/
サイバー・レジリエンス

Navy SEAL Lessons That Will Change the Way You Approach Zero Trust

Clint Bruce had it all: a standout football career at the U.S. Naval Academy, a shot in the NFL with the Saints and Ravens, and his name etched in the Navy-Marine Corps Stadium Hall of Fame.

But in 1998, with a promising pro sports career ahead of him, he walked away from it all.

Why? Because he felt called to something more demanding — and more dangerous.

“I left football to become a Navy SEAL,” Bruce said during our recent LinkedIn Live event, “because I wanted to be part of something where the scoreboard really mattered.”

That mindset — one forged in high-stakes environments where trust, clarity, and preparation are everything — shaped the entire conversation in Zero Trust, Terrain, and Holding the High Ground.

In the session, Bruce joined Zero Trust creator and Illumio Chief Evangelist John Kindervag to explore how military principles like terrain, trust, and discipline offer a roadmap for stronger cybersecurity strategies.

It was a discussion about leadership, mindset, and mission that bridges the battlefield and the boardroom.

Why terrain and trust are everything

For Bruce, terrain is geography just as much as it’s the foundation of every strategic decision.

“You don’t conduct operations without a terrain model,” he explained. “Cyber is terrain, and the defender has to understand it better than the adversary.”

In both the battlefield and the data center, the lesson is the same. You can’t protect what you don’t understand. Knowing your environment — your terrain — gives you the upper hand. Without it, you’re fighting blind.

You don’t conduct operations without a terrain model. Cyber is terrain, and the defender has to understand it better than the adversary.

Now leading the HoldFast Foundation and mentoring leaders across industries, Bruce shared how trust is earned, never assumed.

“In my world, trust isn’t given. It’s built,” Bruce said. “You earn it through clarity, consistency, and courage.”

That principle is core to Zero Trust, too. It’s not about being suspicious. It’s about being ready.  

Just as elite teams validate and verify everything in a high-stakes mission, Zero Trust assumes nothing about users, devices, or applications without clear, continuous validation.

Because in both war and cybersecurity, the cost of assuming trust can be catastrophic.

Cybersecurity’s terrain gap and how Zero Trust fixes it

Kindervag explained how traditional cybersecurity lacks one of the most essential concepts from military strategy: a clear model of terrain.

“If I asked most organizations to draw their network terrain, they couldn’t,” he said. “You wouldn’t go into combat blind, but that’s how most of us operate in cybersecurity.”

To drive the point home, Kindervag showed an image from President Obama’s inauguration where he was flanked by Secret Service agents in a layered, visual perimeter.  

Image from The White House Historical Association

The agents knew three things:  

  • Who the President was
  • Where he was
  • How to segment and protect him from potential threats

“That’s Zero Trust in the real world,” Kindervag said. “It’s not about building taller walls. It’s about understanding who and what you’re protecting, where it lives, and how it interacts with everything around it.”

Visibility is the new high ground

One of the strongest metaphors of the day came from Bruce.

“In special operations, the first thing you do is secure the high ground,” he said. “If you don’t, your adversary will.”

That “high ground” in cybersecurity is visibility. Without it, security teams are left reacting to threats instead of proactively containing them.

“You can’t defend what you can’t see,” Kindervag reiterated. “Zero Trust starts with visibility — understanding your terrain.”

From physical battlefields to digital ones, the mission is the same

Throughout the session, the thread that tied everything together was leadership. Not just the title or the rank but the mindset.

“You don’t rise to the occasion,” Bruce said. “You default to your level of preparation.”

Zero Trust offers that preparation. It gives organizations a way to see clearly, respond decisively, and control what happens inside their environment, even after an attacker gets in.

You don’t rise to the occasion. You default to your level of preparation.

That’s what Illumio focuses on every day. In the Post-Breach Era, it’s not enough to try to keep threats out. You have to be ready to contain them the moment they break through.

Ready to rethink your high ground?

If you’re a cybersecurity leader, your job isn’t just to buy tools and block attacks. It’s to understand your terrain, build clarity across your environment, and adopt a framework that assumes breach and enables control.

And as Kindervag emphasized, Zero Trust is not a product. It's a mindset shift.

Just like in combat, that shift starts with understanding the mission and holding your ground, no matter what comes your way.

Watch the full LinkedIn Live to learn how visibility, clarity, and Zero Trust mindset can reshape your cyber strategy.

関連トピック

関連記事

医療機関のゼロトラストジャーニーを始めるための3つのステップ
サイバー・レジリエンス

医療機関のゼロトラストジャーニーを始めるための3つのステップ

イルミオゼロトラストセグメンテーションから始めて、CISAのゼロトラスト成熟度モデルに沿ったゼロトラスト構築についての洞察を得てください。

防御すべき5つのサイバーセキュリティ脅威
サイバー・レジリエンス

防御すべき5つのサイバーセキュリティ脅威

組織とそのセキュリティチームは、壊滅的な被害をもたらす可能性のあるサイバー脅威に日々直面しています。しかし、存在すら知らない脅威を保護することは困難です。

ゼロトラストから始まるレジリエントな重要インフラストラクチャ
サイバー・レジリエンス

ゼロトラストから始まるレジリエントな重要インフラストラクチャ

コロニアルパイプラインの侵害からJBSランサムウェア攻撃まで、この1年間は、米国の重要インフラに対するサイバー攻撃がかつてないほど容赦なく、巧妙で、影響力があり、米国市民の経済的安定と福祉を脅かすことが多すぎることがわかりました。

John Kindervag氏が、ゼロトラストについてセキュリティリーダーにまだ欠けている点を語る
ゼロトラストセグメンテーション

John Kindervag氏が、ゼロトラストについてセキュリティリーダーにまだ欠けている点を語る

ゼロトラストの創始者John Kindervag氏によるこのディープダイブでは、サイバーセキュリティリーダーがゼロトラストについて未だに誤解している点を紹介します。

クリエイターのジョン・キンダーヴォーグとCISOのジャレッド・ヌスバウムによるゼロ・トラスト・イン・プラクティス
ゼロトラストセグメンテーション

クリエイターのジョン・キンダーヴォーグとCISOのジャレッド・ヌスバウムによるゼロ・トラスト・イン・プラクティス

戦略、セグメンテーション、ビジネス連携がゼロトラストを現実の世界でどのように機能させるかについて、2人のゼロトラストリーダーによるRSAC2025の力強い会話から得られた重要な洞察をご覧ください。

マルチクラウド環境で侵害を封じ込め、制御を取り戻す方法
イルミオ製品

マルチクラウド環境で侵害を封じ込め、制御を取り戻す方法

Illumioがどのようにクラウドプラットフォーム全体の可視化と侵害抑制を実現し、ラテラルムーブメントを阻止し、ハイブリッドマルチクラウド環境を保護するのに役立つかをご覧ください。

Assume Breach.
影響を最小限に抑えます。
レジリエンスを高めます。

ゼロトラストセグメンテーションについて詳しく知る準備はできていますか?