13 avsnitt • Längd: 35 min • Månadsvis
Zero Trust Journey is a podcast and webcast that dives into the real-world experiences of Zero Trust. In a world full of buzzwords and vendor hype, we cut through the noise with practical insights, real stories, and honest conversations with cybersecurity practitioners and leaders.Each 1-hour episode features engaging segments designed to inform and inspire:
Educational Segment: Research-backed insights into key Zero Trust concepts and strategies and/or Certificate of Competence in Zero Trust (CCZT) | CSA information.Guest Segment: Candid discussions with professionals who’ve implemented Zero Trust, sharing their challenges and successes.ZT News Riff: A quick, fun take on the latest Zero Trust news and trends.Available on your favorite podcast platforms and YouTube, Zero Trust Journey offers actionable advice and relatable experiences to help you navigate your Zero Trust path.
Grab your coffee, tune in, and join the journey—because real experiences make all the difference!
The podcast Zero Trust Journey is created by Victor Monga. The podcast and the artwork on this page are embedded on this page using the public podcast feed (RSS).
Welcome to I Zero Trust What You’re Saying – March 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.
Stay informed, stay secure, and as always, Zero Trust everything!
🔗 News Links:
👉 Learn more at: ztjourney.com
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
Host
Steve Turner (Linkedin)
Co-Host
Zach Pugh (LinkedIn)
Guest
Chase Cunningham, also known as Dr. Zero Trust (Linkedin)
Highlights:
Key Takeaways:
Dive into this unfiltered conversation with Chase Cunningham to get real-world insights and actionable strategies that cut through industry buzz and prepare you for the realities of cyber warfare.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
Host
Zach Pugh (https://www.linkedin.com/in/zachary-pugh/)
Co-Host
Victor Monga (https://www.linkedin.com/in/victorvirtual/)
Guest
Drinor Selmanaj (https://www.linkedin.com/in/drinor-selmanaj-5bb28185/)
Highlights:
Key Takeaways:
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
In this episode of Zero Trust Journey, host Zach Pugh talks with Nemi George, an experienced information security executive, about the practical realities of implementing Zero Trust in a busy organization—especially where patient care and time-sensitive workflows collide with security needs. Nemi shares real-world strategies for starting small with critical assets, streamlining multi-factor authentication, and addressing legacy systems without disrupting business operations. The discussion underscores how Zero Trust should enable the organization by prioritizing user experience, cultural alignment, and clear leadership support.
Highlights
Key Takeaways
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
In this episode of Zero Trust Journey, host Victor Monga is joined by Snehal Antani, CEO and co-founder of Horizon3.ai, to break down the complexities of Zero Trust and the practical steps organizations can take to reduce network reachability and minimize the blast radius of cyberattacks. Snehal shares insights from his career spanning Fortune 500 companies, the Department of Defense, and his current role as a cybersecurity innovator, emphasizing the importance of continuous security validation and understanding the difference between vulnerable and exploitable systems.
Snehal offers actionable advice on how to prioritize security efforts based on return on effort (ROE) and how organizations can shift their focus from simply buying tools to adopting methodical, measurable approaches to risk reduction. Whether you're starting your Zero Trust journey or refining your strategy, this episode delivers real-world lessons to help you build a resilient security program.
What You’ll Learn in This Episode:
Key Takeaways:
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
Welcome to I Zero Trust What You’re Saying – February 2025 Edition! In this episode, we break down the latest Zero Trust news, trends, and updates that matter to security practitioners. No hype—just real insights to help you navigate the evolving cybersecurity landscape.
Stay informed, stay secure, and as always, Zero Trust everything!
🔗 News Links:
--| https://executivegov.com/2024/12/nist-zero-trust-architecture-guidance-feedback/
--| https://securityboulevard.com/2024/12/making-zero-trust-architecture-achievable/
--| https://www.itpro.com/cloud/cloud-security/understanding-nis2-directives-the-role-of-sase-and-zero-trust
--| https://www.globenewswire.com/news-release/2024/12/05/2992083/0/en/Zscaler-Finds-Over-87-of-Cyberthreats-Hide-in-Encrypted-Traffic-Reinforcing-Need-For-Zero-Trust.html
--| https://www.zscaler.com/resources/industry-reports/threatlabz-encrypted-attacks-report.pdf
--| https://www.arnnet.com.au/article/3617743/home-affairs-opens-consultation-on-zero-trust-principles.html
--| https://federalnewsnetwork.com/cme-event/federal-executive-forum/dec-federal-executive-forum-zero-trust-strategies-in-government-progress-and-best-practices-2024/
--| https://www.microsoft.com/en-us/security/blog/2024/11/11/dod-zero-trust-strategy-proves-security-benchmark-years-ahead-of-schedule-with-microsoft-collaboration/
--| https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/outsourcing-and-procurement/cyber-supply-chains/choosing-secure-and-verifiable-technologies
👉 Learn more at: ztjourney.com
Disclaimer
The views and opinions expressed in this episode are those of the speakers and do not necessarily reflect the official policy or position of any affiliated organization. This content is provided for informational purposes only.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
In this episode of Zero Trust Journey, hosts Victor Monga and Steve are joined by Zach Pugh, a seasoned cybersecurity product manager, to explore why government agencies are leading the charge on Zero Trust initiatives—and how the private sector can catch up. They delve into overcoming cultural resistance, dissecting vendor myths, and understanding why even the humble web browser deserves a serious seat at the Zero Trust table.
Zach shares tactical advice from his hands-on experience, emphasizing how organizations can start small, focus on business goals, and avoid the common pitfalls of “one-size-fits-all” vendor solutions. Whether you’re mapping out your first Zero Trust strategy or fine-tuning an existing program, this conversation provides practical insights to help you succeed in today’s dynamic threat landscape.
What You’ll Learn in This Episode
Key Takeaways
Whether you’re a security leader or just beginning your Zero Trust journey, this episode provides practical insights to strengthen your strategy, reduce risk, and gain buy-in across your organization.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
In this episode of Zero Trust Journey, hosts Victor Monga and Zach Pugh sit down with Jose Barajas, Vice President of Global Sales Engineering at AttackIQ to explore what it truly takes to implement and sustain Zero Trust security beyond the buzzwords.
Jose shares first-hand insights from years of helping organizations validate their security controls, revealing the biggest misconceptions, common pitfalls, and the real challenges that teams face when moving Zero Trust from theory to practice. From breaking down resistance to change to securing executive buy-in, this episode delivers practical strategies for making Zero Trust work—no matter where you are in the journey.
What You’ll Learn in This Episode:
✔ The Validation Gap – Why 90% of organizations assume their Zero Trust controls work, but nearly half fail security testing.
✔ Beyond Compliance – How Zero Trust is a security strategy, not just a checkbox for regulations.
✔ Breaking Cultural Barriers – Overcoming resistance from teams who feel “Zero Trust means you don’t trust them.”
✔ Securing Executive Buy-In – “I've gotta find a way to position Zero Trust as a revenue driver or at least to offset the protection of assets in the business.”
✔ The Role of Continuous Testing – Why Zero Trust isn’t a one-and-done initiative, but an evolving process requiring ongoing validation.
Victor and Zach dive into real-world Zero Trust adoption stories, exposing the biggest roadblocks organizations face—including why many Zero Trust projects fail before they start. Jose shares actionable ways to validate security controls, iterate on implementations, and gain leadership support to drive Zero Trust forward.
Key Takeaways:
🔹 Zero Trust isn’t complicated—it’s just hard. Cultural shifts and executive mandates are critical for success.
🔹 Validation matters—if you don’t test security controls regularly, they likely aren’t working as intended.
🔹 Zero Trust isn’t about mistrust—it’s about verifying digital actions, not distrusting employees.
🔹 Align Zero Trust with business goals—position it as a risk-reducing, revenue-protecting strategy to gain leadership support.
🔹 Start small, iterate, and automate—Zero Trust isn’t all or nothing, it’s a process of continuous improvement.
Whether you’re a security leader or just beginning your Zero Trust journey, this episode provides practical insights to strengthen your strategy, reduce risk, and gain buy-in across your organization.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
In this episode of Zero Trust Journey, hosts Victor Monga and Steve Turner are joined by Zero Trust experts from Microsoft Clay Taylor and Tarek Dawoud to discuss how Zero Trust strategies can secure today’s expansive digital estates. They share insights from Microsoft’s Zero Trust Workshop and their collaboration with NIST, offering a practical guide for navigating the challenges of implementation.
Clay and Tarek reveal how organizations can move from overwhelmed to action-ready by breaking down silos, aligning teams, and leveraging practical tools. They emphasize that Zero Trust is not a product or a one-time fix—it’s a continuous journey of strengthening security and enabling business outcomes.
What You’ll Learn in This Episode:
Victor and Steve dive into the real-world obstacles organizations face, from navigating vendor hype to addressing misconceptions about Zero Trust. Clay and Tarek share how the pandemic accelerated adoption, why federal government initiatives are leading the charge, and how to overcome internal barriers to Zero Trust success.
Key Takeaways:
Whether you’re a security leader or new to Zero Trust, this episode offers actionable advice to strengthen your strategy, reduce risk, and navigate the complexities of today’s cybersecurity landscape.
Stay connected with Zero Trust Journey! Follow us on LinkedIn, subscribe on YouTube, and visit our website for exclusive content and resources to help advance your Zero Trust journey.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
In this episode of Zero Trust Journey, host Victor Monga is joined by Steve Turner, a former Forrester analyst and current Microsoft expert, to explore the realities of Zero Trust in today's evolving cybersecurity landscape. They tackle the myths, challenges, and strategies surrounding Zero Trust and provide actionable guidance to help organizations build effective architectures and align them with business goals.
From discussing why perimeter-based security models are no longer sufficient to exposing the "blinky box" marketing gimmicks of vendors, this episode offers a no-nonsense, practical approach to Zero Trust. Steve and Victor dive deep into the key elements of a Zero Trust strategy, emphasizing that it is not a product or quick fix but a framework to enhance organizational security by leveraging what you already have.
What You’ll Learn in This Episode:
Victor and Steve stress that Zero Trust is a journey, not a destination. It’s about taking inventory of your current security efforts, aligning them with core Zero Trust principles, and integrating them into a tailored architecture that supports your organization’s unique needs. They highlight the importance of a collaborative approach, where vendors become partners in building a seamless and transparent Zero Trust ecosystem, rather than pushing a one-size-fits-all solution.
Key Takeaways:
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
In this episode of Zero Trust Journey, host Victor Monga welcomes Jay Mar-Tang, Field CISO at Pantera, for a lively discussion about the real-world application of Zero Trust principles. Taking inspiration from Stone Cold Steve Austin’s mantra, “Don’t Trust Anybody,” they dive deep into the mindset shift needed to embrace Zero Trust as a framework and philosophy.
Through candid stories and real-world examples, Victor and Jay tackle some of the most pressing questions about Zero Trust:
This episode also emphasizes the importance of foundational security hygiene, such as multi-factor authentication and asset visibility, while addressing why focusing on business objectives is critical to Zero Trust's success.
Packed with actionable insights, expert advice, and even some nostalgic wrestling references, this episode is a must-listen for anyone navigating the complexities of modern cybersecurity. Tune in to discover how Zero Trust can empower your organization to reduce risk, protect critical assets, and evolve with confidence.
Ready to start—or refine—your Zero Trust journey? Join the conversation now!
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
In this episode of Zero Trust Journey, the hosts and guests from the Department of Defense (DOD) share their firsthand experiences with implementing Zero Trust in high-security environments. The discussion explores the challenges, insights, and real-world applications of adopting a Zero Trust security framework, focusing on the steps necessary to achieve a successful Zero Trust journey.
Key Topics Covered:
Takeaways and Key Lessons:
Listeners will learn that Zero Trust is an ongoing journey. The episode emphasizes continuous refinement, collaboration, and integrating Zero Trust principles into all business layers. The guests recommend starting small, assessing current security, and gradually building upon existing systems to ensure long-term success.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
Welcome to the first episode of the Zero Trust Journey Podcast, where host Victor Monga sits down with cybersecurity and compliance expert Erin Logue Smith to pull back the curtain on what Zero Trust truly means—and what it doesn’t. Zero Trust is everywhere in the industry’s vocabulary, but for many, it remains a buzzword heavy on aspiration and light on tangible guidance. If you’ve ever wondered why you can’t just buy a product labeled “Zero Trust” and call it a day, or if you’ve struggled to break through organizational barriers that resist meaningful security changes, this is the conversation you need to hear.
In this candid conversation, Victor and Erin discuss why Zero Trust can’t simply be achieved by purchasing a “blinky box” solution or ticking a compliance checkbox. It’s a philosophy that requires aligning technology, people, and processes. Rather than treating Zero Trust as an isolated project, they explore how it fits into a broader cybersecurity ecosystem: one that includes data backups, incident response plans, and a resilience strategy robust enough to withstand modern threats.
Erin offers unique insights from both a legal and a cybersecurity perspective, emphasizing that Zero Trust goes hand in hand with regulatory readiness and data protection. Whether you’re dealing with sensitive customer information, proprietary business data, or remote work environments, Zero Trust principles ensure every user and device must continuously prove their legitimacy.
Victor and Erin also address the cultural challenges organizations face. Implementing Zero Trust often means changing long-standing habits and confronting initial resistance from executives and staff accustomed to minimal authentication steps. Communication is key—explaining the “why” behind these measures helps foster buy-in, encouraging everyone to embrace a more secure posture rather than viewing it as an inconvenient hurdle.
For those just starting their journey, this episode provides practical guidance. Begin by focusing on fundamentals: understand your existing architecture, know where your data resides, and clarify your incident response approach. Then, piece by piece, incorporate tools and policies that support ongoing authentication, authorization, and validation. Partner with trusted advisors who can help you navigate complexity without losing sight of Zero Trust’s core principles.
Instead of racing toward a final endpoint, recognize Zero Trust as a continuous evolution. Over time, these efforts build a stronger, more agile security framework—one that protects your organization, meets regulatory expectations, and stands ready against future threats. It’s not about one product or a quick fix, but about committing to the journey and reaping the long-term rewards of genuine security transformation.
Stay connected with the Zero Trust Journey! Follow us on LinkedIn and subscribe to our YouTube for insights, discussions, and updates. Visit our website for exclusive content and to stay informed on the latest Zero Trust strategies.
Disclaimer: The views expressed are those of the speakers.
En liten tjänst av I'm With Friends. Finns även på engelska.