{"id":34670,"date":"2022-12-14T11:36:27","date_gmt":"2022-12-14T17:36:27","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=34670"},"modified":"2025-05-27T04:57:47","modified_gmt":"2025-05-27T09:57:47","slug":"zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/","title":{"rendered":"Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023"},"content":{"rendered":"<h2><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-34743\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/Zero-Trust-Cybersecurity-Trend-2023-Banner.png\" alt=\"DoD and Forrester emphasize role of Zero Trust as cybersecurity strategy\" width=\"2560\" height=\"1440\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/Zero-Trust-Cybersecurity-Trend-2023-Banner.png 2560w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/Zero-Trust-Cybersecurity-Trend-2023-Banner-1024x576.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/Zero-Trust-Cybersecurity-Trend-2023-Banner-768x432.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/Zero-Trust-Cybersecurity-Trend-2023-Banner-1536x864.png 1536w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/Zero-Trust-Cybersecurity-Trend-2023-Banner-2048x1152.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\"><\/h2>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_63 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#Strengthening_Vulnerable_Cyber_Infrastructure\" title=\"Strengthening Vulnerable Cyber Infrastructure\">Strengthening Vulnerable Cyber Infrastructure<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#Sophisticated_Cyberattacks\" title=\"Sophisticated Cyberattacks\">Sophisticated Cyberattacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#Threat_of_Pipedream\" title=\"Threat of Pipedream\">Threat of Pipedream<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#Modern_Problems_Require_Modern_Solutions_The_Dawn_of_Zero_Trust\" title=\"Modern Problems Require Modern Solutions: The Dawn of Zero Trust\">Modern Problems Require Modern Solutions: The Dawn of Zero Trust<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#How_Does_Zero_Trust_Work\" title=\"How Does Zero Trust Work?\">How Does Zero Trust Work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#Forrester_Analysis_of_Zero_Trust\" title=\"Forrester Analysis of Zero Trust\">Forrester Analysis of Zero Trust<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#Department_of_Defense_Embraces_Zero_Trust\" title=\"Department of Defense Embraces Zero Trust\">Department of Defense Embraces Zero Trust<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#References\" title=\"References\">References<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Strengthening_Vulnerable_Cyber_Infrastructure\"><\/span>Strengthening Vulnerable Cyber Infrastructure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Zero Trust has entered the cybersecurity fray as a leading solution to mitigate and reduce vulnerabilities. This strategy is relevant for IT infrastructure all over the world: a recent Radware report establishes that over 99.5% of global organizations deploy applications in the public cloud<a href=\"#_edn1\" name=\"_ednref1\">[1]<\/a>.<\/p>\n<p>However, public and multi-cloud environments pose significant risks when it comes to data leaks and breaches. The same report states that \u201c69% of organizations can trace data breaches or data exposures to inconsistent application security configurations across the different public cloud platforms.\u201d<\/p>\n<p>Both the public and the private sector have already witnessed how expensive these breaches can be, in terms of lost productivity, reputational damage, IT repair\/mitigation, and ransom costs.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Sophisticated_Cyberattacks\"><\/span>Sophisticated Cyberattacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Incidents like WannaCry in 2017 showed just how strong an impact cyberattacks can have, with computers in over 150 countries affected<a href=\"#_edn2\" name=\"_ednref2\">[2]<\/a> and an estimated cost of $4 billion globally. The ransomware spread across industries as well, including healthcare, education, manufacturing, financial services, and telecommunications.<\/p>\n<p>Costs associated with cybercrime have only increased in the years following, with larger entities targeted. Research collected by Ivanti showed that ransomware has increased by 446% since 2019<a href=\"#_edn3\" name=\"_ednref3\">[3]<\/a>. In 2022 alone, major organizations like the <a href=\"https:\/\/www.icrc.org\/en\/document\/cyber-attack-icrc-what-we-know\">Red Cross<\/a><a href=\"#_edn4\" name=\"_ednref4\"><sup>[4]<\/sup><\/a>, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/toyota-data-leak-customers\/\">Toyota<\/a><a href=\"#_edn5\" name=\"_ednref5\">[5]<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/twitter-confirmed-july-2022-data-breach-affecting-5.4m-users\">Twitter<\/a><a href=\"#_edn6\" name=\"_ednref6\">[6]<\/a>, and <a href=\"https:\/\/news.trendmicro.com\/2022\/04\/07\/cash-app-data-breach\/\">CashApp<\/a><a href=\"#_edn7\" name=\"_ednref7\">[7]<\/a> have reported breaches, with records in the tens of millions affected. The Irish Data Protection Commission recently fined <a href=\"https:\/\/www.spiceworks.com\/it-security\/security-general\/news\/meta-275m-gdpr-privacy-fine\/?utm_source=swemail&amp;utm_medium=email&amp;utm_campaign=newsinsights+tech+273583&amp;utme=reading1+title1&amp;dm_i=78Z3,5V3J,339WJS,T4XL,1\">Meta<\/a><a href=\"#_edn8\" name=\"_ednref8\">[8]<\/a> for GDPR violations to the tune of \u20ac265 million for exposing PII of over 533 million users.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Threat_of_Pipedream\"><\/span>Threat of Pipedream<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In April 2022, the Department of Energy, the Cybersecurity and Infrastructure Security Agency (CISA), the NSA, and the FBI issued an advisory for a malware toolkit dubbed Pipedream<a href=\"#_edn9\" name=\"_ednref9\">[9]<\/a>, \u201cthe most versatile tool ever made to target critical infrastructure, like power grids and oil refineries.\u201d This toolkit was designed to target and cripple industrial control systems in critical infrastructure sectors.<\/p>\n<p>Dragos, an industrial cybersecurity firm that helped analyze Pipedream, affirmed at Forrester\u2019s <a href=\"https:\/\/www.forrester.com\/press-newsroom\/forrester-security-risk-2022-agenda\/#:~:text=Forrester%20Announces%20Full%20Conference%20Agenda%20For%20Security%20%26%20Risk%202022,-Oct%206%202022&amp;text=CAMBRIDGE%2C%20Mass.%2C%20October%206,November%208%E2%80%939%2C%202022.\">2022 Security and Risk conference<\/a><a href=\"#_edn10\" name=\"_ednref10\">[10]<\/a> that cyber-attacks are increasingly being carried out by nation-states, targeting critical infrastructure sectors, including chemical, manufacturing, and energy plants.<\/p>\n<p>Thankfully Pipedream was evaded by proactive cybersecurity measures and patches before it could be maliciously deployed. However, this is one example of how cybercrime will be used by nation-states, with the trend likely to increase as cyberattack strategies are improved. By carrying out remote attacks, nation-states can potentially debilitate and undermine another country\u2019s ability to react and defend, all while denying responsibility.<\/p>\n<p>It\u2019s a new phase of warfare that isn\u2019t all that new \u2013 countries have always used shadow entities to handle less than savory missions; software has simply become the most recent tool of choice.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Modern_Problems_Require_Modern_Solutions_The_Dawn_of_Zero_Trust\"><\/span>Modern Problems Require Modern Solutions: The Dawn of Zero Trust<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In their keynote address at the Forrester Security &amp; Risk Conference, Renee Murphy and Allie Mellen cited internal reports that revealed \u201cbusiness continuity is the number one priority for cybersecurity teams over the next 12 months.\u201d<a href=\"#_edn11\" name=\"_ednref11\">[11]<\/a> The overlap between business continuity and cybersecurity is trust. Yet it\u2019s not enough for businesses to have a robust cybersecurity strategy; they must also have consumer trust.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-34690\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Levers-of-Trust-Forrester.png\" alt=\"7 Levers of Trust: Accountability, Consistency, Competency, Dependability, Empathy, Integrity, Transparency\" width=\"1712\" height=\"1367\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Levers-of-Trust-Forrester.png 1712w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Levers-of-Trust-Forrester-1024x818.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Levers-of-Trust-Forrester-768x613.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Levers-of-Trust-Forrester-1536x1226.png 1536w\" sizes=\"(max-width: 1712px) 100vw, 1712px\"><\/p>\n<p>Ironically, the way we build consumer trust is by establishing a policy of not trusting anyone, otherwise known as Zero Trust. This framework is highlighted as the leading strategy to ensure business continuity by preserving consumer trust and effectively responding to evolving threats. It accounts\u00a0for the evolving and fluid nature of the network edge, otherwise defined as the point of connection between a device or local network and the internet.<\/p>\n<p>Connections between devices, applications, and cloud, on-prem, and hybrid networks are only increasing, which makes this network edge vulnerable. Organizations must also factor in remote work connections, hybrid cloud networks, and increased risk of cyberattacks or malware exposure. These connections and risk factors make securing the network edge ever more difficult for system admins.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Does_Zero_Trust_Work\"><\/span>How Does Zero Trust Work?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Zero Trust is a system of \u201cleast privilege\u201d where users only have access to the data they absolutely need. This permission must be actively enabled or allowed, and the default status is to deny access. This ensures no unauthorized access to sensitive or confidential information.<\/p>\n<p>A Zero Trust framework operates on a principle of continuous identity verification and least privilege access. In effect: anyone accessing the network must be authenticated (not just once, but consistently) and they will only have access to the data they absolutely need (to contain the damage in the event of a breach).<\/p>\n<p>One of the major benefits of Zero Trust is that it provides protection against possible data leaks and breaches, including those stemming from insider threats. Joseph Blankenship, Research Director at Forrester, stated that \u201c26% of data breaches are caused by insider incidents, most of which are malicious\u201d<a href=\"#_edn12\" name=\"_ednref12\">[12].<\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Forrester_Analysis_of_Zero_Trust\"><\/span>Forrester Analysis of Zero Trust<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Over the next three years, Forrester analysts anticipate that the weakest points of IT security will remain individuals, with a need for identity-focused protection (\u201cidentity as a perimeter\u201d)<a href=\"#_edn13\" name=\"_ednref13\">[13]<\/a>.<\/p>\n<p>As part of the Forrester panel on insider risk, Dr. Caputo emphasized that adversaries are looking for targets inside organizations struggling with psychological-financial strain: \u201cit\u2019s not how much debt someone has, but how that debt makes them feel.\u201d<\/p>\n<p>This is where the full concept of Zero Trust shines, not just as a technology solution but as a cultural mindset. By using a model of least privilege and repeated verification, granting data access can become a more granular process. Stronger, built-in controls and protections help make processes around using data and collaborating with teams more secure, without compromising productivity.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Department_of_Defense_Embraces_Zero_Trust\"><\/span>Department of Defense Embraces Zero Trust<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The U.S. government has been hinting at their investment in an updated cybersecurity strategy across various departments for several years:<\/p>\n<ul>\n<li>2018 \u2013 CISA formed as a branch in the Department of Homeland Security to focus on the government\u2019s official cybersecurity posture.<\/li>\n<li>2020 \u2013 Cybersecurity Maturity Model Certification (CMMC) program launched by the DoD.<\/li>\n<li>2021 \u2013 an <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" class=\"broken_link\">Executive Order<\/a> was issued, mandating investment and restructuring of federal information security systems.<\/li>\n<\/ul>\n<p>The Executive Order explicitly included references to Zero Trust framework as part of the updated cybersecurity solution. CISA advisories have also urged government and private sector organizations to begin developing Zero Trust security strategies.<\/p>\n<p>Most recently, the Department of Defense released their <a href=\"https:\/\/www.defense.gov\/News\/Releases\/Release\/Article\/3225919\/department-of-defense-releases-zero-trust-strategy-and-roadmap\/\" class=\"broken_link\">Zero Trust Strategy and Roadmap<\/a> for <a href=\"https:\/\/www.filecloud.com\/blog\/2025\/05\/zero-trust-implementation\/\">Zero trust implementation<\/a> by FY 2027. This roadmap includes base level and advanced Zero Trust targets across seven pillars: user, device, application &amp; workload, data, network &amp; environment, automation &amp; orchestration, and visibility &amp; analytics.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-34691\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Pillars-of-Zero-Trust.png\" alt=\"7 Pillars of Zero Trust by US DoD\" width=\"1735\" height=\"1228\" srcset=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Pillars-of-Zero-Trust.png 1735w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Pillars-of-Zero-Trust-1024x725.png 1024w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Pillars-of-Zero-Trust-768x544.png 768w, https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/7-Pillars-of-Zero-Trust-1536x1087.png 1536w\" sizes=\"(max-width: 1735px) 100vw, 1735px\"><\/p>\n<p>Other government departments will follow suit to create comprehensive security for the entire network surface, along with global and local governments and the private sector.<\/p>\n<p>This adoption cascade will create a more resilient, responsive cybersecurity network across industries, sealing dangerous loopholes and preventing data leaks that could possibly lead to catastrophic data breaches. Zero Trust is the framework that provides both a technological and cultural goal post for the coming years.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Article written by <\/strong><a href=\"https:\/\/www.linkedin.com\/in\/katie-gerhardt-88541791\/\"><strong>Katie Gerhardt<\/strong><\/a><strong>, Jr. Product Marketing Manager<\/strong><\/p>\n<p>\u00a0<\/p>\n<h2><span class=\"ez-toc-section\" id=\"References\"><\/span>References<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[1]<\/a> Radware. \u201cApplication Security In A Multi-Cloud World.\u201d Retrieved 29 Nov 2022 from <a href=\"https:\/\/www.radware.com\/getattachment\/19954aa9-bb51-4f07-b695-84f5713a8302\/Application-Security-In-A-Multi-Cloud-Report_2022_Report-V2.pdf.aspx\">https:\/\/www.radware.com\/getattachment\/19954aa9-bb51-4f07-b695-84f5713a8302\/Application-Security-In-A-Multi-Cloud-Report_2022_Report-V2.pdf.aspx<\/a><\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[2]<\/a> Kaspersky. \u201cWhat is WannaCry Ransomware?\u201d Retrieved 29 Nov 2022 from <a href=\"https:\/\/usa.kaspersky.com\/resource-center\/threats\/ransomware-wannacry\">https:\/\/usa.kaspersky.com\/resource-center\/threats\/ransomware-wannacry<\/a><\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[3]<\/a> Louis Columbus. VentureBeat. 20 Oct 2022. \u201cRansomware vulnerabilities soar as attackers look for easy targets.\u201d Retrieved 30 Nov 2022 from <a href=\"https:\/\/venturebeat.com\/security\/ransomware-vulnerabilities-soar-as-attackers-look-for-easy-targets\/\" class=\"broken_link\">https:\/\/venturebeat.com\/security\/ransomware-vulnerabilities-soar-as-attackers-look-for-easy-targets\/<\/a><\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[4]<\/a> International Committee of the Red Cross, 24 June 2022. Retrieved 29 Nov 2022 from <a href=\"https:\/\/www.icrc.org\/en\/document\/cyber-attack-icrc-what-we-know\">https:\/\/www.icrc.org\/en\/document\/cyber-attack-icrc-what-we-know<\/a><\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[5]<\/a> James Coker. InfoSecurity Group. \u201cToyota Reveals Data Leak of 300,000 Customers.\u201d Retrieved 29 Nov 2022 from <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/toyota-data-leak-customers\/\">https:\/\/www.infosecurity-magazine.com\/news\/toyota-data-leak-customers\/<\/a><\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\">[6]<\/a> Twitter. 5 Aug 2022. \u201cAn incident impacting some accounts and private information on Twitter.\u201d Retrieved 29 Nov 2022 from <a href=\"https:\/\/privacy.twitter.com\/en\/blog\/2022\/an-issue-affecting-some-anonymous-accounts\">https:\/\/privacy.twitter.com\/en\/blog\/2022\/an-issue-affecting-some-anonymous-accounts<\/a><\/p>\n<p><a href=\"#_ednref7\" name=\"_edn7\">[7]<\/a> Trend Micro. 7 Apr 2022. \u201cCash App Suffers Data Breach Affecting 8.2M Customers.\u201d Retrieved 29 Nov 2022 from <a href=\"https:\/\/news.trendmicro.com\/2022\/04\/07\/cash-app-data-breach\/\">https:\/\/news.trendmicro.com\/2022\/04\/07\/cash-app-data-breach\/<\/a><\/p>\n<p><a href=\"#_ednref8\" name=\"_edn8\">[8]<\/a> Sumeet Wadhwani. Spiceworks. 29 Nov 2022. \u201cMeta Fined $275M for Failing to Protect the Data of 533M Facebook Users.\u201d Retrieved 29 Nov 2022 from <a href=\"https:\/\/www.spiceworks.com\/it-security\/security-general\/news\/meta-275m-gdpr-privacy-fine\/\">https:\/\/www.spiceworks.com\/it-security\/security-general\/news\/meta-275m-gdpr-privacy-fine\/<\/a><\/p>\n<p><a href=\"#_ednref9\" name=\"_edn9\">[9]<\/a> Andy Greenberg. WIRED. 13 Apr 2022. \u201cFeds Uncover a \u2018Swiss Army Knife\u2019 for Hacking Industrial Control Systems.\u201d Retrieved 29 Nov 2022 from <a href=\"https:\/\/www.wired.com\/story\/pipedream-ics-malware\/\">https:\/\/www.wired.com\/story\/pipedream-ics-malware\/<\/a><\/p>\n<p><a href=\"#_ednref10\" name=\"_edn10\">[10]<\/a> Robert Lee. Forrester Security &amp; Risk Conference. 8 Nov 2022. Keynote Address: \u201cICS Threats: From Pipe Dream to PIPEDREAM.<\/p>\n<p><a href=\"#_ednref11\" name=\"_edn11\">[11]<\/a> Renee Murphy and Allie Mellen. Forrester Security &amp; Risk Conference. 8 Nov 2022. Keynote Address: \u201cSecuring the Future: Geopolitical Risk will Redefine Security Strategies for the Next Decade.\u201d<\/p>\n<p><a href=\"#_ednref12\" name=\"_edn12\">[12]<\/a> Joseph Blankenship (Forrester), Alla Valente (Forrester), Dr. Deanna D. Caputo (MITRE), Ryan Boyer (CISA). Forrester Security &amp; Risk Conference. 9 Nov 2022. Keynote Panel Discussion: \u201cInsider Risk Reduction Requires Two Parts Culture, One Part Security.\u201d<\/p>\n<p><a href=\"#_ednref13\" name=\"_edn13\">[13]<\/a> Laura Koetzle. Forrester Security &amp; Risk Conference. 9 Nov 2022. Keynote Panel Discussion: \u201cTake a Zero Trust Approach to Threat Prevention, Detection, and Response.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Strengthening Vulnerable Cyber Infrastructure Zero Trust has entered the cybersecurity fray as a leading solution to mitigate and reduce vulnerabilities. This strategy is relevant for IT infrastructure all over the world: a recent Radware report establishes that over 99.5% of global organizations deploy applications in the public cloud[1]. However, public and multi-cloud environments pose significant [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[888,237,72],"tags":[889,1615,1816,1817,1808],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -<\/title>\n<meta name=\"description\" content=\"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023\" \/>\n<meta property=\"og:description\" content=\"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-14T17:36:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-27T09:57:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/Zero-Trust-Cybersecurity-Trend-2023-Banner.png\" \/>\n<meta name=\"author\" content=\"Katie Gerhardt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katie Gerhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/\"},\"author\":{\"name\":\"Katie Gerhardt\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea\"},\"headline\":\"Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023\",\"datePublished\":\"2022-12-14T17:36:27+00:00\",\"dateModified\":\"2025-05-27T09:57:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/\"},\"wordCount\":1447,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"keywords\":[\"cybersecurity\",\"DoD\",\"forrester\",\"security &amp; risk conference\",\"Zero Trust\"],\"articleSection\":[\"Emerging Tech\",\"government\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/\",\"name\":\"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2022-12-14T17:36:27+00:00\",\"dateModified\":\"2025-05-27T09:57:47+00:00\",\"description\":\"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea\",\"name\":\"Katie Gerhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g\",\"caption\":\"Katie Gerhardt\"},\"description\":\"Product Marketing Manager\",\"sameAs\":[\"1\",\"https:\/\/www.linkedin.com\/in\/katie-gerhardt-88541791\/\"],\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/katie\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -","description":"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023","og_description":"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -","og_url":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2022-12-14T17:36:27+00:00","article_modified_time":"2025-05-27T09:57:47+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/12\/Zero-Trust-Cybersecurity-Trend-2023-Banner.png"}],"author":"Katie Gerhardt","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"Katie Gerhardt","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/"},"author":{"name":"Katie Gerhardt","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea"},"headline":"Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023","datePublished":"2022-12-14T17:36:27+00:00","dateModified":"2025-05-27T09:57:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/"},"wordCount":1447,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"keywords":["cybersecurity","DoD","forrester","security &amp; risk conference","Zero Trust"],"articleSection":["Emerging Tech","government","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/","url":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/","name":"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2022-12-14T17:36:27+00:00","dateModified":"2025-05-27T09:57:47+00:00","description":"FileCloud blog Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023 Security -","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/zero-trust-will-be-the-leading-strategy-for-cybersecurity-and-risk-management-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Zero Trust will be the Leading Strategy for Cybersecurity and Risk Management in 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/ea3506ea3e9eb7bb2036e6c7c8fc05ea","name":"Katie Gerhardt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07bbf4097008eebfdc680520a6973c6e?s=96&d=mm&r=g","caption":"Katie Gerhardt"},"description":"Product Marketing Manager","sameAs":["1","https:\/\/www.linkedin.com\/in\/katie-gerhardt-88541791\/"],"url":"https:\/\/www.filecloud.com\/blog\/author\/katie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/34670"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=34670"}],"version-history":[{"count":9,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/34670\/revisions"}],"predecessor-version":[{"id":36508,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/34670\/revisions\/36508"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=34670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=34670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=34670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}