The Zero Trust Hub

Trends, insights, and resources for today's cybersecurity leaders. Updated weekly.

Subscribe on LinkedIn
Weekly Podcast

The Monday Microsegment

NEWS

The New Standard of Trust: How U.S. CMMC Guidelines Redefine Cyber Accountability

In MeriTalk, Gary Barlet calls the Pentagon’s new Cybersecurity Maturity Model Certification (CMMC) a long-overdue step toward national defense. With the November 10 rollout, cybersecurity becomes a baseline requirement for contractors, not just a compliance box to check.

NEWS

The Case for the Inevitable: Why Breach Containment Is Cybersecurity’s New Priority

In CIO, Raghu Nandakumara explains why containment — not prevention — is now the central focus of cybersecurity strategy. He highlights how microsegmentation and AI-driven security graphs help organizations isolate critical assets, reduce lateral movement, and stop breaches in real time.

Weekly Briefing

Zero Trust in Practice: What You Can Learn from Siemens’ 4-Year Journey

When Siemens kicked off its cloud-first transformation almost a decade ago, it sounded like a modern IT success story. It offered the organization more flexibility, more innovation, and more applications moving at the speed of business.

But behind the scenes, Thomas Mueller-Lynch and his team started to see the cracks forming — not in the cloud migration itself but in the security model meant to support it.

“More and more things went to the cloud which put many, many holes in our perimeter,” Thomas said. “The assumption that we can control the perimeter was simply not true anymore.”

It became clear that a traditional security model was actively putting the business at risk. To truly protect a cloud-first, hybrid enterprise, Siemens needed a new approach. Zero Trust emerged as the modern cyber strategy that made sense.

Thomas and other leaders brought the issue to the board and got approval for a new Zero Trust program as an immediate necessity. What followed was a four-year journey of strategic, often difficult, and ultimately transformational work to begin Siemens’ Zero Trust journey.

This is how Thomas and his team as Siemens built its Zero Trust program and what every security leader can learn from their process.

Year 1: Communicating with stakeholders and defining scope

In the first year, Thomas’s team didn’t deploy tech. They started with conversations.

“Everybody started talking about Zero Trust, but nobody understood what it really meant in a practical way to implement it,” he said.

That confusion became their starting point. If no one really understood Zero Trust, they’d make it their mission to change that.  

They went on what he called a “roadshow” across the business engaging IT, cybersecurity, and business leaders in honest conversations:

  • What are our dependencies?
  • What security policies do we need?
  • What does success actually look like?

The outcome was shared language, stakeholder alignment, and a scope that reflected both business reality and security priorities.  

Year 2: Preparing back-end systems

Year two was the hardest, and the least visible to the organization.

The team partnered with Microsoft and other key tech vendors to prepare Siemens’ architecture for a Zero Trust model. This meant back-end cleanup, policy enforcement frameworks, and identity integrations — all the behind-the-scenes groundwork that doesn’t get a lot of recognition.

“There were lots of back-end activities that didn’t result directly in risk reduction or tangible results,” Thomas said. “People started asking whether it still made sense or not.”

Thomas believes that this is the paradox of building a Zero Trust architecture. You often have to invest before you can show results. Thomas’s team didn’t waver on their goal, and they kept building Zero Trust.

Year 3: Tangible Zero Trust progress

By year three, the behind-the-scenes work started to pay off. The team showed significant progress in enabling application and factory security.

One of the most impactful milestones was the creation of a live, shareable Zero Trust dashboard. It gave senior stakeholders real-time visibility into the program’s scope and progress.

The dashboard helped prove value. It showed that Zero Trust wasn’t just an IT initiative but an organization-wide effort delivering real outcomes.

Year 4: Turn security into a business advantage

By the fourth year, Zero Trust was no longer just an internal project. The team was excited to help integrate Zero Trust security into Siemens’ products and make it a clear advantage for Siemens in the market.

“We believe the security of our products is a main selling point,” Thomas said. “Having Zero Trust-enabled products is a differentiation argument from our competitors.”

This powerful shift shows that the core of Zero Trust helps to build trust across leadership, customers, and the market.

If you’re still waiting to start Zero Trust, you’re already behind

Siemens operationalized Zero Trust across people, processes, and technology. And in doing so, they proved the Zero Trust journey is a process you build over time and throughout the entire organization.

Understanding that process is more urgent than ever. As enterprises accelerate cloud adoption, expand hybrid networks, and rely more on distributed systems, the security assumptions of the past no longer apply.  

As Thomas experienced at Siemens, the traditional network perimeter is gone. Waiting until “someday” to rethink security and start your Zero Trust journey is a risk no business can afford.

Siemens’ journey reminds us that if you want to build Zero Trust that lasts, it starts by investing early, aligning stakeholders, building the right architecture, and delivering clear outcomes.

STATSHOT

Why False Positives Persist

False positives aren’t just a nuisance — they’re a symptom of deeper issues. The top culprits? A lack of network or traffic visibility and tool sprawl, inadequate alert context, and outdated detection tools. These results paint a clear picture: without unified visibility and streamlined tooling, teams are stuck reacting to noise instead of real threats.

Zero Trust Resources

Report

2025 Global Cloud Detection and Response Report

Discover how 1,150 global cybersecurity leaders are tackling alert fatigue, blind spots, and lateral movement in the hybrid multi-cloud.

eBook

Strategies for DORA Compliance: Key Role of Zero Trust Segmentation

Is your organization ready for the January 2025 DORA deadline? Discover key strategies for cyber resilience and how Illumio Zero Trust Segmentation simplifies compliance.

GUIDE

Zero Trust Segmentation for Dummies

Breaches are inevitable, but the damage isn’t. Zero Trust Segmentation for Dummies simplifies how to stop threats from spreading, protecting your organization before they cause harm.

Introducing Illumio Insights:
AI Cloud Detection and Response

Get an early look at the first cloud detection and response (CDR) solution built on an AI security graph. Watch the on-demand webinar now.

Top contributors

John Kindervag

Chief Evangelist

Raghu Nandakumara

Vice President, Industry Strategy

Gary Barlet

Public Sector CTO

Trevor Dearing

Director of Critical Infrastructure Solutions

Michael Adjei

Director, Systems Engineering

Christer Swartz

Director of Industry Solutions

Aishwarya Ramani

Sr. Solutions Marketing Manager

Scott Smith

Analyst Relations Director