ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

Download Publication

CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation
CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation

CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation

Release Date: 02/06/2022

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.

Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed related implementations, top business challenges, and top technical challenges. Through the survey and upcoming report, CSA is looking to learn where C-level executives are in terms of their Zero-Trust strategies, pain points, vendor needs, management requirements/oversight, technical considerations, legacy challenges, adoption rates, and stakeholder involvement. CSA is dedicated to educating the C-suite, board members, staff, and stakeholders on the benefits of Zero Trust. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
AI Log Analysis for Event Correlation in Zero Trust
AI Log Analysis for Event Correlation in Zero Trust
Published: 09/26/2025
The Salesloft Drift OAuth Supply-Chain Attack: Cross-Industry Lessons in Third-Party Access Visibility
The Salesloft Drift OAuth Supply-Chain Attack: Cross-Industry Lesso...
Published: 09/25/2025
Do Your CI/CD Pipelines Need Identities? Yes.
Do Your CI/CD Pipelines Need Identities? Yes.
Published: 09/22/2025
Identity Security: Cloud’s Weakest Link in 2025
Identity Security: Cloud’s Weakest Link in 2025
Published: 09/19/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training