Events , Governance & Risk Management , RSA Conference

Make Zero Trust Happen

Lieuwe Jan Koning, Co-Founder and CTO, ON2IT Dispels Zero Trust Misconceptions
Lieuwe Jan Koning, co-founder and CTO, ON2IT

Some organizations start out thinking that it's too challenging to embrace zero trust security or that it is a one-and-done strategy. But taking a slow and steady approach at the beginning can really help in realizing the much wider critical value, said Lieuwe Jan Koning, co-founder and CTO, ON2IT.

"Zero trust products do not exist. It is a thought. In order to make zero trust happen, you have to embrace it and execute it time after time," Koning said. "It's easy to imagine how difficult it may be, but if you start small and apply zero trust in a portion of your network, suddenly it becomes much easier," he said.

"Once a customer starts to understand this, it becomes clear that this is something you repetitively do and it gets into the core of you. Over time, you get used to applying zero trust principles everywhere. Then you're doing zero trust without even knowing it."

In this video interview with Information Security Media Group at RSA Conference 2024, Koning also discussed:

  • Other misconceptions about zero trust;
  • How his relationship with John Kindervag - who first coined the term "zero trust" more than a decade ago - has influenced ON2IT's direction;
  • How ON2IT operationalizes zero trust differently from traditional security models.

Koning is co-founder and CTO of ON2IT Cybersecurity.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.