How to Build and Sustain a Successful Zero Trust Project
Why It Matters
Because Zero Trust adoption often stalls at the cultural and communication layer, applying these practical, people‑first tactics can accelerate deployment, lower risk, and protect critical assets, delivering measurable business value.
Key Takeaways
- •Zero Trust fails due to poor implementation, not strategy.
- •The “messy middle” requires change management and executive buy‑in.
- •Reframe Zero Trust as “smart trust” to reduce emotional resistance.
- •Start with quick wins and protect‑surface inventory to build momentum.
- •Storytelling and stakeholder‑specific language drive cross‑team alignment throughout projects.
Summary
In a recent episode of the Packet Protector podcast, hosts Jennifer Jabbush and Drew Conry‑Murray interview John Spiegel and Jay Tilson, co‑authors of “Zero Trust Done Right.” The conversation centers on how to build and sustain a Zero Trust program, emphasizing the often‑overlooked “messy middle” where frameworks meet real‑world enterprise dynamics.
The guests argue that Zero Trust projects fail not because the strategy is flawed, but because of poor implementation, sequencing, and change‑management. They stress that Zero Trust is a cultural shift requiring executive sponsorship, cross‑departmental collaboration, and early quick wins such as protect‑surface inventories to generate momentum.
John notes that the phrase “Zero Trust” triggers a visceral loss‑aversion response, recalling his own experience of being stripped of admin rights. Jay recounts a university that renamed the initiative to avoid the negative connotation, illustrating the power of reframing. Both recommend storytelling and tailoring language to each stakeholder—marketing, operations, or IT—to secure buy‑in.
For businesses, adopting this holistic approach means faster, less‑resisted deployments, reduced silo‑induced failures, and a security posture that aligns with business objectives. By treating Zero Trust as “smart trust” and focusing on protecting people and assets, organizations can achieve sustainable security transformation.
Comments
Want to join the conversation?
Loading comments...