21,99 €
Expert guide to create Zero Trust digital environments in an AI-everywhere landscape
Rise of the Machines: A Project Zero Trust Story is a continuation of the 2023 bestseller Project Zero Trust, picking up where the first book left off and addressing issues not covered in the first installment: artificial intelligence, mergers and acquisitions, antivirus, business continuity, and remote work. Artificial Intelligence is the dominant issue discussed in every chapter, providing a case-study-based approach to applying zero trust principles to all the various aspects of artificial intelligence, from MLOps, used by security teams, to use of GPTs, chatbots, and adversarial AI.
AI transforms technology by enabling unprecedented automation and decision-making, but securing it with a Zero Trust approach is essential because AI inherently relies on trusted data and systems, making it a target for manipulation. The book also includes discussion around regulatory issues and the alignment of regulation around Zero Trust practices.
Written by George Finney, 2024 recipient of the Baldrige Foundation Leadership Award for Cybersecurity and recognized as one of the top 100 CISOs in the world in 2022, this book provides key insights on:
Rise of the Machines: A Project Zero Trust Story is a timely, essential read for all IT professionals across industries, including network engineers, system administrators, and cloud architects.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 395
Veröffentlichungsjahr: 2025
Cover
Table of Contents
Title Page
Copyright
Foreword
About the Authors
Acknowledgments
Introduction
Chapter 1: AI-pocalypse Now
Key Takeaways
Chapter 2: No Artificial Trusts Added
Key Takeaways
Chapter 3: Generative AI
Key Takeaways
Chapter 4: Arch-AI-tecting Controls
Key Takeaways
Chapter 5: Trusty AI Sidekick
Key Takeaways
Chapter 6: Smooth AI-operator
Key Takeaways
Chapter 7: The Most Important Part of Zero Trust: People
Key Takeaways
Chapter 8: AI-dentity Theft
Key Takeaways
Chapter 9: Algorithms and Adversaries
Key Takeaways
Chapter 10: The End of Trust
Key Takeaways
Appendix A: The Cast of Characters
Appendix B: Tabletop Exercise: Master Scenario Events List
Glossary
Endnotes
Index
End User License Agreement
Chapter 2
Figure 2.1 MLOps and LLMOps conceptual development framework
Chapter 3
Figure 3.1 Decision process on SEC materiality
Chapter 4
Figure 4.1 Common attack patterns targeting each stage of the AI development fr...
Figure 4.2 The four functions of the NIST AI Risk Management Framework
Chapter 6
Figure 6.1 Actual exchange with ChatGPT 4.0 showing a hallucination for a well-...
Figure 6.2 Sample Python code snippet displaying various roles for the ChatGPT ...
Figure 6.3 Summary of the hidden Apple system prompt for the Smart Reply featur...
Chapter 7
Figure 7.1 Each quadrant represents one of the four internal cybersecurity habi...
Chapter 10
Figure 10.1 Comparison of results of a 2016 OECD study about the potential impac...
Cover
Table of Contents
Title Page
Copyright
Foreword
About the Authors
Acknowledgments
Introduction
Begin Reading
Appendix A: The Cast of Characters
Appendix B: Tabletop Exercise: Master Scenario Events List
Glossary
Endnotes
Index
End User License Agreement
i
ii
v
vi
vii
viii
ix
x
xi
xii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
When AI and Zero Trust Collide
George Finney with Zach Vinduska
Copyright © 2025 by John Wiley & Sons, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.
The manufacturer’s authorized representative according to the EU General Product Safety Regulation is Wiley-VCH GmbH, Boschstr. 12, 69469 Weinheim, Germany, e-mail: [email protected].
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Control Number: 2025906749
Paperback ISBN: 9781394303717
ePDF ISBN: 9781394303731
ePub ISBN: 9781394303724
oBook ISBN: 9781394352517
Cover images: Big data research and conversion process set. © Iconic Prototype/stock.adobe.com, Ai chatbot consultant concept vector flat style design illustration © Siberian Art/stock.adobe.com, Research center for artificial intelligence and robots. © YummyBuum/stock.adobe.com.
Cover design by Jon Boylan
Once again, I am honored to write the foreword to another book by my good friend George Finney. This novel, Rise of the Machines: A Project Zero Trust Story, is a sequel to Project Zero Trust, a landmark cybersecurity novel now properly ensconced in the Cybersecurity Cannon Hall of Fame.
Rise of the Machines focuses on the intersection of Zero Trust and artificial intelligence. It does this with amazing simplicity. While AI is a complex topic that means so many different things in different contexts, George does a masterful job of making every aspect of AI understandable to individuals who are not experts in the nuances of all of the acronyms and buzzwords. We throw around TLAs (Three-Letter Acronyms) like candy: GAI, LLM, ML (yeah, it’s two letters, but you get the point). George demystifies all of these terms for the rest of us and then tells us specifically how to begin the journey of protecting these critical systems using a Zero Trust strategy.
This novel is not a dry, technical read. It creates characters that resonate with each of us. It also provides an eye-opening context for the AI discussion about our perceptions of AI. One of my favorite scenes in the novel occurs early in Chapter 2 (not a spoiler, I promise), when one of the characters asks, “When anyone talks about AI, why do we always make them evil?”
What a great question. George then goes on a litany of all of the evil AI characters we’ve seen in movies and TV. In fact, I’ve often thought that most of what the general public understands about any technology is primarily shaped by the mass media. In cybersecurity writ large, most of this perception is inaccurate. In AI, the doomsday predictions are loud and boisterous, but the reality remains to be revealed.
From my numerous conversations and BBQ Lunches (we live near each other) with George over the past few years, I know he has thrown his entire being into AI research to provide you, the reader, with as much accurate information as possible. This is done with finesse inside of an engaging story. He is educating us without the typical didacticism and boredom that comes from academia.
George is also a true Zero Trust expert. This is not just because he wrote a book about it, but because he’s implemented it in real life. Zero Trust is experiential, not academic. It’s this experience that George has been able to put on paper so well.
This experience gives Rise of the Machines such punch. A favorite quote in the book comes early in Chapter 1: “We’re still in the early stages of extending Zero Trust to AI. We don’t have a lot of specifics yet, but even if you can’t spell AI, you probably know you need a lot of data. And Zero Trust is all about protecting data.” What a great line. Simple. Intuitive. Unfortunately, this message often eludes practitioners. Folks think in products, not data. The first question you ask in Zero Trust is, “What are you trying to protect?” Of course, in AI, it is the data. The rise of AI will make this truth rise to the top.
Rise of the Machines isn’t a long book. You can read it in a single sitting. It doesn’t waste your time. It doesn’t talk down to you. It’s not preachy or pedantic. George hasn’t padded it out to make it feel weighty. He’s surgically dissected a convergence of two complex topics, AI and Zero Trust, and articulated them in such an engaging way that it makes the reader want to achieve George’s objective: understanding that Zero Trust is simpler than you thought and that it’s a perfect strategy to protect all the various aspects that comprise what we generically call artificial intelligence (AI).
As you read Rise of the Machines, look for all the Easter eggs George has hidden in the novel. George is not only a CISO, cyber expert, and a newly minted AI guru, but he’s also a lawyer, novelist, and painter. And he’s a pop-culture aficionado. I wouldn’t want to play Trivial Pursuit against him. So keep an eye out for the cultural references sprinkled throughout.
Rise of the Machines is a must-read for anyone involved in cybersecurity and/or AI. The convergence of these two topics is accelerating at an unprecedented rate. This will drive the adoption of Zero Trust as the strategic way to protect all of the data and assets that interact with AI-adjacent systems.
I am forever indebted to my good friend George Finney for supporting me in telling the Zero Trust story truthfully and simply. This book is a synthesis of a practitioner and a thinker. In less than 200 pages, George gives us a blueprint for building a Zero Trust environment for our AI systems. That is a laudatory accomplishment. I learned a ton about AI from reading this book and was given a different lens to view the topic.
Thank you, George, for finding new and innovative ways to enlighten us on things others deliberately obfuscate. You make difficult topics accessible. I can’t wait for the next book in the Project Zero Trust Novelistic Universe!
John Kindervag
Denton, TX
January 2025
George Finney is a Chief Information Security Officer who believes that people are the key to solving our cybersecurity challenges. George is the CISO for the University of Texas System and was the recipient of the Malcolm Baldrige Award for Cybersecurity Leadership in 2024, was recognized in 2023 as one of the top 100 CISOs in the world, and in 2022 as University Technology Leader of the Year. George is the bestselling author of several cybersecurity books, including the Cybersecurity Cannon Hall of Fame–winning Project Zero Trust and the Book of the Year Award–winning Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. George has worked in cybersecurity for over 20 years helping startups, global corporations, governments, and nonprofits improve their security posture. George received his Juris Doctorate from SMU, where he was the CISO, and is a licensed attorney. In his spare time, he creates spray-paint pop-art robots.
Zach Vinduska is a cybersecurity leader that is passionate about protecting people and organizations from cybercriminals. He is the Chief Information Security Officer for Credera and manages the Security and Privacy practice and has more than twenty years’ experience leading security and technology teams of all sizes, from start-ups to the Fortune 500. He has led several transformative efforts as well as certification efforts such as SOX, ISO27001 and SOC for both publicly traded and privately held organizations. Zach is an advocate for the education of his fellow CISOs and speaks on the topic at conferences and multiple podcasts including a regular seat on Technically Minded podcast. He serves on multiple security related boards and councils.
I couldn’t have written this book without you, dear reader. This book wouldn’t have been possible without the massive outpouring of support from people all over the world who loved the first book, Project Zero Trust. Thank you for your kind words and your generosity. I’m so excited to be able to continue the story of Dylan and the whole team at MarchFit.
Your support allowed me to make this book even more fun with cool pop-culture references and nerdy humor. But it also gave me the courage to address my own imposter syndrome through the character Dylan. Rather than drive the narrative through the conflict with a threat actor like in the first part of Project Zero Trust, much of the conflict in this book comes through some of the interpersonal challenges that we all face when working together in a team.
When I talked to my publisher, Jim Minatel, about doing a sequel, he gave me that encouraging push that unleashed my creativity. I’m indebted to his guidance and the team of editors and designers and marketers for helping make this second book possible.
John Kindervag may think that I’m crazy, but he’s had my back for years no matter what. He’s not just the father of Zero Trust, he’s an incredible mentor, not just for me, but I’ve heard from many people how much he’s done to help them in their own lives, both personally and professionally. He’s truly a national treasure.
For those of you who don’t know my coauthor, Zach Vinduska, he’s been a CISO for years and helped me workshop ideas for the last book. It only made sense to bring him in to help play an even bigger role in the sequel.
For all the books I write, I do a massive amount of research, which includes talking to people who are much smarter than myself to get their perspectives and insights. I’m humbled to have so much support from legends and luminaries in the cybersecurity world.
First, I want to thank Malcolm Harkins, whom I’ve known for nearly a decade. He and his team at HiddenLayer were instrumental in helping me get to the heart of understanding the details of how to protect AI from cybercriminals.
I’d also like to thank Jim Reavis and Illena Armstrong at the Cloud Security Alliance. This book wouldn’t be possible without their support through their AI Safety Initiative and their generous introductions to so many people in the AI security community. One of the very first conversations I had after writing the book was with Caleb Sima, who helped me understand the big picture of AI and Security and is tireless in his commitment to build up the security community through his passionate work with the CSA.
Security gets better through a community, so I’m incredibly thankful that so many security leaders were willing to pitch in, like the prolific author and founder Ken Huang, who has been working with AI security for years. I’m thankful to Steve Grobman, CTO for McAfee, for his insights and colorful wisdom, really stretching my understanding of AI security. Jason Clinton, CISO for Anthropic, was incredibly thoughtful about where AI is going and what the security implications of this will be. And to Justin “Hutch” Hutchins for his early work on AI and social engineering, you should definitely check out his book, The Language of Deception (Wiley, 2023). And to Dutch Schwartz for providing tons of valuable feedback on early versions of this book.
Finally, I’d like to send a shout-out to Rick Howard for his incredible insights and support for many years. He’s a legend in the security community and makes everyone around him better.
There are so many other people out there that I’m grateful to for your support over the years. If I’ve left you out of this list, please know that my heart is full of gratitude for being a part of my journey.
I love security. I love security so much that my wife, Amanda, is a little jealous. Thank you, Amanda, for all of your support over the years while I pursued my dream of being a writer and making a difference in the world.
An ounce of prevention is worth a pound of cure. When it comes to cybersecurity, prevention is the most effective way of protecting our organizations. And when people inside an organization begin to work together, they need a strategy to follow to align the unique needs of the business with the goal of preventing breaches. Zero Trust is the strategy for prevention in cybersecurity and this is what makes Zero Trust one of the most successful cybersecurity strategies. It focuses on prevention for the thing that cybercriminals target most: trust.
According to a study by Statista in 2024, 43 percent of professionals surveyed worldwide indicate that their organizations have already adopted Zero Trust while another 46 percent of organizations have begun the process of adopting Zero Trust. That means almost 90 percent of all organizations are at some point on their Zero Trust journey. But in just the last two years, almost every organization in the world has also started adopting artificial intelligence (AI), and AI requires that we revisit our Zero Trust posture to ensure our organizations remain protected.
Rise of the Machines is the second book in the Project Zero Trust series. It applies the lessons learned from Zero Trust in the first book to the challenge of protecting organizations that are adopting AI. The Project Zero Trust series uses a fictional case study of a company called MarchFit to show how organizations can adopt a strategy of Zero Trust. More importantly, readers can see how the different roles inside an organization will play a part in the overall Zero Trust effort.
If you haven’t read Project Zero Trust yet, don’t panic! Rise of the Machines can be read as a stand-alone book to understand the challenges of securing AI systems. To get a deeper dive into the Zero Trust principles and design methodology, you can go back and read Project Zero Trust.
Preventing something from happening means that you have some knowledge about what you’re trying to prevent. The pace of change around AI makes prevention a challenge because we can’t always predict what new attacks or exploits will be around the corner. Like many other technology innovations over the last 50 years, AI has been largely developed without security in mind. And, in fact, the way most AI tools have been designed is with one hundred percent trust, meaning they trust all the data and inputs at every level in order to do what they do.
Zero Trust is the most effective strategy we have for securing AI precisely because of AI’s reliance on trust.
While we use terms like AI or machine learning in this book, AI isn’t just one thing. There are many different flavors of AI. This book will examine many of the different use cases of AI today, from LLMs and GPTs, to building your own AI models, to adversarial AI, AI in the SOC, and chatbots or digital avatars. We will use the Zero Trust design methodology to examine each one in turn, providing a case study into how to apply the Zero Trust principles and design methodology to all the different aspects of AI.
This second book also provided an opportunity to elaborate on several topics that we didn’t have time to cover in the first book. Rise of the Machines will also examine how Zero Trust can play a role in critical issues like mergers and acquisitions, business continuity and disaster recovery, endpoint protections, regulation and compliance, ethics, certifications, and culture. All of these issues will also be impacted by AI as time goes on.
We are still in the early days of AI, and we should expect changes to occur at an exponential rate. This makes getting security right for AI systems right today is critical in order to secure our collective future.
Rise of the Machines: A Project Zero Trust Story is an essential read for professionals who are new to technology, as well as seasoned IT leaders, executives, and cybersecurity practitioners who need to understand how to protect their organizations while adopting AI to help their organizations remain competitive. Rise of the Machines demonstrates how Zero Trust can be integrated into any organization adopting AI using easy-to-understand examples, bridging the gap between technical reference guides, vendor marketing, and organizational strategy.
The alarm for Dylan’s smartphone went off again. He had snoozed it several times already, but this time, he dismissed it altogether. He only had 60 seconds before he was supposed to go to the biggest interview of his life. The Cloud Security Alliance was hosting its annual conference for chief information security officers (CISOs). And the keynote speech this year would be a fireside chat with Dylan, CISO for MarchFit. Dylan had successfully led MarchFit’s initial implementation of Zero Trust after a ransomware incident and then became their CISO.
From backstage, Dylan could see the crowd of about 200 CISOs in a ballroom that could have contained the entire MarchFit headquarters. The first rows were filled with couches for the VIPs, then rows and rows of chairs filled with some of the most successful CISOs in the world, with hundreds of years of experience collectively. At the back of the conference were even more security leaders standing up.
Dylan hadn’t been a CISO for very long. He had been in technology for years but had unexpectedly found himself doing security for his company, MarchFit. His team hadn’t just implemented Zero Trust—they helped foil a cybercriminal from getting back into their network after the breach.
From Dylan’s perspective, none of that explained how he was about to give the biggest presentation of his life. He finally understood why everyone says their number-one fear is public speaking. But he had seen firsthand how much of a difference Zero Trust had made, so he hoped he could help make things easier for someone else.
Backstage, there was a monitor that allowed Dylan to see the stage from the audience’s perspective. There were two leather wingback chairs and a table between them, with two bottles of water on the main stage next to a plexiglass podium. Behind the chairs was a giant video screen displaying a loop of an ornate fireplace with a roaring fire.
The conference emcee had silently walked up behind Dylan and patted him on the shoulder. He was startled until he recognized her. She was the reporter who had interviewed his boss, MarchFit’s founder, Olivia Reynolds, at the Consumer Electronics Show two years ago. He remembered her because afterward she had spent an hour grilling Dylan about cybersecurity as she had been working on an investigative piece around a group of nation-state actors and several large Bitcoin transactions. She nodded and gave Dylan a thumbs-up as she walked out to the lights on the stage.
“Hi, I’m Monica Stewart, and I’m a journalist,” she began, pausing after some laughter among the crowd. “I know security people get nervous around reporters. But don’t worry, I’m off duty, but if you have any leads on a good story, you can always reach me . . .” Again, she paused as the rest of the audience joined in the laughter. “When one of my security friends found out I was emceeing the event, they said, ‘Monica, don’t even bring your cell phone. It will get hacked.’ But then the conference organizers require you to have the app to register, so I had to go back to my room to get it!” She paused, and a roar of laughter came from the crowd; she let the noise die back down before she continued.
“I know you’re all probably tired of hearing about AI. So up next, we’ve got a fireside chat to talk about the second biggest buzzword in all of technology: Zero Trust.” The crowd applauded with a hoot as the clapping started to fade.
“You can find the info for the guest Wi-Fi network on each of the tables in front of you. We’d like to ask that you please refrain from hacking the Wi-Fi network.” She gave the audience a moment to allow the cheers to die down. “But seriously, we want to get invited back for this conference next year. And for the other half of our fireside chat,” she continued, “we’d like to welcome Dylan Thomas, chief information security officer for MarchFit, to talk about their Zero Trust journey.”
Dylan walked in from the opposite side of the stage as the crowd and joined Monica. They sat down across from each other.
“Thanks, Monica,” Dylan said. “I got a Faraday cage for my phone just for this event.” The crowd cheered at this.
Monica smiled and steepled her fingertips. “Dylan,” she began as a hush went over the crowd, “you’ve come into some notoriety lately for how your company was able to stop a cybercriminal by using a technique called Zero Trust. Some of the people here might not know what that is. How would you explain that to someone who has never used a computer?”
Dylan cleared his throat nervously, attempting to smile back at Monica, but it probably looked like he needed to sneeze. This wasn’t one of the questions they had prepared for.
Dylan thought back to a conversation he had with one of his colleagues, Rose, a few weeks ago. She was the person who helped bring down the cybercriminal Encore, aka Richard Greyson. Greyson thought he could intimidate her into giving him access into MarchFit’s network after they had launched their Zero Trust project. He didn’t realize she was a Brazilian jiu-jitsu practitioner and wasn’t going to be intimidated by anyone.
“Zero Trust is like kung fu,” Dylan began. “Before we get into a debate about whether Brazilian jiu-jitsu or Krav Maga is better, I’m just using ‘kung fu’ as a general term for the personal discipline involved in mastering a martial art. Zero Trust is the discipline of protecting yourself and your community in the cyber world. The cybercriminals need trust to disrupt our businesses.”
“Thanks, Dylan, that makes a lot of sense,” Monica said. “I can see how there may be a lot of different definitions of Zero Trust. What’s your technical definition?”
Dylan explained, “Zero Trust is a strategy for preventing or containing breaches by removing the trust relationships we have in digital systems. Every business leader knows that a strategy is critical for success in any part of the organization, and that’s why Zero Trust resonates so much with them. We know from studying successful breaches that the thing the cybercriminals need to get in is trust. Hence the name, Zero Trust. And we need a strategy because everyone in our company needs to be on the same page about how we’re going to accomplish that. Zero Trust is like a rallying cry, getting everyone moving in the same direction.”
“Sounds expensive!” Monica said.
“It doesn’t have to be!” Dylan laughed easily. He had heard that kind of criticism of cybersecurity over the years. “You’ve probably heard the old adage that an ounce of prevention is worth a pound of cure. Because we focus on preventing bad things from happening, we know that Zero Trust is the most cost-effective strategy for securing our organizations. It’s much cheaper than paying millions in a ransomware incident or losing clients to a competitor because we didn’t get security right. You don’t necessarily need to go out and buy a bunch of new tools to make that happen. Sometimes you can even reduce the number of tools you use and simply deploy them more effectively with Zero Trust.”
“But don’t we need to trust our employees?” Monica asked.
“Our adversaries don’t have the element of surprise anymore. We know what they’re after: money, information, secrets. We also know how they get it. No matter what technology you use or what industry you’re in or what role you may play in your organization, the one common denominator of the thing that attackers exploit is trust. We’ve evolved our defense to focus on trust relationships in digital systems. But Zero Trust is about removing trust relationships from digital systems. We need to trust our people to work together as a team to achieve our mission of Zero Trust.”
“Thanks for clarifying that, Dylan,” Monica said. “But so far at least, I’m not hearing a lot of specifics. Usually with a strategy like this, I’d expect to see some design principles.”
“I think we have a slide prepared that might help with this,” Dylan said. The fireplace behind Monica and Dylan was replaced with a black slide and a bulleted list:
Principles of Zero Trust
Focus on business outcomes.
Design from the inside out.
Determine who or what needs access.
Inspect and log all traffic.
Dylan took a sip of water and continued: “I love that Zero Trust starts with understanding the specific business you work for. Different companies or different risk appetites. They use technology in different ways. They have different ways of making money. The security industry has talked about aligning the businesses with security for years, and this was the first principle of Zero Trust from the beginning.”
Monica was nodding along, so Dylan continued. “The next principle is that we need to architect our organizations like jawbreakers instead of M&Ms. We can’t be crunchy on the outside and chewy in the middle. They should be hard all the way through, and the best way to do that is by starting from the middle, with your crown jewels, and working your way out from there. A lot of people correlate microsegmentation or deperimeterization with Zero Trust, and that falls under this principle.”
“I love jawbreakers. But not everyone has the patience for them,” Monica said, getting a chuckle from the crowd.
“Knowing how your business works means narrowly tailoring your security to the organization,” Dylan continued, “so you need to know both the human and nonhuman identities and use least privilege to provide granular access to everything. And we’ll regularly review if people still need access to that data or have expiration dates on certain privileges.”
Monica was looking thoughtful, so Dylan paused, but when the reporter didn’t ask a question, he continued. “We know the first thing that cybercriminals do when they get in is to cover their tracks. Since we assume we’re going to be breached with Zero Trust, we know we’ll need to capture everything so that we can be successful at containment. The worst question to get from a board member is ‘How did this happen?’ when you don’t have the logs to be able to answer the question.”
“I feel like I’m starting to understand cybersecurity, which is really scary,” Monica admitted. “These principles are great, but how can the CISOs in the room go back to their organizations and actually take the first steps on their own Zero Trust projects?”
Dylan used that moment to take a deep breath. “I just happen to have a slide for that as well,” he said, getting several laughs and a few claps from different parts of the audience. A second slide appeared behind them, this showing a new list that read:
Zero Trust Methodology
Define your protect surface.
Map transaction flows.
Architect your environment.
Create Zero Trust policies.
Monitor and maintain.
“After John Kindervag coined the phrase Zero Trust, he spent the next decade and a half doing strategic security consulting for businesses all over the world. And he didn’t want to just swoop in for a week and leave. He needed a repeatable methodology that covered all the different aspects of a Zero Trust initiative so that organizations could sustain their progress and measure their maturity. These five steps are his methodology.”
“What’s a protect surface?” Monica asked. “That sounds like a new dance move that’s taking nightclubs by storm.”
“Think of it like a safe you’re putting your crown jewels into. You might have 10 or 20 different safes of different sizes. The safes might have better and better locks depending on how important the contents are. And typically, you’d put all your credit card numbers in one specific safe, not all of them. If someone breaks in, you’ve limited them to getting what’s in just one of those safes.”
“That makes sense,” Monica said. “It’s like that microsegmentation concept you mentioned earlier.”
“Exactly. But starting with the protect surface, you’ll build an interdisciplinary team of everyone who plays a role in securing that protect surface. Your firewall admin, your antivirus analyst, your server admins, your developers, and the identity team should all be engaged so that they can coordinate their efforts more effectively.”
“Am I right that the ransomware gang hit on your first day?” Monica asked. “What are some surprising things you learned on the way?”
“Yes, it’s true,” Dylan replied. “It seems obvious to say this, but I think the most important thing I realized is that you can’t be one click away from going out of business. With Zero Trust, instead of asking what went wrong after the fact and attempting to fix it, we ask what needs to go right for the business to succeed and then ensuring what must go right goes right. We’re moving away from firefighting each incident toward problem management by asking what the root causes of those incidents are. There’s no concept of unknown traffic. If something is unknown, it’s blocked.”
“I read a lot about Zero Trust architecture to prepare for this interview, so I’m surprised that you haven’t talked about architecture at all,” Monica said.
“I know lots of folks talk about Zero Trust architecture, but it’s important to say again here that Zero Trust is a strategy. Zero Trust architecture is just one of the steps in the design methodology, and it requires you to have done your homework up front. If you narrowly tailor your security controls to each protect surface, you can reduce the number of tools in each protect surface to only what is needed to accomplish security.”
As Dylan finished answering the question, a text message alert from a smartphone in the audience went off. Several people laughed nervously. Then several more text alerts went off.
“Uh-oh, I know it’s always a bad sign at a security conference when so many phones go off at the same time!” Monica joked. “Well, let y’all get back to your work, but I think we have time for one more question.”
The man whose cell phone went off initially nervously raised his hand. There was a pause while one of the conference staff brought him a microphone.
“So sorry I didn’t have my phone on silent, Dylan. But the alert I just got was that MarchFit just announced it is acquiring an AI start-up, NutriNerd. I wonder if you could talk about how you’ll use Zero Trust with AI.”
Dylan had snuck a peek at his own phone while the man was asking the question. He had gotten a ton of text messages from his team about the new acquisition. No one on his team knew about it, including him.
“So sorry, I can’t comment on the specific details about the acquisition at this time.” Dylan answered. “We’re still in the early stages of extending Zero Trust to AI. We don’t have a lot of specifics yet, but even if you can’t spell AI, you probably know you need a lot of data. And Zero Trust is all about protecting data. Maybe y’all will have me back at your next conference and I’ll let you know if I was right or not.”
Later that afternoon, Dylan walked into a pizzeria right across from the convention center and spotted Aaron Rappaport sitting at a small table for two. Dylan couldn’t remember having seen Aaron wearing a pair of shorts, but he was dressed like a surfer wearing flip-flops. Noticing the stare he was getting from Dylan, Aaron explained, “The title of our presentation was ‘Life’s a Breach’ and I lost a bet.”
Aaron had helped introduce Dylan to the principles of Zero Trust after he started at MarchFit. They had kept in touch since then, trading links to articles and cybersecurity memes. The table rocked slightly as he sat down, and Dylan noticed that a small coaster had slid from under a table leg. He returned it to its place and tested the table as Aaron finished chewing a slice.
“Congrats on the new acquisition,” Aaron said as Dylan sat back down.
“I can’t even talk about it,” Dylan sighed. “You probably know more than I do at this point. Sorry I’m late—it took me an hour to get out of there after all the questions from people as we walked out.”
“Sorry I missed your session! But don’t tell me you didn’t know about the acquisition,” Aaron said, frowning.
“News to me. Announced right when we started the Q&A,” Dylan said, tearing off a piece of bread and taking a bite.
“You don’t know how often I hear that. Mergers and acquisitions teams don’t pay enough attention to cybersecurity, in my opinion.” Aaron and Dylan each took a bite at the same time, each enjoying their pizza in silence. “Makes it so much more challenging to secure the company,” Aaron continued. “But just follow the methodology. Move the new company into your existing protect surfaces or add new ones where appropriate.”
“I’m afraid I don’t know much about AI,” Dylan said. “I’ll admit I’m a little nervous. Just when I felt like we were starting to do a good job, we’re starting over.”
“This is the most exciting time for cyber,” Aaron explained. “We’re at the forefront of securing the biggest technology leap in human history. There’s a lot of collaborating and sharing going on in the cybersecurity community to help.”
“Please tell me you’ve got a roadmap for doing Zero Trust with AI.”
“Zero Trust is the only way that AI will be able to be secured. One of the fundamental issues with GPTs, for example, is that users have access to all the data in the training model. That’s one hundred percent trust. In a way, AI itself is based around trust. AI trusts the data it’s trained on. There are some ways that people are putting guardrails around certain queries, but we’ll need to come up with new techniques to protect and monitor data. I think you’ll be the one giving the answers to that at your next conference.”
“It’s not just that—we’ve got to merge with a whole new company at the same time!” Dylan said. “I know we can do it, but the learning curve seems pretty steep.”
“I’ve helped with a few due diligence efforts in mergers,” Aaron said. ”What business leaders need to understand is that you’re not just acquiring the company. You’re acquiring the company’s cyber posture as well. If that company has already been breached but they don’t know it, you still just bought a breach. And when the news of a merger becomes public, it’s like a beacon for cybercriminals to target both companies.”
Dylan shook his head and went on eating his pizza, so Aaron continued. “There are always several phases of a merger or acquisition. The first phase is about deciding you want to do that and creating a strategy around how to make that happen. The second phase is finding potential targets and talking to them about a deal. The next phase is where you normally get into due diligence, and I think it’s already too late at that point.” Aaron was getting excited and was talking a little faster. He continued, “The first principle of a Zero Trust strategy is aligning with the business. And I think that means being involved from the first phase when the M&A strategy was being created.
“It’s actually not that surprising that you weren’t engaged in the planning for buying NutriNerd. It was probably a great opportunity and your leadership had to jump at it. But most CISOs aren’t involved until the due diligence phase. There are also several types of due diligence that are all happening at the same time—tax, legal, financial, and security usually falls under operational due diligence along with other technology issues.”
“I guess I can understand that,” Dylan said.
Aaron shook his head. “But that’s just it—security isn’t just an integration issue. The whole point of due diligence is to discover any issues that would have an impact on the value of the acquisition. But introducing a significant cybersecurity gap with an acquisition could not just mean you overpaid for a company. It might mean that you also negatively impacted the value of your own company if you were to have significant losses from a breach that has already happened at that other company.”
“I see what you mean,” Dylan said. “I never thought of a merger in terms of Zero Trust before.”
“If you’re a company with a Zero Trust strategy, then your M&A team needs to be doing Zero Trust,” Aaron confirmed. “If you assume a breach with an acquisition, you’ll approach the integration differently. But now that you bought them, you’ve got to play the hand you were dealt.” As he spoke, Aaron got out his credit card and paid the bill for both of them.
“That’s not particularly comforting,” Dylan said as the waiter took away his plate.
“Here’s some advice for handling an M&A situation,” Aaron said, crumpling his napkin and putting it on his plate. “Fold them into your existing protect surfaces as much as possible. But you may need to create some new protect surfaces around your new AI product, whatever that ends up being. And for each protect surface in your environment, go back through and fold those parts of the network into your security stack one at a time. You should already be reviewing each protect surface on a regular basis anyway, so this will help you mature your Zero Trust program that much more quickly.”
Later that day, Dylan hurriedly pushed open the doors to MarchFit’s headquarters. He walked in to see the giant wire mesh running shoes, each in a slightly different running position, continuing down the length of the lobby. The effect was as though a giant had run through the lobby, leaving a new shoe frozen in each step. Dylan stopped and looked up at the company motto that was above the entrance. It read, “Every Step Matters.”
He nodded to himself and continued into the lobby. He picked up his pace when he saw the company’s general counsel, Kofi Abara, come around a corner and step in front of the elevators.
Dylan caught up to Kofi and asked, “Did I do something wrong?”
“What do you mean?” Kofi looked confused.
“It’s just, we’ve been working together pretty closely on things for the last year or so, getting our compliance program together, making sure our contracts protect us, doing our privacy audits. I was surprised when you didn’t bring me in for the security due diligence for the new acquisition,” Dylan explained.
“Oh, no. Dylan, I’m so sorry,” Kofi apologized. Kofi was known for his poker face after having won several poker tournaments while at MarchFit. But there was real horror on Kofi’s face.
“It’s fine, I . . .” Dylan began.
“No, I mean, we didn’t even think about security,” Kofi said as he got on the elevator, motioning Dylan to join him. “We looked at the new company’s numbers and had their AI models reviewed. But nobody did any cybersecurity due diligence. It just got rushed at the end to try to avoid a bidding war with other interested parties.”
“Just trying to be proactive,” Dylan said. “I think Yahoo! lost $350 million because of their undisclosed data breaches when Verizon acquired them. In addition to the $115 million class action lawsuit and the $35 million SEC fine. Cybersecurity is a huge part of mergers and acquisitions now. Not to mention all the security and privacy issues with integrating AI into our existing services.” Dylan had done his homework on the flight back home after the conference.
“We were actually just about to meet with NutriNerd’s founders. Why don’t you join us, and we can get a jump-start on our cybersecurity due diligence,” Kofi offered as the elevator doors opened to the Executive Briefing Center.
MarchFit’s Executive Briefing Center was at the end of the lobby that separated the north part of the headquarters, where the executive and sales offices were located, from the south part of the headquarters, where the IT offices were. The center itself was a free-standing island of glass and steel that appeared to float above the rest of the headquarters lobby.
Dylan and Kofi walked through the Briefing Center lobby, where the smell of freshly brewed espresso filled the air. As they walked in, Dylan could see that MarchFit’s CIO, Dr. Noor Patel, and Donna Chang, MarchFit’s CFO, were already inside the conference room talking to each other. Next to them Vincent Vega, MarchFit’s CEO who had taken over from Olivia after the breach, was talking to someone on his cell phone. April O’Neil, MarchFit’s head of Marketing and PR, was seated at the end of the table composing an email on her phone.
Dylan sat down next to Noor. She leaned over to him and whispered, “I only found out yesterday—sorry I didn’t loop you in earlier, but you were out. I didn’t realize you’d be taking questions about it during your speech. How’d it go, by the way?”