Cloud 101CircleEventsBlog

Download Publication

Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust
Who it's for:
  • InfoSec professionals
  • Non-technical stakeholders

Communicating the Business Value of Zero Trust

Release Date: 12/18/2023

Working Group: Zero Trust

Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved security, while also mitigating risks, facilitating regulatory compliance, maintaining business continuity, providing a competitive advantage, building trust and customer confidence, simplifying operations, generating cost savings, and enabling scalability and flexibility in managing cybersecurity risks.

However, Zero Trust is also an industry buzzword that is often misunderstood, especially by business leaders and non-security professionals that are key stakeholders in a Zero Trust initiative. These non-technical stakeholders can make the difference between a successful and failed initiative.

Therefore, this document seeks to provide InfoSec professionals with the knowledge and mindset to effectively communicate to non-technical internal stakeholders why their organization should invest in implementing a Zero Trust security strategy. By using one or more of the business values described in this document and applying them to the specifics of their organization, security leaders will be able to make a strong business case for adopting Zero Trust. 

Key Takeaways:
  • What is Zero Trust
  • Misconceptions about Zero Trust
  • What is business value
  • Guiding principles for communicating business value
  • 14 benefits of Zero Trust and how to best communicate them
Related CSA 2023 Zero Trust Summit panel session recording: Understanding, Communicating, and Delivering Business Value
Download this Resource

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
Published: 12/03/2024
Legacy MFT Solutions Might Not Look Broken, But They Are
Legacy MFT Solutions Might Not Look Broken, But They Are
Published: 12/03/2024
Defining Identities, Accounts, and the Challenge of Privilege Sprawl
Defining Identities, Accounts, and the Challenge of Privilege Sprawl
Published: 12/02/2024
Readiness Assessments: A Crucial Part of Your SOC Engagement
Readiness Assessments: A Crucial Part of Your SOC Engagement
Published: 12/02/2024

Acknowledgements

Saif Azwar
Saif Azwar
Founder at Secured Approach

Saif Azwar

Founder at Secured Approach

Alex Sharpe
Alex Sharpe
Managing Director at Sharpe42

Alex Sharpe

Managing Director at Sharpe42

Mr. Sharpe is a long-time (+30 years) Cybersecurity, Governance, and Digital Transformation expert with real-world operational experience. Mr. Sharpe has run business units and has influenced national policy. He has spent much of his career helping corporations and government agencies create value while mitigating cyber risk. This provides him a pragmatic understanding of the delicate balance between Business realities, Cybersecurity, and O...

Read more

Nya Murray
Nya Murray
CEO of Trac-Car and Verviam IDaaS

Nya Murray

CEO of Trac-Car and Verviam IDaaS

Nya is a key contributor to the Zero Trust working group and author of several position papers published by CSA’s Software-Defined Perimeter working group. She is the CEO of Trac-Car and Verviam IDaaS and a senior information and communications technology (ICT) cloud cyber security and identity management consulting architect. Nya cons...

Read more

Elier Cruz Headshot Missing
Elier Cruz

Elier Cruz

Jason Garbis
Jason Garbis
Founder and Principal at Numberline Security

Jason Garbis

Founder and Principal at Numberline Security

Jason Garbis is Founder and Principal at Numberline Security, a consulting firm helping enterprises prepare for, define, and execute on effective Zero Trust security strategies. Jason has authored several books, including Zero Trust Security: An Enterprise Guide, is co-chair of the Zero Trust Working Group at the Cloud Security Alliance, and is a frequent speaker at industry conferences. Jason holds a CISSP certification, has a BS in Comput...

Read more

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA

Erik Johnson

Cloud Security Specialist & Senior Research Analyst, CSA

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Chris Steffen
Chris Steffen
VP of Research at Enterprise Management Associates

Chris Steffen

VP of Research at Enterprise Management Associates

Chris is the director of information security/risk and compliance management for a technology industry analyst and consulting firm. He is an industry thought leader and has presented at numerous industry conferences and has been interviewed by multiple media sources. He holds over a dozen technical certifications, including CISSP and CISA.

Read more

Andrea Knoblauch
Andrea Knoblauch
Principal, Security at Softchoice

Andrea Knoblauch

Principal, Security at Softchoice

Lars Ruddigkeit
Lars Ruddigkeit
Account Technology Strategist, Swiss FedGov

Lars Ruddigkeit

Account Technology Strategist, Swiss FedGov

Lars Ruddigkeit completed his PhD in Chemistry at the University of Bern in 2013 with a focus on computer-aided drug design. He began his professional career at Accenture in technology consulting in Big Data and Data Science. At UBS, he specialized in operational machine learning and cybersecurity as a machine learning architect in the Financial Service industry. He is a contributor to the Cloud Security Alliance working groups for Zero Tru...

Read more

Don O'Neil
Don O'Neil
Principal, ISTARI

Don O'Neil

Principal, ISTARI

Don is a leader in Zero Trust Strategy and Architecture, having founded and led a successful Zero Trust practice for a global consulting organization. Don now leads the Zero Trust practice for ISTARI, a global cyber security collective.

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training