Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation
CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation

CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation

Release Date: 02/06/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed related implementations, top business challenges, and top technical challenges. Through the survey and upcoming report, CSA is looking to learn where C-level executives are in terms of their Zero-Trust strategies, pain points, vendor needs, management requirements/oversight, technical considerations, legacy challenges, adoption rates, and stakeholder involvement. CSA is dedicated to educating the C-suite, board members, staff, and stakeholders on the benefits of Zero Trust. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust
Zero Trust Guiding Principles
Zero Trust Guiding Principles
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Published: 04/18/2024
Protocols are Passé. APIs are Key for Effective Zero Trust Implementation.
Protocols are Passé. APIs are Key for Effective Zero Trust Implemen...
Published: 04/12/2024
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Published: 04/08/2024
10 Essential Identity and Access Management (IAM) Terms
10 Essential Identity and Access Management (IAM) Terms
Published: 03/30/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training