From Revolution to Reality
Find Threat Talks on
Zero Trust: From Revolution to Reality
Zero Trust has been around for more than a decade. What started as a networking concept at Forrester evolved into a broader strategy that now shapes federal mandates, enterprise programs, and modern security architectures.
In this episode of Threat Talks, Lieuwe Jan Koning, co-founder of ON2IT and Zero Trust innovator, sits down with Dr. Chase Cunningham, architect of the Zero Trust Extended (ZTX) framework, to unpack where Zero Trust began, how it evolved, and how COVID accelerated its adoption.
They revisit the early days of segmentation gateways and explain how the model expanded beyond the network to focus on what actually matters most.
At the core of Zero Trust data protection is a simple idea: protect what is critical first.
From legacy realities to execution discipline, this conversation brings Zero Trust back to fundamentals and clarifies what it requires in practice.
What you’ll learn
- How Zero Trust evolved beyond network segmentation
Why the shift from perimeter thinking to protect surfaces changed how Zero Trust data protection is designed and implemented. - Why data sits at the center of Zero Trust
How traditional controls like DLP fell short and why protecting critical assets first is more effective than trying to secure everything. - How COVID accelerated real-world adoption
Why remote work forced organizations to rethink implicit trust and move toward more deliberate access models. - Why execution determines whether Zero Trust succeeds
How misconfiguration, poor prioritization, and attempting to do it alone can undermine even the best Zero Trust strategy.
Your cybersecurity experts
Lieuwe Jan Koning
Co-Founder and CTO
ON2IT
Episode details
Zero Trust did not start as a product. It began as a networking shift.
Internal networks were never truly safe. Implicit trust was the flaw to fix. And over time, it evolved into a broader strategy that now shapes federal programs, enterprise architectures, and modern security thinking.
In this Threat Talks episode, Lieuwe Jan Koning and Dr. Chase Cunningham revisit the origin of Zero Trust and the creation of the Zero Trust Extended (ZTX) framework. They explore how the model expanded beyond segmentation into a structured approach that includes data, architecture, automation, visibility, and analytics.
The focus is simple: Zero Trust data protection.
The principle is straightforward: identify the protect surface and secure that first.
Not every legacy system can be replaced. Not every risk can be eliminated. Prioritization is essential.
They discuss:
– why traditional data security controls like DLP frustrated practitioners
– why encryption quickly becomes a key management challenge
– why data remains the least mature control domain in many environments
The episode also examines how COVID accelerated adoption by collapsing perimeter assumptions overnight. Remote work forced organizations to validate access continuously instead of relying on location-based trust.
But acceleration exposed another reality: awareness is not execution.
Many organizations attempted to implement Zero Trust independently and underestimated the architectural discipline required. Misconfiguration and policy gaps created exposure instead of protection.
Zero Trust data protection, in that context, is not about solving everything at once. It is about deliberate prioritization in complex hybrid environments.
For CISOs and security leaders, the real question is not whether Zero Trust works.
It is whether you are executing it correctly
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.





