.
Prior to joining Forrester, David spent a decade researching, writing, and speaking about cybersecurity topics for network and application security vendors. Before entering the cybersecurity space, he was a C/C++ software developer specializing in authentication and authorization, network protocols, and cryptography. So you could say he knows a thing or two about the subject at hand.
TL;DR
- Holmes explains that Zero Trust's core principles remain unchanged: all networks are untrusted, least privilege access is enforced, and everything is inspected and monitored.
- The COVID-19 pandemic has accelerated the adoption of Zero Trust as organizations were forced to work remotely and faced VPN overloads.
- David shares his perspective on the current and future state of Zero Trust, as well as areas he would like to see the vendor market seek to solve.
- The biggest example of successful Zero Trust implementation is Google. Since implementing Zero Trust, no major breaches have been reported.
- In addition to Google, there is a smaller organization that successfully implemented Zero Trust using existing tools, indicating that Zero Trust can be achieved without significant financial investment.
- However, achieving full Zero Trust is a journey rather than a destination, similar to cybersecurity itself. It's an ongoing process of adaptation and improvement.
56 episodes
All episodes
×
1 How Critical Infrastructure Leaders Are Rethinking Cybersecurity 44:32

1 Shadows Within Shadows: How AI is Challenging IT Teams 48:12

1 Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust 32:50

1 Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals 3:20

1 Predicting the year of cybersecurity ahead (minus regulations) 1:02:52

1 Kicking Off Season 4 of Adoption Zero Trust (AZT) 22:43

1 The key to growing a cybersecurity career are soft skills 50:38

1 Behind the scenes of cybersecurity media and reporting 1:04:53

1 GRC tool or spreadsheets, that is the question | GRC Uncensored Preview 43:13

1 Podcast Preview: GRC Uncensored and the commoditization of compliance 41:30

1 How to prepare your operations team for Zero Trust 46:17

1 Log4j Continues to act as Organizational Vulnerability 47:56

1 Overturning of Chevron Deference’s Impact on Cybersecurity Regulation 51:44

1 Applying Vulnerability Management to Zero Trust 45:43

1 The Unstoppable Phish: A Discussion with Vivek Ramachandran 26:31
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.