When John Kindervag first uttered those four words that would reshape cybersecurity forever—"never trust, always verify"—he couldn't have known that 15 years later, his vision would be the cornerstone of defense against threats that didn't even exist in 2009.
As I reflect on his recent LinkedIn post celebrating Zero Trust's 15th anniversary, I'm struck by the profound impact this single concept has had on our industry. From analyst reports to federal mandates, Zero Trust has evolved from a radical shift in thinking to the standard by which we measure security maturity.

The Vision That Changed Everything
"Back then, it was a radical shift from perimeter-based security thinking. Today, it's the foundation of how we defend against AI-driven threats, quantum risks, and hyperconnected systems."
— John Kindervag, Creator of Zero Trust
The Birth of a Revolution
In 2009, the cybersecurity landscape was fundamentally different. We lived in a world where the perimeter was king, where firewalls and VPNs were our primary defenses, and where "trust but verify" was the prevailing wisdom. Organizations built digital moats around their networks, believing that once inside, users and devices could be trusted.
John Kindervag saw the fundamental flaw in this approach. He recognized that the perimeter was already compromised—that threats were already inside our networks, that users were already compromised, and that devices were already vulnerable. His solution was elegantly simple yet profoundly revolutionary: trust nothing, verify everything.

John Kindervag introduces the Zero Trust model at Forrester Research, challenging the fundamental assumption that anything inside the network perimeter can be trusted.
Forward-thinking organizations begin implementing Zero Trust principles, with Google's BeyondCorp becoming one of the first major implementations.
Major breaches like Equifax and Marriott drive adoption. NIST begins developing Zero Trust guidelines, and the model gains mainstream acceptance.
Executive Order 14028 mandates Zero Trust for federal agencies. The model evolves to address cloud, remote work, and emerging threats like AI and quantum computing.
The Challenge We Face Today
As John noted in his post, Zero Trust has come a long way, but it's just getting started. The challenges we face today are more complex than ever:
What I'm seeing now is that many organizations stall not because Zero Trust is flawed, but because the lessons from real-world failures don't get captured and fed forward. That's why I've been focused on Strategic Trust—building on the Zero Trust foundation to create adaptive, mission-aware enforcement that keeps momentum alive.

"What I'm seeing now is that many organizations stall not because Zero Trust is flawed, but because the lessons from real-world failures don't get captured and fed forward. That's why I've been focused on Strategic Trust—building on the Zero Trust foundation to create adaptive, mission-aware enforcement that keeps momentum alive."
The Evolution: From Zero Trust to Strategic Trust
While Zero Trust provides the foundational principle of "never trust, always verify," Strategic Trust takes this a step further by asking: "What should we verify, when should we verify it, and how can we make verification seamless for legitimate users while blocking threats?"
Strategic Trust builds on John's revolutionary framework by:
- Learning from Failures: Capturing lessons from real-world breaches and feeding them back into the security model. Learn from 365 daily lessons covering actual Zero Trust failures.
- Adaptive Enforcement: Adjusting security policies based on context, risk, and mission requirements using our Strategic Trust Software.
- Mission-Aware Security: Balancing security with operational efficiency and user experience through expert consultation.
- Continuous Evolution: Updating security models as threats and technologies evolve with our vCISO services.

The Next 15 Years: Adapting to New Threats
As John looks toward the next 15 years, he raises a crucial question: "Do you see the greater challenge as adapting the model to new threats (AI/quantum) or ensuring organizations don't lose sight of the fundamentals in the rush to adopt?"
This is the question that keeps me up at night. The answer, I believe, is both—and that's exactly why Strategic Trust exists.
We must adapt to new threats like AI-driven attacks and quantum computing, but we cannot lose sight of the fundamentals. The organizations that succeed will be those that:
- Master the Basics: Implement Zero Trust fundamentals correctly before adding complexity. Start with our free "Top 25 Zero Trust Failures" guide.
- Learn Continuously: Capture and apply lessons from every failure, every breach, every near-miss through our daily lesson program.
- Adapt Intelligently: Evolve their security model as threats and technologies change using our ROI calculator to measure impact.
- Balance Security and Operations: Ensure security enhances rather than hinders mission success with PIP licensing for strategic implementation.

A Personal Reflection
John, thank you for bringing the industry a model that reset the way we all think about security. Your "never trust, always verify" principle became the necessary foundation—and it still resonates today.
Your vision has saved countless organizations from breaches, guided federal policy, and fundamentally changed how we approach cybersecurity. But perhaps most importantly, it has given us a framework for thinking about security that can evolve with the threats we face.
As we look toward the next 15 years, I'm excited to see how Zero Trust continues to evolve. With Strategic Trust, we're building on your foundation to create security models that not only protect against today's threats but can adapt to tomorrow's challenges.
Ready to Build on the Zero Trust Foundation?
Learn from 365 real-world Zero Trust failures and discover how Strategic Trust can prevent them. Get daily lessons, breach analysis, and implementation guidance.
Looking Forward
The next 15 years of Zero Trust will be defined by our ability to balance innovation with fundamentals, adaptation with consistency, and security with usability. As John said, "it's just getting started."
I'm honored to be part of this journey, building on the foundation that John Kindervag laid 15 years ago. Here's to the next 15 years of never trusting, always verifying, and continuously evolving our approach to cybersecurity.
What do you think? As you look at the next 15 years, do you see the greater challenge as adapting the model to new threats or ensuring organizations don't lose sight of the fundamentals in the rush to adopt?
Share Your Thoughts
Join the conversation about Zero Trust's future. Connect with us on LinkedIn or book a strategy call to discuss how Strategic Trust can help your organization build on the Zero Trust foundation.