Zero Trust Journey
Zero Trust Journey isn’t about taking sides—it’s about real conversations, sharing research, and learning together. Our goal is to explore Zero Trust from every angle and help cybersecurity practitioners make sense of it in a practical, no-fluff way. And yes, we do love to chat about coffee and listen to the occasional dad joke along the way.
Here’s what we do:
- Conversations with Experts: We chat with subject matter experts who share their opinions, experiences, and Zero Trust journeys.
- Research and Product Insights: We explore Zero Trust products and solutions in the market that may fit into a Zero Trust architecture.
- A Zero Trust Architecture: We’re building and refining an ever-growing architecture focused solely on the needs of cybersecurity practitioners.
- CSA CCZT Study Group: We host a study group for the Cloud Security Alliance (CSA) Certificate of Competence in Zero Trust (CCZT).
If you’re a cybersecurity professional looking for honest discussions, practical insights, and tools that evolve with your Zero Trust strategy (plus the occasional coffee tip), Zero Trust Journey is for you. Join us!
Zero Trust Journey
Episode 38: Bridging the Cybersecurity Effectiveness Gap
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
"We don’t have a tools problem in cybersecurity anymore. We have an effectiveness problem."
In this episode of the Zero Trust Journey, Dr. Victor Monga sits down with Snehal Antani, CEO and Co-Founder of Horizon3.ai and former CTO at the US Department of Defense. Snehal reveals the shocking data gathered from over 200,000 autonomous pen tests: why enterprises spend $18 billion on endpoint security yet continue to see breaches rise.
▶ IN THIS EPISODE, WE COVER:
▶ The 1-in-14,000 Risk: How a single misconfigured agent led to a full domain compromise.
▶ The "Big 4" EDR Reality Check: Snehal breaks down out-of-the-box effectiveness for CrowdStrike, SentinelOne, Sophos, and Windows Defender.
▶ Credential Pivoting vs. Malware: Why 97% of successful "RAT" deployments use harvested credentials, not CVE exploits.
▶ The "Monday Morning Battle Rhythm": How to build a continuous validation loop between your Red and Blue teams.
▶ Vendor Truth: Why "Professional Services" are often just a band-aid for product design gaps.
Subscribe to our LinkedIn to never miss news, updates, and quizzes to earn digital badges.
Disclaimer: The views expressed are those of the speakers.