From Boardrooms to Battlefields: Zero Trust Speaks Cybersecurity’s Common Language
Recently, I was asked to meet with two high-ranking U.S. military generals to brief them on Zero Trust.
I was surprised to find that military leaders wanted to discuss Zero Trust. When I introduced the strategy, I never imagined that leaders at the highest levels of global government, business, and military would be interested in talking to me about cybersecurity strategy.
But I’ve found that Zero Trust conversations with leaders across boardrooms and battlefields aren’t uncommon. I think that says a lot about how the strategy transcends traditional boundaries, creating a common language that unites leaders and technical folks alike.
A Zero Trust strategy resonates with everyone
After over 10 years, a lot has been said about Zero Trust. And as the creator of Zero Trust, I can confidently say that a lot of it is misguided.
It’s been my mission to evangelize that Zero Trust isn’t a cybersecurity product or platform. It’s not a list that you can check off as you go. And it’s not a here-and-gone marketing buzzword.
Zero Trust is a strategy that helps organizations answer the most important question: How do we stop data breaches? It resonates with leadership at every level, yet it can be tactically implemented with off-the-shelf security tools. It gives strategic leaders and technical experts a common cybersecurity language.
The answer to cybersecurity’s “grand strategy”
One of my colleagues once said, “The biggest thing Zero Trust did was bring the concept of grand strategy into the world of cybersecurity.”
And she’s right. Cybersecurity used to be something only the IT department worried about. It was often an afterthought that didn’t make its way into an organization’s overarching strategy.
Now, it’s a boardroom conversation. Leaders at every level, from U.S. presidents to CEOs, are worried about the implications of the next breach. Zero Trust gives them a strategic solution to these security fears.
With Zero Trust, they get a strategic framework that:
- Aligns cybersecurity with the rest of the organization. Every part of an organization operates differently. Not everyone needs the same level of access. Zero Trust is about locking down privileges smartly — giving just the right amount where it's needed and no more.
- Builds a scalable, flexible security strategy. Leaders and auditors need flexibility and transparency. And infrastructure and security teams need a security architecture that’s agile. Zero Trust allows for growth and change without getting tangled in controls or complexity.
- Works for any and every organization. Zero Trust isn’t a one-size-fits-all strategy. It can be tailored to protect what matters most.
I think this strategic resonance is what drives Zero Trust. People are drawn to the concept because it defines a cybersecurity mission at the highest level.
Finding common ground in cybersecurity
I’ve spoken with folks around the world about Zero Trust, and the message is the same. They get it.
At its core, Zero Trust gives leaders a framework to secure their organizations without being overwhelmed by the technical details. It gives technical experts a roadmap for making that vision a reality. And it builds a common language around cybersecurity across the organization.
So next time I meet with generals or CEOs or maybe even you, I know we’re going to be speaking the same language. Not because we’re necessarily all experts in cybersecurity but because Zero Trust has given us a shared language and framework to think about security.
This week, The Zero Trust Hub features:
- Gary Barlet, federal CTO at Illumio, speaking with MES Computing on how Illumo's unique Zero Trust Segmentation platform simplifies microsegmentation.
- The first-ever Illumio World Tour starts in New York City on November 12. Register now to save your spot!
- This week's Monday Microsegment episode features all the cybersecurity news you need to stay ahead, from Illumio’s award-winning The Segment podcast.
John Kindervag
Chief Evangelist