Thought Leadership

Five Takeaways from the Zero Trust Leadership Series Kickoff

Written By
Patrick McBride
Published On
Mar 24, 2023

On March 15, we kicked off our Zero Trust Leadership series with a virtual event attended by over a thousand global participants. We were very fortunate to have a who’s who list of security industry leaders providing zero trust solutions, including CrowdStrike, Palo Alto Networks, BeyondTrust, and Ping Identity. Dr. Zero Trust himself (aka Chase Cunningham) was in the house, along with CISOs, CIOs, and prominent service providers, including World Wide Technology, Optiv, GuidePoint Security, FIDO, and Climb Channel Solutions. 

The overarching goal of the event was to provide practical guidance to help participants begin or extend their zero trust journey. A related goal was to define a new subcategory—Zero Trust Authentication. Zero Trust Authentication meets the much higher standard required to shut the door on the largest single vulnerability that organizations face today—passwords and weak MFA. As Dr. Zero Trust noted (he kinda pounded the table on this one), we have significant data-based evidence over multiple years from reports like the annual Verizon DBIR and CrowdStrike Threat Report that authentication is the weak link and initial attack vector of choice for adversaries. Existing authentication methods simply fall short.

If you want to view the keynote sessions or the technology demonstrations, you can register here:

Watch Now

Session list:

I wanted to share a few themes that came up across multiple sessions. So without further ado…

1. You can’t get to zero trust footing without addressing the authentication vulnerability.

We know passwords (any shared secret) are completely inadequate for validating a user's identity. Unfortunately, the last two years have also demonstrated that traditional MFA (one-time passwords, magic links, and mobile push) are barely a speed bump. There are just too many easy-to-use, open source methods and hosted services enabling adversaries to launch MFA bypass attacks or social engineering techniques that work. 

FIDO2 is now the gold standard for phishing-resistant authentication, and as Dr. Jasson Casey points out in his session on the key requirements for Zero Trust Authentication, cryptographic FIDO2 passkeys are a great first step and there are other ingredients required to harden authentication. 

2. The device matters

The topic of “device trust” came up quite a few times. Traditional authentication systems ignore this part of the authentication equation, but they do so at your peril. It matters who is gaining access to apps, resources, and data, but it also matters what is gaining access—what device the user is bringing to the party. 

Ensuring that the endpoint the employee or contractor is using to access resources and data is paramount. The user and the endpoint device are the primary targets, so ensuring that the appropriate controls are in place before allowing access needs to be an equal part of modern, secure authentication capability.

3. Zero Trust Authentication is a team sport

Incorporating risk signals from your existing cybersecurity tooling (MDM, EDR, ZTNA, and more), has become critical to ensuring that only authorized users with secure devices gain access. No single technology has a lock on risk, but they all have risk signals that can contribute to improved authentication decisions. Gaining additional/maximum protection value from the tools you have already implemented just makes sense, but too often, the solutions just don’t work in concert and signals that could be helpful in stopping an attack are not leveraged to stop an attack. 

Making a better, risk-based authentication decision is part of the “team sport” equation. The other is the ability to take action to stop an adversary from gaining initial access or moving laterally to access additional resources. This was one of the key reasons Beyond Identity developed the Zero Trust Authentication subcategory and joined forces with cybersecurity technology leaders to advance the state of authentication dramatically. The goal is to make better authentication decisions and take action when needed. 

4. Once-and-done authentication is not nearly enough

Continuous validation is the new sheriff in town. One theme widely echoed across the sessions is that the once-and-done approach to authentication is flawed. Authenticating a user with an initial challenge, even a strong MFA challenge, only gets you so far. Unfortunately, because of the friction of the many legacy MFA tools that make users jump through hoops (find a second device, reply to a prompt, etc.), organizations are forced to make the security versus usability tradeoff. 

The solution is often to set session timers to days, weeks, or sometimes months. But we know users log in and walk away from their devices. We also know users can change a security setting (e.g., turn off the firewall or the lock screen) and adversaries can successfully deploy malware via a phishing link. 

Continuous authentication has become a must-have. And similar to the NYC subway advice “if you see something, say something”, if something looks suspicious, then the authentication solution needs to be able to take action to quarantine the device or kick it off the network. Even during authenticated sessions. When that happens, the threat cannot maintain access or move further into the network.

5. Zero trust is a journey worth taking

One important conclusion from the various panels of experts is that the zero trust thought process and moving a security program toward zero trust can really improve the situation. The panelists acknowledged the overuse of the term “zero trust,” especially by vendors who have nothing to offer, has turned a few off. But while the consensus opinion was that no one technology provides complete zero trust, they all believed that it was a journey worth taking and fixing the massive authentication vulnerability was an important foundational step.  

For more on Zero Trust Authentication, including the seven key requirements for a Zero Trust Authentication solution, I suggest reading:

  • The Rise of Zero Trust Authentication - a white paper that discusses how phishing-resistant, passwordless authentication advances zero trust security
  • Zero Trust Authentication: Securing User and Device Access for a Distributed, Multi-Cloud World - an ebook written by Jon Friedman of AimPoint Group that describes:
  • The role of authentication in zero trust security
  • The fatal shortcomings in existing authentication  
  • Technologies that can provide passwordless, phishing-resistant MFA
  • Low-friction authentication that simplifies deployment and ensures user acceptance
  • How Zero Trust Authentication integrates with security tools and strengthens your overall security program
  • How you can deploy Zero Trust Authentication fast and generate quick wins
Get started with Device360 today
Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.

Five Takeaways from the Zero Trust Leadership Series Kickoff

Download

On March 15, we kicked off our Zero Trust Leadership series with a virtual event attended by over a thousand global participants. We were very fortunate to have a who’s who list of security industry leaders providing zero trust solutions, including CrowdStrike, Palo Alto Networks, BeyondTrust, and Ping Identity. Dr. Zero Trust himself (aka Chase Cunningham) was in the house, along with CISOs, CIOs, and prominent service providers, including World Wide Technology, Optiv, GuidePoint Security, FIDO, and Climb Channel Solutions. 

The overarching goal of the event was to provide practical guidance to help participants begin or extend their zero trust journey. A related goal was to define a new subcategory—Zero Trust Authentication. Zero Trust Authentication meets the much higher standard required to shut the door on the largest single vulnerability that organizations face today—passwords and weak MFA. As Dr. Zero Trust noted (he kinda pounded the table on this one), we have significant data-based evidence over multiple years from reports like the annual Verizon DBIR and CrowdStrike Threat Report that authentication is the weak link and initial attack vector of choice for adversaries. Existing authentication methods simply fall short.

If you want to view the keynote sessions or the technology demonstrations, you can register here:

Watch Now

Session list:

I wanted to share a few themes that came up across multiple sessions. So without further ado…

1. You can’t get to zero trust footing without addressing the authentication vulnerability.

We know passwords (any shared secret) are completely inadequate for validating a user's identity. Unfortunately, the last two years have also demonstrated that traditional MFA (one-time passwords, magic links, and mobile push) are barely a speed bump. There are just too many easy-to-use, open source methods and hosted services enabling adversaries to launch MFA bypass attacks or social engineering techniques that work. 

FIDO2 is now the gold standard for phishing-resistant authentication, and as Dr. Jasson Casey points out in his session on the key requirements for Zero Trust Authentication, cryptographic FIDO2 passkeys are a great first step and there are other ingredients required to harden authentication. 

2. The device matters

The topic of “device trust” came up quite a few times. Traditional authentication systems ignore this part of the authentication equation, but they do so at your peril. It matters who is gaining access to apps, resources, and data, but it also matters what is gaining access—what device the user is bringing to the party. 

Ensuring that the endpoint the employee or contractor is using to access resources and data is paramount. The user and the endpoint device are the primary targets, so ensuring that the appropriate controls are in place before allowing access needs to be an equal part of modern, secure authentication capability.

3. Zero Trust Authentication is a team sport

Incorporating risk signals from your existing cybersecurity tooling (MDM, EDR, ZTNA, and more), has become critical to ensuring that only authorized users with secure devices gain access. No single technology has a lock on risk, but they all have risk signals that can contribute to improved authentication decisions. Gaining additional/maximum protection value from the tools you have already implemented just makes sense, but too often, the solutions just don’t work in concert and signals that could be helpful in stopping an attack are not leveraged to stop an attack. 

Making a better, risk-based authentication decision is part of the “team sport” equation. The other is the ability to take action to stop an adversary from gaining initial access or moving laterally to access additional resources. This was one of the key reasons Beyond Identity developed the Zero Trust Authentication subcategory and joined forces with cybersecurity technology leaders to advance the state of authentication dramatically. The goal is to make better authentication decisions and take action when needed. 

4. Once-and-done authentication is not nearly enough

Continuous validation is the new sheriff in town. One theme widely echoed across the sessions is that the once-and-done approach to authentication is flawed. Authenticating a user with an initial challenge, even a strong MFA challenge, only gets you so far. Unfortunately, because of the friction of the many legacy MFA tools that make users jump through hoops (find a second device, reply to a prompt, etc.), organizations are forced to make the security versus usability tradeoff. 

The solution is often to set session timers to days, weeks, or sometimes months. But we know users log in and walk away from their devices. We also know users can change a security setting (e.g., turn off the firewall or the lock screen) and adversaries can successfully deploy malware via a phishing link. 

Continuous authentication has become a must-have. And similar to the NYC subway advice “if you see something, say something”, if something looks suspicious, then the authentication solution needs to be able to take action to quarantine the device or kick it off the network. Even during authenticated sessions. When that happens, the threat cannot maintain access or move further into the network.

5. Zero trust is a journey worth taking

One important conclusion from the various panels of experts is that the zero trust thought process and moving a security program toward zero trust can really improve the situation. The panelists acknowledged the overuse of the term “zero trust,” especially by vendors who have nothing to offer, has turned a few off. But while the consensus opinion was that no one technology provides complete zero trust, they all believed that it was a journey worth taking and fixing the massive authentication vulnerability was an important foundational step.  

For more on Zero Trust Authentication, including the seven key requirements for a Zero Trust Authentication solution, I suggest reading:

  • The Rise of Zero Trust Authentication - a white paper that discusses how phishing-resistant, passwordless authentication advances zero trust security
  • Zero Trust Authentication: Securing User and Device Access for a Distributed, Multi-Cloud World - an ebook written by Jon Friedman of AimPoint Group that describes:
  • The role of authentication in zero trust security
  • The fatal shortcomings in existing authentication  
  • Technologies that can provide passwordless, phishing-resistant MFA
  • Low-friction authentication that simplifies deployment and ensures user acceptance
  • How Zero Trust Authentication integrates with security tools and strengthens your overall security program
  • How you can deploy Zero Trust Authentication fast and generate quick wins

Five Takeaways from the Zero Trust Leadership Series Kickoff

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

On March 15, we kicked off our Zero Trust Leadership series with a virtual event attended by over a thousand global participants. We were very fortunate to have a who’s who list of security industry leaders providing zero trust solutions, including CrowdStrike, Palo Alto Networks, BeyondTrust, and Ping Identity. Dr. Zero Trust himself (aka Chase Cunningham) was in the house, along with CISOs, CIOs, and prominent service providers, including World Wide Technology, Optiv, GuidePoint Security, FIDO, and Climb Channel Solutions. 

The overarching goal of the event was to provide practical guidance to help participants begin or extend their zero trust journey. A related goal was to define a new subcategory—Zero Trust Authentication. Zero Trust Authentication meets the much higher standard required to shut the door on the largest single vulnerability that organizations face today—passwords and weak MFA. As Dr. Zero Trust noted (he kinda pounded the table on this one), we have significant data-based evidence over multiple years from reports like the annual Verizon DBIR and CrowdStrike Threat Report that authentication is the weak link and initial attack vector of choice for adversaries. Existing authentication methods simply fall short.

If you want to view the keynote sessions or the technology demonstrations, you can register here:

Watch Now

Session list:

I wanted to share a few themes that came up across multiple sessions. So without further ado…

1. You can’t get to zero trust footing without addressing the authentication vulnerability.

We know passwords (any shared secret) are completely inadequate for validating a user's identity. Unfortunately, the last two years have also demonstrated that traditional MFA (one-time passwords, magic links, and mobile push) are barely a speed bump. There are just too many easy-to-use, open source methods and hosted services enabling adversaries to launch MFA bypass attacks or social engineering techniques that work. 

FIDO2 is now the gold standard for phishing-resistant authentication, and as Dr. Jasson Casey points out in his session on the key requirements for Zero Trust Authentication, cryptographic FIDO2 passkeys are a great first step and there are other ingredients required to harden authentication. 

2. The device matters

The topic of “device trust” came up quite a few times. Traditional authentication systems ignore this part of the authentication equation, but they do so at your peril. It matters who is gaining access to apps, resources, and data, but it also matters what is gaining access—what device the user is bringing to the party. 

Ensuring that the endpoint the employee or contractor is using to access resources and data is paramount. The user and the endpoint device are the primary targets, so ensuring that the appropriate controls are in place before allowing access needs to be an equal part of modern, secure authentication capability.

3. Zero Trust Authentication is a team sport

Incorporating risk signals from your existing cybersecurity tooling (MDM, EDR, ZTNA, and more), has become critical to ensuring that only authorized users with secure devices gain access. No single technology has a lock on risk, but they all have risk signals that can contribute to improved authentication decisions. Gaining additional/maximum protection value from the tools you have already implemented just makes sense, but too often, the solutions just don’t work in concert and signals that could be helpful in stopping an attack are not leveraged to stop an attack. 

Making a better, risk-based authentication decision is part of the “team sport” equation. The other is the ability to take action to stop an adversary from gaining initial access or moving laterally to access additional resources. This was one of the key reasons Beyond Identity developed the Zero Trust Authentication subcategory and joined forces with cybersecurity technology leaders to advance the state of authentication dramatically. The goal is to make better authentication decisions and take action when needed. 

4. Once-and-done authentication is not nearly enough

Continuous validation is the new sheriff in town. One theme widely echoed across the sessions is that the once-and-done approach to authentication is flawed. Authenticating a user with an initial challenge, even a strong MFA challenge, only gets you so far. Unfortunately, because of the friction of the many legacy MFA tools that make users jump through hoops (find a second device, reply to a prompt, etc.), organizations are forced to make the security versus usability tradeoff. 

The solution is often to set session timers to days, weeks, or sometimes months. But we know users log in and walk away from their devices. We also know users can change a security setting (e.g., turn off the firewall or the lock screen) and adversaries can successfully deploy malware via a phishing link. 

Continuous authentication has become a must-have. And similar to the NYC subway advice “if you see something, say something”, if something looks suspicious, then the authentication solution needs to be able to take action to quarantine the device or kick it off the network. Even during authenticated sessions. When that happens, the threat cannot maintain access or move further into the network.

5. Zero trust is a journey worth taking

One important conclusion from the various panels of experts is that the zero trust thought process and moving a security program toward zero trust can really improve the situation. The panelists acknowledged the overuse of the term “zero trust,” especially by vendors who have nothing to offer, has turned a few off. But while the consensus opinion was that no one technology provides complete zero trust, they all believed that it was a journey worth taking and fixing the massive authentication vulnerability was an important foundational step.  

For more on Zero Trust Authentication, including the seven key requirements for a Zero Trust Authentication solution, I suggest reading:

  • The Rise of Zero Trust Authentication - a white paper that discusses how phishing-resistant, passwordless authentication advances zero trust security
  • Zero Trust Authentication: Securing User and Device Access for a Distributed, Multi-Cloud World - an ebook written by Jon Friedman of AimPoint Group that describes:
  • The role of authentication in zero trust security
  • The fatal shortcomings in existing authentication  
  • Technologies that can provide passwordless, phishing-resistant MFA
  • Low-friction authentication that simplifies deployment and ensures user acceptance
  • How Zero Trust Authentication integrates with security tools and strengthens your overall security program
  • How you can deploy Zero Trust Authentication fast and generate quick wins

Five Takeaways from the Zero Trust Leadership Series Kickoff

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

On March 15, we kicked off our Zero Trust Leadership series with a virtual event attended by over a thousand global participants. We were very fortunate to have a who’s who list of security industry leaders providing zero trust solutions, including CrowdStrike, Palo Alto Networks, BeyondTrust, and Ping Identity. Dr. Zero Trust himself (aka Chase Cunningham) was in the house, along with CISOs, CIOs, and prominent service providers, including World Wide Technology, Optiv, GuidePoint Security, FIDO, and Climb Channel Solutions. 

The overarching goal of the event was to provide practical guidance to help participants begin or extend their zero trust journey. A related goal was to define a new subcategory—Zero Trust Authentication. Zero Trust Authentication meets the much higher standard required to shut the door on the largest single vulnerability that organizations face today—passwords and weak MFA. As Dr. Zero Trust noted (he kinda pounded the table on this one), we have significant data-based evidence over multiple years from reports like the annual Verizon DBIR and CrowdStrike Threat Report that authentication is the weak link and initial attack vector of choice for adversaries. Existing authentication methods simply fall short.

If you want to view the keynote sessions or the technology demonstrations, you can register here:

Watch Now

Session list:

I wanted to share a few themes that came up across multiple sessions. So without further ado…

1. You can’t get to zero trust footing without addressing the authentication vulnerability.

We know passwords (any shared secret) are completely inadequate for validating a user's identity. Unfortunately, the last two years have also demonstrated that traditional MFA (one-time passwords, magic links, and mobile push) are barely a speed bump. There are just too many easy-to-use, open source methods and hosted services enabling adversaries to launch MFA bypass attacks or social engineering techniques that work. 

FIDO2 is now the gold standard for phishing-resistant authentication, and as Dr. Jasson Casey points out in his session on the key requirements for Zero Trust Authentication, cryptographic FIDO2 passkeys are a great first step and there are other ingredients required to harden authentication. 

2. The device matters

The topic of “device trust” came up quite a few times. Traditional authentication systems ignore this part of the authentication equation, but they do so at your peril. It matters who is gaining access to apps, resources, and data, but it also matters what is gaining access—what device the user is bringing to the party. 

Ensuring that the endpoint the employee or contractor is using to access resources and data is paramount. The user and the endpoint device are the primary targets, so ensuring that the appropriate controls are in place before allowing access needs to be an equal part of modern, secure authentication capability.

3. Zero Trust Authentication is a team sport

Incorporating risk signals from your existing cybersecurity tooling (MDM, EDR, ZTNA, and more), has become critical to ensuring that only authorized users with secure devices gain access. No single technology has a lock on risk, but they all have risk signals that can contribute to improved authentication decisions. Gaining additional/maximum protection value from the tools you have already implemented just makes sense, but too often, the solutions just don’t work in concert and signals that could be helpful in stopping an attack are not leveraged to stop an attack. 

Making a better, risk-based authentication decision is part of the “team sport” equation. The other is the ability to take action to stop an adversary from gaining initial access or moving laterally to access additional resources. This was one of the key reasons Beyond Identity developed the Zero Trust Authentication subcategory and joined forces with cybersecurity technology leaders to advance the state of authentication dramatically. The goal is to make better authentication decisions and take action when needed. 

4. Once-and-done authentication is not nearly enough

Continuous validation is the new sheriff in town. One theme widely echoed across the sessions is that the once-and-done approach to authentication is flawed. Authenticating a user with an initial challenge, even a strong MFA challenge, only gets you so far. Unfortunately, because of the friction of the many legacy MFA tools that make users jump through hoops (find a second device, reply to a prompt, etc.), organizations are forced to make the security versus usability tradeoff. 

The solution is often to set session timers to days, weeks, or sometimes months. But we know users log in and walk away from their devices. We also know users can change a security setting (e.g., turn off the firewall or the lock screen) and adversaries can successfully deploy malware via a phishing link. 

Continuous authentication has become a must-have. And similar to the NYC subway advice “if you see something, say something”, if something looks suspicious, then the authentication solution needs to be able to take action to quarantine the device or kick it off the network. Even during authenticated sessions. When that happens, the threat cannot maintain access or move further into the network.

5. Zero trust is a journey worth taking

One important conclusion from the various panels of experts is that the zero trust thought process and moving a security program toward zero trust can really improve the situation. The panelists acknowledged the overuse of the term “zero trust,” especially by vendors who have nothing to offer, has turned a few off. But while the consensus opinion was that no one technology provides complete zero trust, they all believed that it was a journey worth taking and fixing the massive authentication vulnerability was an important foundational step.  

For more on Zero Trust Authentication, including the seven key requirements for a Zero Trust Authentication solution, I suggest reading:

  • The Rise of Zero Trust Authentication - a white paper that discusses how phishing-resistant, passwordless authentication advances zero trust security
  • Zero Trust Authentication: Securing User and Device Access for a Distributed, Multi-Cloud World - an ebook written by Jon Friedman of AimPoint Group that describes:
  • The role of authentication in zero trust security
  • The fatal shortcomings in existing authentication  
  • Technologies that can provide passwordless, phishing-resistant MFA
  • Low-friction authentication that simplifies deployment and ensures user acceptance
  • How Zero Trust Authentication integrates with security tools and strengthens your overall security program
  • How you can deploy Zero Trust Authentication fast and generate quick wins
Book

Five Takeaways from the Zero Trust Leadership Series Kickoff

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Download the book

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.