{"guid":"6bdbab59-f82b-5ec3-805c-921677f9d993","title":"How to bluff your way into Zero Trust","subtitle":null,"slug":"why2025-212-how-to-bluff-your-way-into-zero-trust","link":"https://program.why2025.org/why2025/talk/BVSMJZ/","description":"Zero Trust (ZT) is a security paradigm gaining traction and popularity.\nIn the talk I will show how ZT is the progression of many security ideas that you may already be familiar with, and how you can rebrand and review what you are already doing to show that you are making progress.\n\nZero Trust (ZT) is a security paradigm gaining traction, especially in the US defense community. The underlying idea is to reduce implicit trust as much as possible. This makes great sense from a security perspective. \nIts implementation is daunting though, because it is not about dropping a new product in the security landscape. Instead, it is more an approach and a process. It is still hard to prioritize ZT and to retrofit it to existing system architectures.\nIn the talk I will show how ZT is the progression of many security ideas that you may already be familiar with, and how you can rebrand and review what you are already doing to show that you are making progress.\n\nOutline:\nAs a contributor to the Cloud Security Alliances Zero Trust cert (CCZT), and experienced instructor, I intend to borrow from the (public) body of knowledge and my experiences in teaching that.\nThis will give the audience a good insight in Zero Trust content and trends.\n\nThis will include\n- the core idea (never trust, always verify)\n- the major use cases\n- business value of ZT\n- steps in implementing\n- publicly available maturity models\n- example implementations and status thereof (e.g. US Airforce)\n- link to earlier principles\n- retrofitting ZT on an existing application\n- experiences\n\nLicensed to the public under https://creativecommons.org/licenses/by/4.0/","original_language":"eng","persons":["Peter van Eijk"],"tags":["212","2025","why2025","Wonderful creations","Brachium","why2025-eng","Day 4"],"view_count":245,"promoted":false,"date":"2025-08-10T22:00:00.000+02:00","release_date":"2025-08-11T00:00:00.000+02:00","updated_at":"2026-03-18T19:30:07.227+01:00","length":3256,"duration":3256,"thumb_url":"https://static.media.ccc.de/media/events/why2025/212-6bdbab59-f82b-5ec3-805c-921677f9d993.jpg","poster_url":"https://static.media.ccc.de/media/events/why2025/212-6bdbab59-f82b-5ec3-805c-921677f9d993_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/why2025/212-6bdbab59-f82b-5ec3-805c-921677f9d993.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/why2025/212-6bdbab59-f82b-5ec3-805c-921677f9d993.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/why2025-212-how-to-bluff-your-way-into-zero-trust","url":"https://api.media.ccc.de/public/events/6bdbab59-f82b-5ec3-805c-921677f9d993","conference_title":"What Hackers Yearn 2025","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025","related":[],"recordings":[{"size":452,"length":3256,"mime_type":"video/webm;codecs=av01","language":"eng","filename":"why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_av1-hd.webm","state":"new","folder":"av1-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-11T19:22:38.409+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/av1-hd/why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_av1-hd.webm","url":"https://api.media.ccc.de/public/recordings/89589","event_url":"https://api.media.ccc.de/public/events/6bdbab59-f82b-5ec3-805c-921677f9d993","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":621,"length":3256,"mime_type":"video/webm","language":"eng","filename":"why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-11T17:44:33.772+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/webm-hd/why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/89527","event_url":"https://api.media.ccc.de/public/events/6bdbab59-f82b-5ec3-805c-921677f9d993","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":143,"length":3256,"mime_type":"video/webm","language":"eng","filename":"why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-11T17:17:05.141+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/webm-sd/why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/89520","event_url":"https://api.media.ccc.de/public/events/6bdbab59-f82b-5ec3-805c-921677f9d993","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":49,"length":3256,"mime_type":"audio/mpeg","language":"eng","filename":"why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-11T14:37:07.181+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/mp3/why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/89474","event_url":"https://api.media.ccc.de/public/events/6bdbab59-f82b-5ec3-805c-921677f9d993","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":31,"length":3256,"mime_type":"audio/opus","language":"eng","filename":"why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-11T14:37:02.811+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/opus/why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_opus.opus","url":"https://api.media.ccc.de/public/recordings/89473","event_url":"https://api.media.ccc.de/public/events/6bdbab59-f82b-5ec3-805c-921677f9d993","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":162,"length":3256,"mime_type":"video/mp4","language":"eng","filename":"why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-11T13:21:07.557+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/h264-sd/why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_sd.mp4","url":"https://api.media.ccc.de/public/recordings/89436","event_url":"https://api.media.ccc.de/public/events/6bdbab59-f82b-5ec3-805c-921677f9d993","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":607,"length":3256,"mime_type":"video/mp4","language":"eng","filename":"why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-11T13:16:54.324+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/h264-hd/why2025-212-eng-How_to_bluff_your_way_into_Zero_Trust_hd.mp4","url":"https://api.media.ccc.de/public/recordings/89397","event_url":"https://api.media.ccc.de/public/events/6bdbab59-f82b-5ec3-805c-921677f9d993","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"}]}