Zero Trust Demystified: What is Zero Trust Really About?
Find Threat Talks on
Zero Trust Demystified
What is Zero Trust Really About?
Zero Trust is everywhere – but what does this actually mean? Is it a cybersecurity strategy, a set of tactics, a product you can buy, or just clever marketing?
In this kick-off episode of our Threat Talks Zero Trust Deep Dive series, we’re setting the record straight.
Join host Lieuwe Jan Koning and special guest Rob Maas (Field CTO at ON2IT) as they unpack the real meaning behind Zero Trust, where to start, and how to not get misled by vendor-driven narratives.
✅ Why Zero Trust isn’t a product, and what it actually is
🗺️ The five steps and four core principles of Zero Trust
🚧 Why business alignment – and not anything technical – is the hardest part of Zero Trust implementation
Get the inside scoop and prepare for the upcoming step-by-step breakdown.
Your cybersecurity experts
Lieuwe Jan Koning
Co-Founder and CTO
ON2IT
Episode details
What Zero Trust Is (And Isn’t)
Everyone’s heard of Zero Trust, but ask ten people what it means and you’ll get ten different answers.
In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Field CTO Rob Maas cut through the noise as they explore what Zero Trust really is—beyond the vendor buzzwords and surface-level definitions.
They explore:
✅ Why Zero Trust is a mindset, not a tactic, product, or anything else
🗺️ The five steps and four design principles that lay the foundation
🎯 What makes Zero Trust succeed (or fail) in practice
In this first episode of a multi-part deep dive on Zero Trust, Lieuwe Jan and Rob clarify misconceptions, talk about why identity alone isn’t enough, and outline the key steps for aligning Zero Trust with real business outcomes.
Whether you’re new to the concept of Zero Trust or knee-deep in implementation, this episode give you the essential basics.
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
