Michael is a world-leading IT industry analyst. He has led North American and global initiatives focused on developing insights and strategies that connect technology solutions with business needs, combining data, knowledge, analysis and advanced content delivery to define options for IT and buy-side businesses. Michael has written hundreds of reports and three business books on a wide range of topics ; led dozens of workshops, primarily on IT channel and alliance strategy, in 12 countries and four continents; worked in collaboration with his InsightaaS partner Mary Allen to build professional communities dedicated to research and knowledge sharing in cloud, IoT, analytics, data centre management and transformative technology in the Ontario public sector; and worked with McMaster University to launch and grow GCDCS, the leading data centre event in Canada. Most recently, Michael collaborated with Mary on the refinement of a unique Hybrid IT framework that is now embedded at the core of 2856-Cloud Systems in Practice, the course he teaches at U of T's SCS, and in a variety of consulting assignments.
ZT Data managers must protect the crown jewels of the organization while dealing with ever expanding data needs.
ZT device managers need to balance ease of access with security while juggling the ever-changing and expanding list of devices.
ZT identity managers face significant challenges as they balance access requirements with security mandates.
ZT applications managers face significant challenges as they balance top-down executive mandates with the need to make progress on software issues.
CISOs expect application security to fully support ZT, while AppSec managers use the ZT framework to organize & prioritize investments and activities.
By identifying key priorities before a breach, ZT infrastructure managers can contribute meaningfully to the success of the organization’s ZT strategy.
Contemporary zero trust infrastructure often centers on outside-the-perimeter resources, challenging security leaders who are looking to establish resilient environments.
Zero trust networks provide visibility into key issues, including segmentation, secure access to data, applications, and identity and device resources.
The network plays a unique role in the shift from traditional perimeter-based security strategies to zero trust, spanning four key categories.
CISOs are organizing strategy around key intellectual property assets and the identity processes that grant access to and across core IT/ZT pillars.
Identifying and employing relevant, meaningful metrics builds support for ZT across the organization and enables CISOs to avoid “precision without accuracy”
This article defines a 10-step path to zero trust (ZT), spanning foundational and transitional activities and “deploy, monitor, and evolve” action steps.
This article identifies six key factors that contribute to a CISO’s ability to work with corporate stakeholders to roll out zero trust (ZT).
Identifying the 33 technologies and IT management practices that define a successful zero trust roadmap.
Zero trust (ZT) supports business objectives for three personas: senior executives, the CIO, and the CISO. Aligning strategy with these personas builds ZT support.