Overcoming Obstacles To Zero Trust Adoption

In a world where cyberattacks cost the global economy $8 trillion in 2023, the urgency for organisations to adopt Zero Trust has never been greater. While Zero Trust has been a hot topic for over a decade, research reveals a number of obstacles and roadblocks stopping organisations from fully implementing it. 

Entrust's 2024 State of Zero Trust & Encryption Study, conducted by the Ponemon Institute, surveyed 4,052 IT and IT security practitioners globally and revealed that while over two-thirds of organisations are implementing Zero Trust, many struggle to overcome barriers to adoption, leaving them vulnerable to devastating breaches.

The Adoption Gap

The intensifying threat landscape is a key driver behind the push for Zero Trust. Costs of  cyber breaches are projected to surpass $10.5 trillion by 2025, fuelled by the alarming rise of AI-powered attacks, which saw a 31x increase between 2022 and 2023. Facing this reality, 62% of organisations have begun their Zero Trust journey. 

However, despite widespread acceptance of Zero Trust, adoption is lagging in many regions, particularly the West. The study found only 48% of U.S. organisations and 44% of U.K. organisations are implementing Zero Trust, compared to 73% in Japan and 72% in Singapore. This leaves many organisations exposed to escalating threats. So, what's holding organisations back from fully embracing Zero Trust?

Skills Shortage Stifling Progress

The Ponemon study identifies a lack of in-house expertise as the top challenge, cited by 47% of respondents globally and 60% in the U.S. The cybersecurity skills shortage has been a persistent issue for years, with organisations struggling to find and retain the talent needed to manage a robust digital security practice - including Zero Trust. This gap is a major barrier to progress, leaving security teams overwhelmed and under-resourced.

Budget Woes & Leadership Disconnect

Inadequate budget and resources are major roadblocks, with 46% of respondents citing insufficient personnel as a key challenge in implementing Zero Trust. This is despite 60% of organisations reporting senior leadership support for Zero Trust initiatives. The disconnect is further highlighted by the fact that lack of adequate budget was consistently reported as a top obstacle across the U.S., UK, Canada, and Germany. This suggests that while CISOs have buy-in from the top, it hasn't translated financial commitments to drive successful implementations. Without sufficient resources, Zero Trust projects can stall, leaving organisations vulnerable.

Charting A Path 

While these barriers present significant challenges, they are not insurmountable. By understanding key obstacles to adoption, organisations can develop targeted strategies to overcome them. Let's explore some practical approaches to bridge the gap between Zero Trust aspirations and successful implementation.
Invest in People

Organisations must prioritise investing in their people. This means allocating resources for hiring talent with Zero Trust expertise, as well as providing comprehensive training and upskilling opportunities for existing staff. By developing a robust internal pipeline, organisations can build the expertise needed to drive successful implementations. 

Establish Ownership

Implementing a Zero Trust strategy requires coordinated effort across the entire organisation. Without clear lines of ownership and responsibility, initiatives can lose momentum or create unidentified gaps which put organisations at risk.

To ensure accountability, organisations must establish a dedicated Zero Trust leadership team, with representation from key stakeholders such as IT, security, operations, and business units.

This team should be responsible for defining the Zero Trust vision, setting goals and milestones, and overseeing implementation. 

Leverage AI & Automation

By deploying technologies like machine learning, behavioural analytics, and automated response, organisations can enhance the effectiveness of their Zero Trust controls. For example, AI-powered identity verification can help detect and prevent fraudulent access attempts in real-time, while automated policy enforcement can ensure consistent application of Zero Trust principles across the enterprise. 

Optimise Vendor Ecosystems

Zero Trust cannot be achieved through a single product or solution. It is a holistic approach that requires diverse technologies and tools. While best-of-breed solutions offer specialised capabilities, they can introduce complexity and integration challenges. To strike a balance, organisations must carefully evaluate vendor ecosystems and seek out solutions that seamlessly integrate with existing infrastructure. This may involve consolidating vendors to reduce management overhead and costs. At the same time, organisations should prioritise vendors that offer comprehensive Zero Trust capabilities, such as secure access, multi-factor authentication, and continuous monitoring. 

The Risks Of Inaction

In today’s cyber landscape, risks of inaction are too high to ignore. With hackers, system malfunctions, and unmanaged certificates topping the list of breach concerns for CISOs, delaying Zero Trust adoption could have catastrophic consequences.  

Breaking down the barriers to adoption is not just a security imperative – it's a business necessity. By prioritising Zero Trust, investing in people and tools, and committing to continuous improvement, organisations can build the resilience needed to thrive in an era of relentless threats.

Samantha Mabey is Director of Digital Security Solutions at Entrust 

Image: Ideogram

You Might Also Read: 

Identities Are The Highest Priority Risk Area:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Olympic Sponsors Are Prime Targets For Hackers
The UK Needs To Move Faster On Nuclear Energy Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

NWN Corp

NWN Corp

NWN Corporation is a leading Cloud Communications Service Provider (CCSP) focused on transforming the customer and workspace experience for commercial, enterprise and public sector organizations.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.