Today, Zero Trust is a fuzzy term with more than a dozen different definitions. Any initial search for Zero Trust leads people to stumble upon technology associated with the concept, but this gives people the wrong impression and sets them off on the wrong foot in their adoption journey. Zero Trust is a concept and framework, not technology.
We are on a mission to give a stronger voice to practitioners and others who have been in these shoes, have begun adopting or implementing a Zero Trust strategy, and to share their experience and insight with peers while not influenced by vendor hype.
All content for Adopting Zero Trust is the property of Adopting Zero Trust and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Today, Zero Trust is a fuzzy term with more than a dozen different definitions. Any initial search for Zero Trust leads people to stumble upon technology associated with the concept, but this gives people the wrong impression and sets them off on the wrong foot in their adoption journey. Zero Trust is a concept and framework, not technology.
We are on a mission to give a stronger voice to practitioners and others who have been in these shoes, have begun adopting or implementing a Zero Trust strategy, and to share their experience and insight with peers while not influenced by vendor hype.
Predicting the year of cybersecurity ahead (minus regulations)
Adopting Zero Trust
1 hour 2 minutes 52 seconds
8 months ago
Predicting the year of cybersecurity ahead (minus regulations)
It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… there have been obvious impacts that have downstream effects. Regardless of regulatory changes, which we’ll cover as those impact our space, AZT brought together a few minds who have thoughts on the year ahead.
To properly kick off season four, we have the privilege of chatting with two wonderful guests:
Lawrence Pingree, VP of Technical Marketing at Dispersive, but you are more likely to know his name from his time at Gartner. However, he has a varied background ranging from CTO to security engineer, so don’t let that marketing line in his title fool you.
Oliver Plante, VP of Support at ThreatLocker, has around 15-20 years of IT under his belt. He also has seen a thing or two when it comes to implementing new cybersecurity strategies
03:21 Predictions for the Year Ahead
04:06 Zero Trust and Least Privilege
05:40 The Future of Cyber Defense
07:21 AI and Cybersecurity
08:41 Threat Intelligence and Preemptive Defense
09:50 Challenges and Innovations in Cybersecurity
14:23 The Role of AI in Cyber Attacks
26:18 Quantum Computing: Threat or Savior?
29:31 Passwordless Security: The Future
30:57 Challenges of Deepfake Technology and Passwordless Security
33:03 Blockchain and Its Applications in Security
35:33 Debate on Password Management Practices
38:03 User Responsibility and Security Automation
47:50 Government's Role in Cybersecurity
57:14 Future of Cybersecurity and Zero Trust
Adopting Zero Trust
Today, Zero Trust is a fuzzy term with more than a dozen different definitions. Any initial search for Zero Trust leads people to stumble upon technology associated with the concept, but this gives people the wrong impression and sets them off on the wrong foot in their adoption journey. Zero Trust is a concept and framework, not technology.
We are on a mission to give a stronger voice to practitioners and others who have been in these shoes, have begun adopting or implementing a Zero Trust strategy, and to share their experience and insight with peers while not influenced by vendor hype.