How do you think your organization will be handling zero trust mindset/principles in 5 years?

Core, primary concepts used to form cyber security strategy30%

Influencing strategies but not core to our overall cyber security strategies (e.g., data security, identity security, network security)30%

Implemented tactically for technology implementations (e.g., IAM, ZTNA, Micro segmentation, etc.)25%

Very limited use cases (e.g., used by security teams to justify increased budgets)7%

Not using (e.g., changed focus, replaced by the next big thing, etc.)3%

Will not apply to my organization in 5 years2%

Unsure/don’t know4%

465 PARTICIPANTS
6.8k viewscircle icon5 Upvotescircle icon10 Comments
Sort by:
IT Managera year ago

This is more relative to the level where VPs vs Managers can go with 1 or 2

Enterprise and Security Architect in Software2 years ago

As a paradigm it is very much topical. Actual implementation is essentially about very granular and time limited access. Getting the detailed entitlements designed and updated continuously requires more than just technology platform procurement. Easier to execute for individual applications or products but rather messy in the enterprise.

2 years ago

Zero Trust is fit for the new work style although need to consider its operation carefully before moving forward

Director of Engineering2 years ago

Agree it isn’t the only framework, but it’s a powerful paradigm. 

Agree there is vendor snake oil, and it’s doesn’t solve every problem but it can be used as an important intellectual framework. 

Lightbulb on1
AVP CYBER ENGINEERING AND ARCHITECTURE2 years ago

I am starting with the fundamental technologies needed to implement 

Content you might like

Yes60%

No34%

We have plans5%

View Results

YES, for all CAPEX above certain thresholds / meeting certain requirements

YES, but only upon Top Management request and on specific CAPEX projects

YES, for each CAPEX project

NO

View Results