Cloud 101CircleEventsBlog
Gain exclusive access to CSA’s extensive network of cloud security experts by becoming a corporate member. Learn how today.

Download Publication

Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust

Communicating the Business Value of Zero Trust

Release Date: 08/14/2023

Zero Trust is a major industry trend that is being adopted and promoted by security teams within many organizations around the globe, and for good reasons: it delivers improved security and can also reduce cost and improve business efficiency and agility. However, Zero Trust is also an industry buzzword that can be confusing and is often misunderstood by many, particularly non-technical and non-security people. Business leaders and non-security professionals are key stakeholders, budget holders, and gatekeepers in any enterprise’s journey to Zero Trust that can make the difference between successful and failed Zero Trust initiatives. This is because, fundamentally, adopting Zero Trust as an organizational strategy requires change, support, and investment of significant time, effort, and money across the enterprise. Therefore, security teams need to be able to communicate the value of Zero Trust to non-technical or non-security audiences, all the way up to the Board of Directors. We believe that the infosec industry has not sufficiently enabled security practitioners to clearly, succinctly, and directly communicate the business value that a Zero Trust strategy can bring. The goal of this CSA guidance is to fill that gap. 


Download this Resource

Bookmark
Share
Related resources
Zero Trust Guiding Principles
Zero Trust Guiding Principles
What is IAM for the Cloud?
What is IAM for the Cloud?
CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance
CSA Code of Conduct Gap Resolution and Annex 10...
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria
Published: 09/19/2023
IoT Security and the Infinite Game
IoT Security and the Infinite Game
Published: 09/19/2023
Reshaping Security Landscapes: The Essence of Cyber Transformation
Reshaping Security Landscapes: The Essence of Cyber Transformation
Published: 09/15/2023
5 Reasons Why Just-in-Time Cloud Access is Pioneering the Future of CIEM
5 Reasons Why Just-in-Time Cloud Access is Pioneering the Future of...
Published: 09/13/2023

Acknowledgements

Alex Sharpe
Alex Sharpe
Management Consultant – Speaker – Interim Executive – Board Member, Sharpe42

Alex Sharpe

Management Consultant – Speaker – Interim Executive – Board Member, Sharpe42

Mr. Sharpe is a long-time (+30 years) Cybersecurity, Governance, and Digital Transformation expert with real-world operational experience. Mr. Sharpe has run business units and has influenced national policy. He has spent much of his career helping corporations and government agencies create value while mitigating cyber risk. This provides him a pragmatic understanding of the delicate balance between Business realities, Cybersecurity, and O...

Read more

Nya Murray
Nya Murray
CEO of Trac-Car and Verviam IDaaS

Nya Murray

CEO of Trac-Car and Verviam IDaaS

Nya is a key contributor to the Zero Trust working group and author of several position papers published by CSA’s Software-Defined Perimeter working group. She is the CEO of Trac-Car and Verviam IDaaS and a senior information and communications technology (ICT) cloud cyber security and identity management consulting architect. Nya cons...

Read more

Elier Cruz Headshot Missing
Elier Cruz

Elier Cruz

This person does not have a biography listed with CSA.

Jason Garbis
Jason Garbis
Principal and Founder, Numberline Security

Jason Garbis

Principal and Founder, Numberline Security

Jason Garbis is Founder and Principal at Numberline Security, a consulting firm providing Zero Trust Security education and advisory services. Jason is the author of Zero Trust Security: An Enterprise Guide, co-chair of the Zero Trust Working Group at the Cloud Security Alliance, and is a frequent contributor to and speaker at industry conferences. Jason holds a CISSP certification, has a BS in Computer Science from Cornell, and an MBA from...

Read more

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst

Erik Johnson

Cloud Security Specialist & Senior Research Analyst

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Chris Steffen
Chris Steffen
Managing Research Director

Chris Steffen

Managing Research Director

Chris is the director of information security/risk and compliance management for a technology industry analyst and consulting firm. He is an industry thought leader and has presented at numerous industry conferences and has been interviewed by multiple media sources. He holds over a dozen technical certifications, including CISSP and CISA.

Read more

Andrea Knoblauch Headshot Missing
Andrea Knoblauch

Andrea Knoblauch

This person does not have a biography listed with CSA.

Lars Ruddigkeit
Lars Ruddigkeit
Account Technology Strategist, Swiss FedGov

Lars Ruddigkeit

Account Technology Strategist, Swiss FedGov

Lars Ruddigkeit completed his PhD in Chemistry at the University of Bern in 2013 with a focus on computer-aided drug design. He began his professional career at Accenture in technology consulting in Big Data and Data Science. At UBS, he specialized in operational machine learning and cybersecurity as a machine learning architect in the Financial Service industry. He is a contributor to the Cloud Security Alliance working groups for Zero Tru...

Read more

Don O'Neil
Don O'Neil
Principal, ISTARI

Don O'Neil

Principal, ISTARI

Don is a leader in Zero Trust Strategy and Architecture, having founded and led a successful Zero Trust practice for a global consulting organization. Don now leads the Zero Trust practice for ISTARI, a global cyber security collective.

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training