ema-logo-secondary-c

Cybersecurity Awesomeness Podcast Recap: Episode 94

Jan 24, 2025 10:11:58 AM

Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.

____________________

Zero trust is not just a buzzword—it's becoming a foundational principle for securing enterprises. In a recent episode of the Cybersecurity Awesomeness podcast, host Chris Steffen, along with cohost Ken Buckler and special guest Jason Garbis, delved deeply into the nuances of zero trust security and why organizations need a clear and structured zero trust maturity model.

Jason Garbis, Principal and Founder of Numberline Security (who is also the co-chair of the Cloud Security Alliance’s Zero Trust Working Group), explains how the zero trust model reframes our understanding of security within an organization. The premise is simple: trust no one, whether inside or outside the network. Instead, every access request must be continuously evaluated based on various factors including user identity, device health, and context. Jason brings a wealth of expertise and insight, having co-authored pivotal texts on zero trust security and contributing to the development of practical assessment methodologies.

Throughout the podcast, the importance of using a maturity model to assess an organization’s maturity level within the zero trust framework is emphasized. Many organizations, regardless of their current security postures, will find themselves somewhere along the vast spectrum of zero trust maturity. What distinguishes effective security strategies from ineffective ones is not necessarily the endpoint, but the awareness and incremental improvements organizations undertake. The conversation highlighted Numberline’s new extensions and enhancements to CISA’s zero trust maturity model, developed alongside industry leaders to address existing gaps and provide clearer guidance. Jason underscores that the framework is designed to facilitate self-assessment for enterprises, enabling them to better understand where they stand and what steps to take next.

One of the most transformative aspects of zero trust is the shift from a purely technical focus to a broader organizational context, wherein discussions about security encompass the overall business mission. Jason noted that cybersecurity professionals need to recognize that their role is to support the organization's goals, rather than to simply enforce regulations. This repositioning is crucial as it fosters an environment in which cybersecurity can coexist with business innovation, ultimately leading to enhanced security that aligns with operational objectives.

Listeners will find great value in the practical insights shared during this episode. By actively engaging with the concepts discussed, IT practitioners and decision-makers can better navigate the complexities of implementing a zero trust strategy in their organizations. From understanding specific assessment metrics to increasing collaboration between cybersecurity and business units, the dialogue provided actionable takeaways that are critical as we begin 2025.

Listen to the episode here: https://www.devopsdigest.com/cybersecurity-awesomeness-podcast-episode-94-zero-trust-maturity-model

You can find more information about the zero trust maturity model from Numberline Security at https://numberlinesecurity.com/ztmmplus/

____________________

You can find the Cybersecurity Awesomeness Podcast at www.cybersecurityawesomeness.com. To gain deeper insights and hear firsthand comments from Chris and Ken on these vital topics, we invite you to listen to the full podcast. Furthermore, for more resources and expertise on cybersecurity, visit Enterprise Management Associates at www.enterprisemanagement.com.

Chris Steffen & Ken Buckler

Written by Chris Steffen & Ken Buckler

Christopher Steffen, CISSP, CISA, is the vice president of research at EMA, covering information security, risk, and compliance management. Before EMA, he served as the CIO for a financial services firm, focusing on FedRAMP compliance and security. He has also served in executive and leadership roles in numerous industry verticals. Steffen has presented at numerous industry conferences and has been interviewed by multiple online and print media sources. Steffen holds over a dozen technical certifications, including CISSP and CISA.

Kenneth Buckler, CASP, is a research director of information security/risk and compliance management for Enterprise Management Associates, a leading industry analyst and consulting firm that provides deep insight across the full spectrum of IT and data management technologies. Before EMA, he supported a Federal agency’s Enterprise Visibility program, providing security insights and compliance trending for the agency’s national network of computers and devices. He has also served in technical hands-on roles across multiple agencies in the Federal cyber security space and has published three Cyber Security books. Ken holds multiple technical certifications, including CompTIA’s Advanced Security Practitioner (CASP) certification.

  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts