Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Are federal regulations the watershed moment for zero trust?

By Jim Barkdoll
laptop and phone set up for work

Image via Unsplash

April 7, 2023

While the past decade focused on determining an organization’s readiness for digital transformation, the 2020s are undoubtedly the decade where organizations try and secure their transformed architectures. More often than not, these efforts center on implementing a zero trust strategy. 

But while many enterprises advocate and agree with the zero trust mantra of “never trust, always verify,” these organizations still struggle when it comes to deployment. In fact, Gartner predicts that by 2026, 10% of large enterprises will have a comprehensive, mature and measurable zero trust program in place, up from less than 1% today. While that’s an impressive level of growth, it also highlights the gap that exists between strategy alignment and deployment.

With the specter of federal regulations related to zero trust and cybersecurity looming, many believe this will be the catalyst for a sizable increase in the number of zero trust deployments. In reality, while regulations are a good first step, there are a few issues contributing to the challenges most organizations face with zero trust deployments.

The key to regulation is prescription

Go to any cybersecurity vendor’s website and there will be verbiage related to zero trust. From the network to the endpoint, everyone offers a “zero trust solution” that will be the key to minimizing risk. The issue is that while these solutions usually do offer benefits as part of a zero trust strategy, the way in which they can be deployed amid a broader ecosystem of cybersecurity solutions can be murky. 

Federal regulations mandating organizations move to a zero trust strategy would be welcomed, but widespread adoption will not happen without regulations offering prescriptive guidance as to how to implement zero trust. A great starting point already exists in The National Institute of Standards and Technology (NIST)’s Zero Trust Architecture document, which walks through the areas organizations can focus on when it comes to zero trust as well as what technologies should be prioritized for deployment. 

Specific guidance founded on the NIST guidelines will make the difference between acceptance that zero trust is the way forward and widespread implementation of zero trust projects.

Solving the resource gap

One of the most critical challenges organizations face with zero trust is that they lack the necessary resources to not only deploy but maintain an effective zero trust implementation. While federal regulations would no doubt make more organizations want to deploy zero trust, in reality they simply cannot afford the costs associated with ensuring they have the right resources in place to deploy a zero trust project. A key way in which new government regulations could help would be if they included incentives or programming for resource-constrained organizations. Offering this type of assistance would have a widespread and immediate impact. 

The recent wave of layoffs at high-tech companies might also play a role here. For years, tech companies attracted the best and brightest cybersecurity minds, while other industries struggled with resources. As this ‘talent hoarding’ comes to an end, talented cybersecurity professionals are now looking for new opportunities, which can help organizations that traditionally struggled to attract this talent. This could mean more organizations are in a position to move from zero trust adoption to deployment.

Cybersecurity vendors must do their part

Though cybersecurity vendors do a great job advocating for zero trust, as mentioned earlier, they often do not do enough to help customers move from purchase to deployment. In some cases, these vendors offer their solution as the ‘silver bullet’ that will be instrumental to any zero trust initiative. That reasoning is faulty, as to be done successfully, zero trust must involve all layers of the IT stack. For example, an endpoint security solution cannot address zero trust at the network level and vice-versa. Even so, that does not stop vendors from proclaiming their solution to be the key to zero trust.

In addition, there are larger vendors promoting zero trust platforms, which can be proprietary in nature. The issue here is that there exists no one vendor that can address zero trust across the IT stack, meaning while these platforms can be effective in implementing zero trust in one area, organizations still require additional solutions.

Effective and successful zero trust requires a broad ecosystem of security solutions that would ideally interoperate or integrate with one another. While federal regulations cannot mandate cybersecurity vendors to work together, the industry can do its part by making integrations and interoperability a focus. This will enable organizations to deploy a zero trust strategy with the cybersecurity solutions that work best to meet their critical outcomes. This approach is illustrated in the cybersecurity mesh architecture (CSMA) approach from Gartner.

Whether it is the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA), regulations play an important role in ensuring organizations mature their approach to privacy and security. But as is the case with any complex issue, no one measure equals success. While federal regulations related to zero trust will go a long way toward advancing widespread, successful zero trust deployments, without consistent, continuous commitment from government, cybersecurity vendors and end user organizations, these regulations in and of themselves will not be enough.

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: data privacy data protection federal requirements security solutions zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jim Barkdoll is the CEO and President of Axiomatics.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5mw Wright

    5 minutes with Bill Wright - Why federal organizations are leaning into zero trust

    See More
  • Computer keyboard

    NIST & zero trust: What federal agencies can learn from the private sector

    See More
  • Growing and Gaining

    Want to Avoid Being Scapegoated For the Next Breach? You Need Total Trust Alongside Zero Trust

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing