Multiple Paths to Zero Trust - Channeling D&D, LOTR and It's Always Sunny in Philadelphia

Security Breach

Security Breach
Multiple Paths to Zero Trust - Channeling D&D, LOTR and It's Always Sunny in Philadelphia
Apr 16, 2026
Eric Sorensen

Send us Fan Mail

One of my least favorite tasks of Basic Training was weapons maintenance. I didn’t really mind cleaning my M-16A2 rifle, but sometimes it just felt pointless. We’d spend hours stripping, cleaning, reassembling, inspecting and, ultimately, being told it still wasn’t clean enough by the drill sergeant or armor.

It took me a while, but eventually, I realized that the benefits of this process went beyond just a clean weapon. Although there are obvious lessons there, I also got to know that rifle down to its firing pin retaining pin. So, if it misfired during field training exercises, I knew exactly how to correct the issue in the moment and perform more extensive actions in an expediate manner when time allowed.

I wasn’t just cleaning a rifle, I was gaining insight into all aspects of an essential battlefield tool.

I think there are some parallels to my training experience and your approaches to implementing Zero Trust frameworks. While the upfront benefits are pretty straightforward, my guest for this episode lays out a number of other gains that organizations realize while implementing Zero Trust. 

Watch/listen as Kam Chumley-Soltani, Managing Director, OT Security at Armis, discusses:

  • How Zero Trust initiatives can lead to greater cyber hygiene by demanding greater scrutiny of visibility, vulnerability management and threat detection capabilities.
  • Managing the need to patch versus the realities of operational downtime.
  • Defining and establishing priorities around your crown jewels.
  • How Dungeons & Dragons can help improve tabletop training exercises.
  • Why new Department of War regulations are having a far-reaching impact on Zero Trust.
  • Avoiding common segmentation mistakes.
  • Why the foundation for successful AI implementation is still being built.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Episode Artwork Multiple Paths to Zero Trust - Channeling D&D, LOTR and It's Always Sunny in Philadelphia 44:01 Episode Artwork The Bad Guy's Different Set of Rules 29:01 Episode Artwork Finding the Soul of a Pirate 37:35 Episode Artwork Analyzing, Responding to the Inevitable Uptick in Iranian Cyberattacks 36:38 Episode Artwork Hybrid Warfare is Upon You 31:34 Episode Artwork Security Breach: Strengthening Your Weakest Links 32:58 Episode Artwork Clarifying the Big-Picture Impacts of CMMC 41:23 Episode Artwork Shiny Objects and the Power of Preparation 44:22 Episode Artwork You Don't Have to Out-Tech the Hacker 40:55 Episode Artwork Speaking the Right Language 46:39 Episode Artwork Why People Are Not the Biggest Risk 49:03 Episode Artwork Preserving Uptime in the Face of Evolving Attacks 31:05 Episode Artwork New Patching Strategies for Old Vulnerabilities 26:12 Episode Artwork The Wild & Weird of Industrial Cybersecurity 30:33 Episode Artwork Using AI to Stay Ahead of the Hack 31:41 Episode Artwork Threat Landscape Update 49:32 Episode Artwork Cure Me or Kill Me - The Little Things That Escalate Attacks 43:18 Episode Artwork Being 'Proactively Paranoid, Not Paralyzed' 36:54 Episode Artwork Why More Hackers Are Logging On Than Breaking In 32:27 Episode Artwork You Think You Know Me 35:06 Episode Artwork Avoiding the Ostrich Approach 50:46 Episode Artwork 'We've Made Our Own Prison' 42:19 Episode Artwork Dark AI Speeding Hacker Evolution 36:11 Episode Artwork Why Ransomware, Credential Theft and Phishing Schemes Persist 39:22 Episode Artwork Unsecure Webcam Was All a Ransomware Group Needed 31:23