CrowdStrike’s mission is to stop breaches from all adversaries including nation-states, criminal organizations, and even from insider threats. We will reveal our findings of key tactics and techniques used by these adversaries and how to leverage this information to develop an adversary focused Zero Trust strategy. Through a use case based approach, we will show the top five CISO best practices to stop these modern attacks while showing value to the business for all stages of Zero Trust deployment maturity.