Zero Trust Journey
Zero Trust Journey isn’t about taking sides—it’s about real conversations, sharing research, and learning together. Our goal is to explore Zero Trust from every angle and help cybersecurity practitioners make sense of it in a practical, no-fluff way. And yes, we do love to chat about coffee and listen to the occasional dad joke along the way.
Here’s what we do:
- Conversations with Experts: We chat with subject matter experts who share their opinions, experiences, and Zero Trust journeys.
- Research and Product Insights: We explore Zero Trust products and solutions in the market that may fit into a Zero Trust architecture.
- A Zero Trust Architecture: We’re building and refining an ever-growing architecture focused solely on the needs of cybersecurity practitioners.
- CSA CCZT Study Group: We host a study group for the Cloud Security Alliance (CSA) Certificate of Competence in Zero Trust (CCZT).
If you’re a cybersecurity professional looking for honest discussions, practical insights, and tools that evolve with your Zero Trust strategy (plus the occasional coffee tip), Zero Trust Journey is for you. Join us!
Zero Trust Journey
Latest Episodes
Episode 46: Navigating Third-Party Risk and Continuous Monitoring
In this episode, host Tiernan O'Malley sits down with Rachel Curran, GRC practitioner and founder of Locktivity, to unpack th...
Episode 45: From the Courtroom to the Boardroom: Cyber Resilience & Executive Accountability
In this episode of the Zero Trust Journey, Dr. Victor Monga sits down with Erin Logue Smith, leader of Governance, Risk, and Cyber Strategy at World Wide Technology (WWT).We div...
Episode 44: Stop Punishing, Start Rewarding: Mastering the P.A.R. Method for Phishing Defense
In this episode of the Zero Trust Journey, Dr. Victor Monga sits down with Craig Taylor, former CISO at JP Morgan Chase and Vistapri...
Episode 43: Are You Talking to AI? Deepfakes, GANs, and the AI Security Menu
We dive deep into the dark side of Generative AI, exploring how attackers are leveraging Generative Adversarial Networks (GANs) to bypass authentication, and why defining "AI Security" requires much more than just a buzzword.What You’ll...