Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Neil C. Hughes. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Neil C. Hughes or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The Real Meaning of Zero Trust with Its Creator

44:25
 
Share
 

Manage episode 497873771 series 3681138
Content provided by Neil C. Hughes. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Neil C. Hughes or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

What does it really mean to trust nothing and verify everything? In this first episode of The Business of Cybersecurity, Neil is joined by John Kindervag—the creator of the Zero Trust cybersecurity model for a conversation that redefines how we think about protecting digital systems.

John shares the untold story behind the creation of Zero Trust, from challenging traditional perimeter-based models to watching the concept grow into a global movement now embedded in national cybersecurity mandates. Far from being a buzzword, Zero Trust is presented here as a strategic framework that begins with a single protect surface and scales without disruption.

Together, Neil and John explore how Zero Trust is misunderstood, often mistaken for a product, and too often reduced to identity management. They break down the core five-step process for implementation, the importance of context over blind trust, and how cloud environments and AI are reshaping cybersecurity expectations.

But this conversation also carries a personal weight, as both Neil and John reflect on deeply moving experiences with childhood cancer—and how those journeys informed a new way to think about managing risk, or as John reframes it, managing danger.

This isn’t just a technical talk. It’s a story about questioning the status quo, staying adaptable in a rapidly evolving threat environment, and using strategy not assumptions to secure the systems businesses depend on.

Is your organization still relying on outdated models of trust? And what would it look like to build something truly resilient?

  continue reading

17 episodes

Artwork
iconShare
 
Manage episode 497873771 series 3681138
Content provided by Neil C. Hughes. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Neil C. Hughes or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

What does it really mean to trust nothing and verify everything? In this first episode of The Business of Cybersecurity, Neil is joined by John Kindervag—the creator of the Zero Trust cybersecurity model for a conversation that redefines how we think about protecting digital systems.

John shares the untold story behind the creation of Zero Trust, from challenging traditional perimeter-based models to watching the concept grow into a global movement now embedded in national cybersecurity mandates. Far from being a buzzword, Zero Trust is presented here as a strategic framework that begins with a single protect surface and scales without disruption.

Together, Neil and John explore how Zero Trust is misunderstood, often mistaken for a product, and too often reduced to identity management. They break down the core five-step process for implementation, the importance of context over blind trust, and how cloud environments and AI are reshaping cybersecurity expectations.

But this conversation also carries a personal weight, as both Neil and John reflect on deeply moving experiences with childhood cancer—and how those journeys informed a new way to think about managing risk, or as John reframes it, managing danger.

This isn’t just a technical talk. It’s a story about questioning the status quo, staying adaptable in a rapidly evolving threat environment, and using strategy not assumptions to secure the systems businesses depend on.

Is your organization still relying on outdated models of trust? And what would it look like to build something truly resilient?

  continue reading

17 episodes

همه قسمت ها

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play