• N2K CyberWire
  • Search the site
  • Industry Insights
  • Podcasts
  • Briefings
  • Stories
  • Events
  • Glossary
  • N2K Pro
  • CISO Perspectives
  • Podcasts
  • Briefings
  • Pro Academy New
  • Hash Table
  • 1st Principles Course
  • About
  • Our Story
  • Press
  • Team
  • Testimonials
  • Sponsor
  • Partners
  • Dev
  • API
  • Account
  • Profile
  • Logout
Home
Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy New
Hash Table
1st Principles Course
Dev
API
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
 
May 16, 2025
Join Pro
LOGIN
Podcasts
CISO Perspectives (public)
Ep 94
CSO Perspectives (public) 7.29.24
Ep 94 | 7.29.24
Share on LinkedInShare on FacebookShare on Twitter

The current state of zero trust.

Subscribe
Apple Podcasts icon
Apple Podcasts
Apple Podcasts icon
Apple Podcasts
Spotify icon
Spotify
Overcast icon
Overcast
Overcast icon
Overcast
Castbox icon
Castbox
RSS icon
RSS
Show Notes
Transcript

Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the current state of zero trust with CyberWire Hash Table guest John Kindervag, the originator of the zero trust idea.

References:

Jonathan Jones, 2011. “Six Honest Serving Men” by Rudyard Kipling [Video]. YouTube.

Dave Bittner, Rick Howard, John Kindervag, Kapil Raina, 2021. Zeroing in on zero trust. [Podcast]. CyberWire-X Podcast - N2K Cyberwire.

Dawn Cappelli, Andrew Moore, Randall Trzeciak, 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)  [Book]. SEI Series in Software Engineering). Goodreads. 

Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.

John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks.

CISO Perspectives (public)
Podcast Info
HOST(S):
Kim Jones
Kim Jones is an intelligence, security, and risk management expert with nearly 40 years of experience in information security strategy, governance and compliance, and security operations. He has built, operated, and led security programs across industries, and is the principal architect of one of Arizona State University's cybersecurity education programs. Kim also teaches in SANS' leadership curriculum and UC Berkeley's MICS program. He holds a B.S. in Computer Science from West Point, an M.S. in Information Assurance from Norwich University, and CISM and CISSP certifications.
Follow Kim Jones
Schedule: Tuesdays (in season)
Creator: N2K CyberWire
CISO Perspectives (public)
N2K CyberWire
Privacy
Terms
Sponsorship Terms
Contact Us
©2025 N2K Networks, Inc. All rights reserved. CyberWire® is a registered trademark of N2K Networks, Inc.