/
제로 트러스트 세그멘테이션

Zero Trust Has Grown Up. Here’s What Its Founders Say Is Coming Next.

Zero Trust founders Chase Cunningham and John Kindervag
Zero Trust pioneers Chase Cunningham and John Kindervag

Zero Trust has grown up.

That’s how Chase Cunningham and John Kindervag describe the current state of the security strategy they’ve nurtured from concept to global movement.

“When I got to Forrester, I inherited someone else’s baby,” Chase joked. “That parent was John. And now the baby’s a teenager.”

It wasn’t always this way. But today, Zero Trust is everywhere. John and Chase are now helping security leaders around the world reimagine how they protect what matters most.

So what’s fueling the momentum — and what’s next?

In our latest The Segment podcast episode, I sat down with John, the Godfather of Zero Trust, and Chase, known in the industry as Dr. Zero Trust, to talk about the strategy’s rise, the power of security graphs, and what it really means to think like an attacker.

Zero Trust is a strategy. Full stop.

When John and Chase first started evangelizing Zero Trust about 15 years ago, the response wasn’t exactly enthusiastic.

“My first speech had 14 people in the room,” John said. “And most of them told me I was an idiot.”

But now, it’s global. From small businesses to international governments, organizations are finally putting containment and visibility at the heart of their security strategies.

Chase believes we’ve crossed the Zero Trust chasm. “The ‘haterade’ still flows online, but the adoption is real,” he said.

They’re leading Zero Trust workshops everywhere, from Taiwan to Switzerland. In fact, John said he recently addressed cybersecurity leaders at Bletchley Park in the UK, home of the original codebreakers.

What’s fueling this growth? They both agreed that it’s the ability of Zero Trust to resonate at every level, from security engineers to executive decision-makers and board members.

Since its beginning, Zero Trust hasn't been about what technology to buy. It’s a framework for building resilient organizations that works across every function at any scale.

Security graphs are changing the cyber game

Zero Trust is such a unique strategy because it continues to work even as the industry evolves. One of the biggest leaps forward right now is how organizations are adopting Zero Trust alongside security graphs.

Chase’s new book, Think Like an Attacker: Why Security Graphs Are the Next Frontier of Threat Detection and Response, outlines how graph analysis is helping defenders understand their infrastructure with the same clarity attackers already have.

“When I was in the military, we went from five successful ops a month to 300 once we used graph models,” Chase said. “Why? Because we understood the terrain.”

John agrees. In his five-step model for Zero Trust, security graphs are the engine behind step two: map the transaction flows. Without that map, Zero Trust becomes guesswork.

“Good maps win wars,” he said. “Bad ones get you lost.” And the same can be said in cybersecurity.

Good maps win wars. Bad ones get you lost.

Know your security priorities or risk losing control  

Security graphs are also helping security teams prioritize what matters most.

Both John and Chase emphasized that cybersecurity leaders need to rethink what success looks like. “If everything is a priority, then nothing is,” Chase warned.  

That’s why defining the protect surface — the most critical data, applications, and services in your network — is foundational.

From there, security leaders can use graph-driven visibility to make informed decisions and deploy controls with purpose. John put it plainly: “Most people hope nothing bad will happen. That’s not a risk strategy.”

Instead, security teams must accept that attackers will get in. Our job is to contain their movement and minimize the blast radius.

Think like an attacker — or stay a step behind

One of the most compelling takeaways from our discussion was this: defenders need to flip the script.

“Attackers don’t follow compliance checklists,” Chase said. “They move fast, play dirty, and exploit the things you think are safe.”  

That’s why it's not enough to monitor alerts or patch known vulnerabilities. Defenders need to understand the enemy’s mindset because chances are attackers already understand your infrastructure better than you do.

Attackers don’t follow compliance checklists. They move fast, play dirty, and exploit the things you think are safe.

And while red teaming has been around for decades, John stressed that it’s time to evolve. “We used to do penetration tests and deliver 200-page reports that no one acted on,” he said. “Now, we need targeted tests that ask: can an attacker get to my protect surface, and how fast can I contain them if they do?”

AI can be an ally if you’re careful

AI can be a real help for evolving how we see, understand, prioritize, and act on threats. While both John and Chase are skeptical of the AI hype, they’re bullish on the potential.

“AI isn’t magic,” Chase said. “It’s math. But if it helps defenders move at machine speed, use it.”

John added that the value of AI is in helping organizations accelerate their response. “If you deploy an airbag the same way you do change management, you die,” he said. “We need an automated response. AI can get us there.”

AI isn’t magic. It’s math. But if it helps defenders move at machine speed, use it.

But it’s not just about buying a tool labeled “AI.” It’s about ensuring your existing infrastructure is ready for it. Graph-based visibility, policy engines, and segmentation should already be in place to make real-time action with AI possible.

Zero Trust has earned its seat at the table

The most inspiring part of our conversation was seeing how far Zero Trust has come. From casino pen tests and hotel gym chats to advising generals and lawmakers, John and Chase have turned an idea into a movement.

That movement is no longer a niche concern for IT. It’s a boardroom issue, a national priority, and a strategic imperative.

As John put it: “The attackers are building machines to defeat us. So, we must build machines to defeat them.”

To do that, we need better maps, smarter systems, and the courage to prioritize what matters most.

Listen to our full conversation on The Segment: A Zero Trust Leadership Podcast via Apple, Spotify, or our website.

관련 주제

관련 기사

적응형 세그멘테이션의 진화
제로 트러스트 세그멘테이션

적응형 세그멘테이션의 진화

적응형 보안 플랫폼 (ASP) 을 중심으로 한 Illumio의 초기 혁신은 이러한 문제를 직접 해결하기 위한 것이었습니다.솔루션을 구축할 수 있는 몇 가지 주요 기본 요소가 확인되었습니다.

보안 ROI, 엔드포인트용 ZTS, 연방 보안 과제 개선
제로 트러스트 세그멘테이션

보안 ROI, 엔드포인트용 ZTS, 연방 보안 과제 개선

랜섬웨어와 기타 사이버 공격이 정교해짐에 따라 격리를 통해 사이버 복원력을 구축하면 보안 ROI가 향상되고 있습니다.

일루미오 월드 투어가 시드니에서 열립니다!알아야 할 모든 것이 여기 있습니다
제로 트러스트 세그멘테이션

일루미오 월드 투어가 시드니에서 열립니다!알아야 할 모든 것이 여기 있습니다

2024년 11월 20일 시드니에서 열리는 하얏트 리젠시에서 열리는 일루미오 월드 투어에 참여하여 최고의 사이버 보안 전문가들과 만나 보세요.

Women in Cybersecurity Share Their Top Leadership Lessons
일루미오 컬쳐

Women in Cybersecurity Share Their Top Leadership Lessons

Discover powerful leadership lessons from three women in cybersecurity as they share insights on mentorship, allyship, and breaking industry stereotypes.

래리 포네몬 박사가 말하는 사이버 보안의 미래는 예방이 아닌 격리가
랜섬웨어 억제

래리 포네몬 박사가 말하는 사이버 보안의 미래는 예방이 아닌 격리가

사이버 보안 전문가인 Larry Ponemon 박사로부터 예방이 더 이상 충분하지 않은 이유와 현대의 랜섬웨어 공격에서 살아남기 위해 격리, 제로 트러스트, 강력한 리더십이 중요한 이유에 대해 알아보십시오.

사이버 범죄 비즈니스: 전직 FBI 보좌관이 모든 CISO에게 알리고 싶은 내용
사이버 레질리언스

사이버 범죄 비즈니스: 전직 FBI 보좌관이 모든 CISO에게 알리고 싶은 내용

CISO가 사이버 보안에 대해 비즈니스 중심의 접근 방식을 채택해야 하는 이유와 제로 트러스트가 위험과 탄력성 간의 격차를 줄이는 데 어떻게 도움이 될 수 있는지 알아보십시오.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?