Overcoming Obstacles To Zero Trust Adoption

In a world where cyberattacks cost the global economy $8 trillion in 2023, the urgency for organisations to adopt Zero Trust has never been greater. While Zero Trust has been a hot topic for over a decade, research reveals a number of obstacles and roadblocks stopping organisations from fully implementing it. 

Entrust's 2024 State of Zero Trust & Encryption Study, conducted by the Ponemon Institute, surveyed 4,052 IT and IT security practitioners globally and revealed that while over two-thirds of organisations are implementing Zero Trust, many struggle to overcome barriers to adoption, leaving them vulnerable to devastating breaches.

The Adoption Gap

The intensifying threat landscape is a key driver behind the push for Zero Trust. Costs of  cyber breaches are projected to surpass $10.5 trillion by 2025, fuelled by the alarming rise of AI-powered attacks, which saw a 31x increase between 2022 and 2023. Facing this reality, 62% of organisations have begun their Zero Trust journey. 

However, despite widespread acceptance of Zero Trust, adoption is lagging in many regions, particularly the West. The study found only 48% of U.S. organisations and 44% of U.K. organisations are implementing Zero Trust, compared to 73% in Japan and 72% in Singapore. This leaves many organisations exposed to escalating threats. So, what's holding organisations back from fully embracing Zero Trust?

Skills Shortage Stifling Progress

The Ponemon study identifies a lack of in-house expertise as the top challenge, cited by 47% of respondents globally and 60% in the U.S. The cybersecurity skills shortage has been a persistent issue for years, with organisations struggling to find and retain the talent needed to manage a robust digital security practice - including Zero Trust. This gap is a major barrier to progress, leaving security teams overwhelmed and under-resourced.

Budget Woes & Leadership Disconnect

Inadequate budget and resources are major roadblocks, with 46% of respondents citing insufficient personnel as a key challenge in implementing Zero Trust. This is despite 60% of organisations reporting senior leadership support for Zero Trust initiatives. The disconnect is further highlighted by the fact that lack of adequate budget was consistently reported as a top obstacle across the U.S., UK, Canada, and Germany. This suggests that while CISOs have buy-in from the top, it hasn't translated financial commitments to drive successful implementations. Without sufficient resources, Zero Trust projects can stall, leaving organisations vulnerable.

Charting A Path 

While these barriers present significant challenges, they are not insurmountable. By understanding key obstacles to adoption, organisations can develop targeted strategies to overcome them. Let's explore some practical approaches to bridge the gap between Zero Trust aspirations and successful implementation.
Invest in People

Organisations must prioritise investing in their people. This means allocating resources for hiring talent with Zero Trust expertise, as well as providing comprehensive training and upskilling opportunities for existing staff. By developing a robust internal pipeline, organisations can build the expertise needed to drive successful implementations. 

Establish Ownership

Implementing a Zero Trust strategy requires coordinated effort across the entire organisation. Without clear lines of ownership and responsibility, initiatives can lose momentum or create unidentified gaps which put organisations at risk.

To ensure accountability, organisations must establish a dedicated Zero Trust leadership team, with representation from key stakeholders such as IT, security, operations, and business units.

This team should be responsible for defining the Zero Trust vision, setting goals and milestones, and overseeing implementation. 

Leverage AI & Automation

By deploying technologies like machine learning, behavioural analytics, and automated response, organisations can enhance the effectiveness of their Zero Trust controls. For example, AI-powered identity verification can help detect and prevent fraudulent access attempts in real-time, while automated policy enforcement can ensure consistent application of Zero Trust principles across the enterprise. 

Optimise Vendor Ecosystems

Zero Trust cannot be achieved through a single product or solution. It is a holistic approach that requires diverse technologies and tools. While best-of-breed solutions offer specialised capabilities, they can introduce complexity and integration challenges. To strike a balance, organisations must carefully evaluate vendor ecosystems and seek out solutions that seamlessly integrate with existing infrastructure. This may involve consolidating vendors to reduce management overhead and costs. At the same time, organisations should prioritise vendors that offer comprehensive Zero Trust capabilities, such as secure access, multi-factor authentication, and continuous monitoring. 

The Risks Of Inaction

In today’s cyber landscape, risks of inaction are too high to ignore. With hackers, system malfunctions, and unmanaged certificates topping the list of breach concerns for CISOs, delaying Zero Trust adoption could have catastrophic consequences.  

Breaking down the barriers to adoption is not just a security imperative – it's a business necessity. By prioritising Zero Trust, investing in people and tools, and committing to continuous improvement, organisations can build the resilience needed to thrive in an era of relentless threats.

Samantha Mabey is Director of Digital Security Solutions at Entrust 

Image: Ideogram

You Might Also Read: 

Identities Are The Highest Priority Risk Area:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Olympic Sponsors Are Prime Targets For Hackers
The UK Needs To Move Faster On Nuclear Energy Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

AhnLab

AhnLab

AhnLab provides a range of information security solutions including network security, endpoint security, antivirus and consulting services.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (Manusec) is a global series of summits focusing on Cyber Security for Critical Manufacturing Sectors.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

360° Online Brand Protection

360° Online Brand Protection

360° Online Brand Protection have developed a response to monitor counterfeiting and piracy activity at the online point of sale.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

National Cybersecurity Agency (ACN) - Italy

National Cybersecurity Agency (ACN) - Italy

The ACN is the National Authority for Cybersecurity in Italy. the Agency promotes public-private initiatives to strengthen the national cybersecurity and resilience posture.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

DV Cyber Security

DV Cyber Security

DV Cyber (formerly A76) is an innovative cyber security company vertically focused on Threat Intelligence and Cyber Security Research.