Executive orders and guidance from leading organizations like the Cybersecurity and Infrastructure Security Agency (CISA) have made it clear: Zero Trust is the cybersecurity strategy for now and the future. The private sector is following suit with 78% of responding organizations planning to enhance their Zero Trust efforts, according to a study by Forrester. How should you proceed?
Jason Garbis, author of Zero Trust Security: An Enterprise Guide, and Jim Anthony, cybersecurity systems strategist, bring expert insights to this SecurityWeek on-demand webcast replay on “The Four Stages of Zero Trust Maturity”:
- Stage Zero: Identify where you are and where to start your Zero Trust journey
- Stage One: Put basic Zero Trust principles in place to show immediate value
- Stage Two: Leverage context and risk to enhance security posture
- Stage Three: Unlock the potential of adaptive Zero Trust
Watch the replay below to learn:
- Why you should detach from the Zero Trust security marketing hype to understand its overarching framework and true operational impact of securing connections for all users, devices and workloads
- Details on the four Zero Trust maturity stages and how your organization might interpret them based on your use cases
- How fully adopting Zero Trust security principles goes well beyond secure remote access to safeguarding all user-to-resources and resource-to-resource connections
Takeaways from the webinar
Also according to the Forrester survey cited above, most organizations are still early in their Zero Trust journey, working to develop a Zero Trust strategy and architecture (24%) or Zero Trust business strategy (23%). As you plan your Zero Trust security strategy, Jim and Jason have a few things to keep in mind:
- You don’t have to start from scratch. The good news is, unless you’re a startup company that hasn’t taken its first step yet, you can start your Zero Trust security journey with the tools you already have.
- Always have the end in mind: Beyond remote access, consider web apps, API integrations and all of the user-to-resource and resource-to-resource connections you will want to secure across your entire IT ecosystem as you build your Zero Trust security strategy.
- Café-style network is the way to go. This is quickly entering buzzword status, much like Zero Trust itself. Here’s how Jim explained it and why it’s a good strategy: The idea is that a user on a corporate device that is on-premises and plugged into the local area network has the same experience as if they were at a coffee shop. Corporate networks can be compromised and should therefore be secured at the same level we’d expect of remote users on home or public networks.
For most, the Zero Trust security journey starts with secure access. Sign up for the monthly ZTNA Table Talks live learning series to to see the power of Appgate SDP, an industry-leading Zero Trust Network Access solution, in action or visit www.appgate.com/sdp to learn more.