A roadmap to zero-trust maturity: 6 key insights from Forrester

Once an enterprise decides to go all-in on zero trust, it usually starts strong, only to hit barriers no one saw coming. This makes a roadmap essential.

Seeing its clients who are pursuing zero trust facing challenges in reaching the next level of maturity, Forrester invested a year of its zero trust team’s time in creating the roadmap they need.

Forrester’s recent report, Chart Your Course to Zero Trust Intermediate, offers clients direction for achieving an intermediate level of zero-trust maturity. It features nearly 40 tasks and technologies across the seven zero-trust domains — data, people, devices, workloads, visibility and analytics, automation and orchestration, and networks — that every organization pursuing a zero-trust strategy can use.

Note: The Cybersecurity and Infrastructure Security Agency (CISA) also has a zero trust maturity model. It parallels Forrester’s in that it includes three levels — traditional, advanced and optimal — comparable to Forrester’s beginner, intermediate and advanced levels.

Why a detailed zero-trust roadmap now?

Senior research analyst David Holmes, one of the report’s authors, writes in the blog post All Aboard: Chart Your Course to Zero Trust Intermediate that “we chose an intermediate rather than the advanced target of maturity for this report because the majority of Forrester clients and other organizations that we talk to are at the beginning stage of zero trust.”

The report, Holmes writes, “is a foundational piece of research from the zero trust analyst team at Forrester, representing a year of collation, collaboration, creation, and review. It builds on one of our most widely read reports, A Practical Guide to a Zero Trust Implementation [client access required] but goes much deeper into what needs to be done. The ‘Chart Your Course’ report centers around 37 tasks, grouped into five phases.”

Forrester organized the roadmap by assigning four parameters to each task: difficulty, impact, priority, and dependency resolution.

Leading zero-trust experts and risk professionals peer-reviewed the report…

Read Full Article: Venture Beat

Ronald van Loon
The increasing adoption of technology and AI in business continues to drive concerns regarding sensitive data and the protection of assets. Organizations must implement tools to protect data while also leveraging that data to identify ...
Cloudtweaks Comic Ai
How AI Is Important for Businesses Shifting to Remote Work The Coronavirus Pandemic has taught us that organizations must have remote work choices. It is no longer possible to work in a digital environment. The ...
Bailey Smith
Intelligent Deals: The Role of AI in M&A It’s no secret that artificial intelligence (AI) is revolutionizing many industries with its fast capabilities and predictive nature. From writing code to drafting documents, AI has become ...
Vulnerabilities
Cyber Threat Intelligence In an era of rapid digital transformation, we have witnessed a concerning evolution in the cyber threat landscape. Recent data analyses, as illustrated in the "Cyber Threat Intelligence Index: Q3 2023" report, ...
Steve Prentice
The Need for Experts The explosion in AI technologies has brought with it clear concern that easy answers and intelligent copywriting are now the domain of machines. This has led to the question of whether ...
Ronald van Loon
In 2030, AI will likely contribute around $15.7 trillion to the global economy. Organizations that invest significantly in AI and leverage practices that accelerate and scale AI development have been shown to gain the highest ROI from AI ...