homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured: Solutions for Emerging Risks

    Discover tailored resources that translate emerging threats into actionable strategies

    Risk-Based Solutions

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Navigating Zero Trust in the Hybrid Workforce: Insights from Industry Leaders
SANS_social_88x82.jpg
SANS Institute

Navigating Zero Trust in the Hybrid Workforce: Insights from Industry Leaders

The digital landscape has drastically changed as the hybrid workforce becomes the new norm.

August 14, 2024

The digital landscape has drastically changed as the hybrid workforce becomes the new norm. This shift has brought about unique challenges in ensuring secure remote access while maintaining efficiency. Recently, SANS held a webinar to discuss these challenges and the role of Zero Trust and secure access service edge (SASE) in addressing them. The session featured John Spiegel, Director of Strategy and Field CTO for the Emerging Security Business Unit at Hewlett Packard Enterprise (HPE), and Darren Tidwell, Senior Solutions Engineer for HPE Aruba Networking’s SASE team. The webinar provided valuable insights into the evolving world of network security and the innovative solutions being implemented to tackle modern threats.

Speakers’ Backgrounds

Both John Spiegel and Darren Tidwell have extensive experience in the industry, transitioning from practitioners to key roles in leading companies. John has a rich history in enterprise leadership, network engineering, and infrastructure management. Currently, he hosts a podcast called “The Edge,” which covers SASE, security service edge (SSE), Zero Trust, and the role of the Chief Information Security Officer (CISO).

Darren Tidwell has a diverse background, having worked for Sun Microsystems, Oracle, A10 Networks, and Axis Security (now part of Aruba Networking). His role as a Senior Solutions Engineer involves demonstrating the capabilities of the HPE Aruba Networking SSE platform.

The Shift to Hybrid Work and Its Implications

John highlighted the challenges of working from home in a hybrid environment, emphasizing the need to balance work and personal life. “I’m what you might call a digital citizen,” John stated. “I have responsibilities to do my best to make sure that my public and private life don’t intersect in a negative manner. As we all know, this can be challenging.” With multiple devices connected to his home network, each potentially carrying a risk, the security dynamics are vastly different from the controlled environment of a traditional office setup. In the past, remote access involved a complex journey through various security systems, often managed by different teams, leading to inefficiencies and vulnerabilities.

The hybrid workforce has become a prime target for cyber-attackers. Statistics show a significant increase in social engineering threats and attacks on VPNs. “Social engineering threats are up by a whopping 270% in 2021, and they’ve increased ever since then,” John shared. The legacy IPsec protocol, in particular, has become a vulnerability due to its extensive code base and frequent bugs. These challenges have necessitated a shift towards more robust security strategies like Zero Trust.

The Rise of Zero Trust

Zero Trust, a concept introduced by John Kindervag in 2010, is based on the principle of “never trust, always verify.” This approach is crucial for remote access users, as it requires continuous validation of trust relationships. John outlined the critical elements of building these trust relationships, which include identity verification, device posture assessment, application request evaluation, and data sensitivity.

Introducing Secure Access Service Edge (SASE)

SASE, a term coined by Gartner in 2019, addresses the dilemma of choosing between speed and security in network deployments. By integrating networking and security functions into a unified cloud service, SASE provides both high performance and robust security. The framework consists of two main components: WAN Edge for performance and speed, and SSE for security.

John discussed the growing adoption of SASE solutions, particularly SSE, driven by the increasing hybrid workforce. SSE is seen as a strategic initiative to enable and secure remote workforces, with Zero Trust network access (ZTNA) leading the way. According to a report commissioned by Axis Security, a significant percentage of organizations plan to start their SASE strategy with SSE.

The HPE Aruba Networking SSE Solution

The HPE Aruba Networking SSE solution, formerly known as Axis Security’s Atmos, embodies the principle of “simplicity is the ultimate sophistication.” The platform integrates cloud-delivered networking and security functions, simplifying the management of multiple point products. John emphasized the importance of adaptive trust, which involves continuously verifying user and device trustworthiness before granting access.

Demonstrating the SSE Platform

Darren provided a detailed demonstration of the HPE Aruba Networking SSE platform, highlighting its user-friendly design and comprehensive security features. The platform supports both agent and agentless approaches, ensuring seamless user experiences. One notable feature is the use of synthetic IP spaces, which enhance security by preventing lateral movement of malware.

Darren also showcased the platform’s ability to enforce data loss prevention (DLP) policies based on device posture. “We can connect device posture to DLP functionality,” Darren explained. “You can actually take the device information or knowledge about what's happening on a device and make decisions about what data is and is not allowed.” This ensures that data access is tightly controlled, reducing the risk of data breaches. The platform’s management interface offers a unified view of security policies, simplifying the administration of various security functions like secure web gateway (SWG), cloud access security broker (CASB), and ZTNA.

The Journey to Modernizing Network Security

John concluded the session by discussing the journey towards modernizing network and security solutions. He emphasized the importance of aligning SASE and SSE implementations with critical business challenges. Whether it’s improving connectivity for branch locations or securing remote workforces, the journey should be tailored to specific organizational needs.

John shared a success story from Wynn Las Vegas, which transitioned to the Axis Security platform after struggling with traditional VPN and RDP solutions. The move resulted in lower costs, higher security, and simpler management, highlighting the benefits of a cloud-delivered, unified security solution. “The result? Lower costs, higher security, simpler to use, and best of all, incredible feedback from both the employees and the administrators,” John said.

The webinar provided valuable insights into the evolving landscape of network security in the hybrid workforce era. Zero Trust and SASE, particularly SSE, are pivotal in addressing modern security challenges. The HPE Aruba Networking SSE platform exemplifies the principles of simplicity and adaptive trust, offering a robust solution for securing remote access. As organizations continue to navigate the complexities of hybrid work, these insights and solutions will be crucial in ensuring a secure and efficient digital environment.

IMPLEMENTING A ZERO TRUST ARCHITECTURE is not a one-size-fits-all solution; it requires careful planning, implementation, and ongoing management. For those interested in delving deeper into the subject, SANS has recently released a Zero Trust strategy guide. This document is an excellent resource for anyone looking to learn more about the principles, implementation strategies, and benefits of adopting a Zero Trust Architecture in their organization.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cybersecurity and IT Essentials

Related Content

Blog
SCA_Blog_Cyber Skills Shortage_340 x 340.jpg
Cybersecurity and IT Essentials
May 15, 2025
Cyber Skills Shortage: SANS Institute to Triple Academy Cybersecurity Scholarships By 2026
The cost of a bad hire in cybersecurity isn’t just about money, it’s about risk, downtime, lost productivity, and missed opportunities.
thomas.jpg
Thomas Wolfe
read more
Blog
powershell_option_340x340.jpg
Offensive Operations, Pen Testing, and Red Teaming, Penetration Testing and Red Teaming, Cybersecurity and IT Essentials, Cyber Defense
July 27, 2022
Month of PowerShell: Fileless Malware with Get-Clipboard
Let's take a look at a sneaky attack to use PowerShell maliciously while evading detection (and some ways to detect it).
Josh Wright - Headshot - 370x370 2025.jpg
Joshua Wright
read more
Blog
powershell_option_340x340.jpg
Cyber Defense, Cybersecurity and IT Essentials
July 19, 2022
Month of PowerShell: Solving Problems (DeepBlueCLI, Syslog, and JSON)
Let's look at an example of problem solving using PowerShell with DeepBlueCLI, Syslog, and JSON data.
Josh Wright - Headshot - 370x370 2025.jpg
Joshua Wright
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn