InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Zero Trust Series | E2: A Brief History of Zero Trust

Presented by

Andrew Balzarini - andrew@wildflowerintl.com

About this talk

The concept of zero trust emerged in 2009 and challenged the traditional security model that relied on perimeter defense, assuming that everything inside the network is trustworthy. Initially proposed by John Kindervag, the Zero Trust model gained attention as cyber threats evolved beyond traditional defenses. The model gained momentum as cybersecurity professionals and companies recognized its effectiveness against increasingly sophisticated threats. Google's implementation of a similar concept, BeyondCorp, reinforced the zero trust principles by adopting a model that focused on device and user authentication rather than a trusted network perimeter. This further popularized the idea of Zero Trust security beyond Forrester's initial concept. Over time, with the rise in remote work, cloud computing, and diverse endpoint devices accessing networks, the Zero Trust model evolved into a comprehensive security strategy centered on continuous verification and strict access controls. While Zero Trust is becoming a guiding principle for modern cybersecurity frameworks, it can be surrounded by myths and misconceptions.
Wildflower International

Wildflower International

417 subscribers19 talks
We Petal Technology
Empowering a secure, efficient, and innovative future for our nation’s most critical missions - Since 1991, Wildflower International, a WOSB, HUBZone business, headquartered in Santa Fe, NM has been providing information technology products, services, and solutions to Federal Government departments, specifically the Department of Energy and their DOE NNSA sites, DOD, DHS, and other agencies. Out primary contract vehicles include ITES-3H, SEWP V, DHS First Source II, GSA, SCMC, and MEUAS IV.
Related topics