- Many IT and security leaders struggle to understand zero trust and how best to deploy it with their existing IT resources.
- The need to move from a perimeter-based approach to security toward an “Always Verify” approach is clear. The path to getting there is complex and expensive.
- Zero trust as a principle is a moving target due to competing definitions and standards. A strategy that adapts evolving best practices must be supported by business stakeholders.
- Full zero trust includes many components. Performing an accurate assessment of readiness and benefits to adopt zero trust can be extremely difficult when you don’t know where to start.
Our Advice
Critical Insight
Apply zero trust to key protect surfaces. A successful zero trust strategy should evolve through an iterative and repeatable process by assessing the full spectrum of available technologies to apply zero trust principles to the most relevant protect surfaces.
Impact and Result
Every organization should have a zero trust strategy and the roadmap to deploy it must always be tested and refined. Our unique approach:
- Assess resources and determine zero trust readiness.
- Prioritize initiatives and build out roadmap.
- Deploy zero trust and monitor with zero trust progress metrics.
Member Testimonials
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.
9.3/10
Overall Impact
$66,949
Average $ Saved
40
Average Days Saved
Client
Experience
Impact
$ Saved
Days Saved
Flight Centre Australia
Workshop
9/10
$116K
35
Worst: discovering how fragmented and siloed our knowledge of Zero Trust and our environment was Best: seeing how the facilitated session drove co... Read More
Fujitsu Caribbean Jamaica
Guided Implementation
10/10
$12,999
10
I greatly appreciated how clear all the engagements were in terms of what should be expected at the end and being able to get clarifications along ... Read More
NASA
Workshop
10/10
$129K
110
Each workshop participant with whom I spoke relayed how valuable an experience it was to work through the exercises. The best part of the experienc... Read More
FirstRand Bank Ltd.
Guided Implementation
8/10
$7,799
5
The material was very practical and easy to operationalise. Thank you Victor!
Workshop: Build a Zero Trust Roadmap
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Module 1: Define Business Goals and Protect Surfaces
The Purpose
Align business goals to protect surfaces.
Key Benefits Achieved
A better understanding of how business goals can map to key protect surfaces and their associated DAAS elements.
Activities
Outputs
Understand business and IT strategy and plans.
Define business goals.
Identify five critical protect surfaces and their associated DAAS elements.
Map business goals and protect surfaces.
- Mapping of business goals to key protect surfaces and their associated DAAS elements.
Module 2: Begin Gap Analysis
The Purpose
Identify and define zero trust initiatives.
Key Benefits Achieved
A list of zero trust initiatives to be prioritized and set into a roadmap.
Activities
Outputs
Assess current security capabilities and define the zero trust target state for a set of controls.
- Security capabilities current state assessment
- Zero trust target state
Identify tasks to close maturity gaps.
- Tasks to address maturity gaps
Assign tasks to zero trust initiatives.
Module 3: Complete Gap Analysis
The Purpose
Complete the zero trust gap analysis and prioritize zero trust initiatives.
Key Benefits Achieved
A prioritized list of zero trust initiatives aligned to business goals and key protect surfaces.
Activities
Outputs
Align initiatives to business goals and key protect surfaces.
- Zero trust initiative list mapped to business goals and key protect surfaces
Conduct cost/benefit analysis on zero trust initiatives.
Prioritize initiatives.
- Prioritization of zero trust initiatives
Module 4: Finalize Roadmap and Formulate Policies
The Purpose
Finalize the zero trust roadmap and begin to formulate zero trust policies for roadmap initiatives.
Key Benefits Achieved
A zero trust roadmap of prioritized initiatives.
Activities
Outputs
Define solution criteria.
Identify candidate solutions.
Evaluate candidate solutions.
Finalize roadmap.
- Zero trust roadmap
Formulate policies for critical DAAS elements.
- Zero trust policies for critical protect surfaces
- Method for defining zero trust policies for candidate solutions
Establish metrics for high-priority initiatives.
- Metrics for high-priority initiatives