Zero Trust Starts Here: Define Your Protect Surface

One year of Hackers Roadmaps

Find Threat Talks on

Zero Trust Deep Dive: Step One Done Right

Define your protect surface

Zero Trust is about more than just IP addresses and firewalls: it’s about understanding what truly matters to your business.

In step one of Zero Trust: define your protect surface, we focus on how to prioritize what you want to protect, how to avoid common pitfalls and how to kick off your Zero Trust journey from a solid, business-aligned foundation.

In this Deep Dive episode of Threat Talks, host Lieuwe Jan Koning and special guest Rob Maas (Field CTO at ON2IT) take an in-depth look at the starting point of any Zero Trust implementation.

They’ll discuss:
✅ What methods are there for defining protect surfaces
⛨ How to establish the relevance of each protect surface
📈 How to align your cybersecurity with business needs and goals

Get all the details and insights on this first step of Zero Trust: define your protect surface.

Your cybersecurity experts

Lieuwe Jan Koning

Co-Founder and CTO
ON2IT

Rob Maas, Field CTO, ON2IT

Rob Maas

Field CTO
ON2IT

Episode details

Zero Trust Deep Dive: Step One Done Right

In this episode of Threat Talks, we’re diving into the very first step of the Zero Trust framework: defining your protect surface.

ON2IT’s Field CTO Rob Maas joins Lieuwe Jan Koning to break down why this isn’t just about IP addresses and firewalls: it’s about understanding what truly matters to your business. Learn how to prioritize what to protect, avoid common pitfalls, and kick off your Zero Trust journey with a solid, business-aligned foundation.

They explore:
✅ Methods for defining protect surfaces
⛨ Establishing the relevance of each protect surface
📈 How to align your cybersecurity with business needs and goals

In this second episode of a multi-part deep dive on Zero Trust, Lieuwe Jan and Rob clarify where to start with Zero Trust implementation, discuss the importance of business and board involvement and explain why starting small is key. Whether you’re new to the concept of Zero Trust or knee-deep in implementation, this series will answer any questions you may have.

One year of Hackers Roadmaps

Get your Hacker T-shirt

Join the treasure hunt!

Find the code within this episode and receive your own hacker t-shirt for free.

2 + 13 =

Christmas Hacker