You can't buy Zero Trust
You can't buy Zero Trust
You built it.
You built it.
Architectuur & Strategie
Producten helpen.
— Maar alleen als je eerst de principes adopteert en consequent doorvoert.
Cyber security
clear, reliable, secure.
- a comprehensive, collaborative system serving your business -
Cyber security
clear, reliable & secure.
- a comprehensive, collaborative system serving your business -
Iedereen heeft het over Zero Trust. Leveranciers beloven het in een product of dienst. Maar Zero Trust is in de kern geen tool; het is een architectuurkeuze en een manier van ontwerpen. Tooling kan helpen—sterk zelfs—maar pas nadat je de principes hebt omgezet naar samenhang: wat je beschermt, hoe toegang wordt besloten, waar je handhaaft en hoe je het meet.
Daarom begint Zero Trust met architectuur.
Ik help organisaties Zero Trust te vertalen van “goed idee” naar een uitvoerbaar ontwerp en roadmap die teams kunnen bouwen en governance/audit kan volgen—vendor-neutraal en pragmatisch.
Iedereen heeft het over Zero Trust. Leveranciers beloven het in een product of dienst. Maar Zero Trust is in de kern geen tool; het is een architectuurkeuze en een manier van ontwerpen. Tooling kan helpen—sterk zelfs—maar pas nadat je de principes hebt omgezet naar samenhang: wat je beschermt, hoe toegang wordt besloten, waar je handhaaft en hoe je het meet.
Daarom begint Zero Trust met architectuur.
Ik help organisaties Zero Trust te vertalen van “goed idee” naar een uitvoerbaar ontwerp en roadmap die teams kunnen bouwen en governance/audit kan volgen—vendor-neutraal en pragmatisch.
Iedereen heeft het over Zero Trust. Leveranciers beloven het in een product of dienst. Maar Zero Trust is in de kern geen tool; het is een architectuurkeuze en een manier van ontwerpen. Tooling kan helpen—sterk zelfs—maar pas nadat je de principes hebt omgezet naar samenhang: wat je beschermt, hoe toegang wordt besloten, waar je handhaaft en hoe je het meet.
Daarom begint Zero Trust met architectuur.
Ik help organisaties Zero Trust te vertalen van “goed idee” naar een uitvoerbaar ontwerp en roadmap die teams kunnen bouwen en governance/audit kan volgen—vendor-neutraal en pragmatisch.
You can’t design anything of any complexity without architecture. Architecture is the basis for all design.
— John A. Zachman
Seven Myths about Zero Trust
Myth 1 — “Zero Trust is a product”
Myth 2 — “When the project is completed, we achieve Zero Trust”
Myth 3 — "We implement MFA/ZTNA, so we are Zero Trust"
Myth 4 — “Zero Trust is only identity”
Myth 5 — “Zero Trust guarantees absolute security”
Myth 6 — “Zero Trust is only for large, complex enterprises”
Myth 7 — “Zero Trust makes everything slow and impractical for users”
Zero Trust is not a technology. It is a mindset and design principle.
Tooling can provide support, but only if you first determine what you are protecting, who/what requires access, and how you enforce it.
Myth 1 — “Zero Trust is a product”
Myth 2 — “When the project is completed, we achieve Zero Trust”
Myth 3 — "We implement MFA/ZTNA, so we are Zero Trust"
Myth 4 — “Zero Trust is only identity”
Myth 5 — “Zero Trust guarantees absolute security”
Myth 6 — “Zero Trust is only for large, complex enterprises”
Myth 7 — “Zero Trust makes everything slow and impractical for users”
Zero Trust is not a technology. It is a mindset and design principle.
Tooling can provide support, but only if you first determine what you are protecting, who/what requires access, and how you enforce it.
Myth 1 — “Zero Trust is a product”
Myth 2 — “When the project is completed, we achieve Zero Trust”
Myth 3 — "We implement MFA/ZTNA, so we are Zero Trust"
Myth 4 — “Zero Trust is only identity”
Myth 5 — “Zero Trust guarantees absolute security”
Myth 6 — “Zero Trust is only for large, complex enterprises”
Myth 7 — “Zero Trust makes everything slow and impractical for users”
Zero Trust is not a technology. It is a mindset and design principle.
Tooling can provide support, but only if you first determine what you are protecting, who/what requires access, and how you enforce it.
Five Core Principles of Zero Trust
Never trust, always verify
elke aanvraag wordt gevalideerd op identiteit + context.
Least privilege
Least privilege — minimaal noodzakelijke rechten, óók voor service accounts en non-human identities.
Protect surface & micro-segmentation
bescherm wat ertoe doet, ontwerp “micro-perimeters”.
Assume breach
ontwerp op impactbeperking en snelle indamming.
Continuous monitoring & validation
toegang is niet statisch; gedrag en posture tellen doorlopend mee.
Consistent
Similar situations are treated in the same manner.
Complete
Measures cover the full scope of the environment.
Comprehensive
The focus is on the entire chain and infrastructure.
Effective
Agreements lead to demonstrable and measurable results.
Effective
Agreements lead to demonstrable and measurable results.
Efficient
Security is essential but is proportional to the value it protects.
Efficient
Security is essential but is proportional to the value it protects.
In de praktijk functioneren security programma's beter wanneer deze vijf pijlers zijn geborgd. Ze vormen het minimale toetskader voor ontwerp, implementatie en continue verbetering.
In de praktijk functioneren security programma's beter wanneer deze vijf pijlers zijn geborgd. Ze vormen het minimale toetskader voor ontwerp, implementatie en continue verbetering.
Het overstappen naar ZTA (Zero Trust Architecture) is een proces waarbij een organisatie de risico's in haar operaties evalueert en kan niet eenvoudig worden voltooid door een volledige vervanging van technologie.
National Institute of Standards and Technology (NIST) SP 800
Build a Zero Trust architecture
based on the high-level Zero Trust steps developed by John Kindervag.
I assist organizations in commencing their Zero Trust journey: from principle → design → implementation roadmap.
Specifically, I deliver:
Protect Surface & DAAS inventory (what must be protected and why)
Transaction flows (how data and requests truly flow, including chains)
Target architecture (segmentation, identity, policy enforcement, logging/telemetry)
Policy model (who/what/where/when/how + exceptions with governance)
Roadmap (step-by-step, iterative, aligned with maturity and priorities)
Vendor reality check (integrating tools into the design, not the reverse)
Top 10 Cyber Threats Business Must Watches
Top 10 Cyber Threats
Business Must Watches
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
UPDATES
Top 10 Cyber Threats Business Must Watches
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
January, 2026
High
1
.
Ransomware &
data extortionHigh breach presence + impact; increasingly often also data theft/extortion.
January, 2026
High
2
.
Phishing &
social engineeringRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
High
3
.
Supply chain
vulnerabilitiesRemains the primary access vector; shift towards URLs, AitM, vishing/smishing.
January, 2026
Medium
4
.
Insider threats
Misconfigurations/“negligence” + opportunistic exploitation; difficult to detect.
January, 2026
High
5
.
Credential Theft &
Identity AttacksStolen credentials/info-stealers and SSO landing are widely applicable and scalable.
January, 2026
High
6
.
Exploited vulnera-
bilities & zero-days
KEV is growing; rapid weaponization + mass scanning.
January, 2026
Medium
7
.
Cloud misconfigura-
tions & API exposure
Cloud breaches occur more frequently; often resulting in data theft and identity pivoting.
January, 2026
Medium
8
.
AI Scams & Deepfake
ImpersonationGenAI lowers the barrier for convincing impersonation, vishing, and fraud.
January, 2026
High
9
.
DDoS / disruption
Hyper-volumetric attacks + hacktivism; availability is a top risk.
January, 2026
Medium
10
.
OT/ICS & IoT
attacksOT environments continue to be targets; ransomware + geopolitical threat.
Dus geen tool-selectie als startpunt. Eerst ontwerp, dan pas keuzes.
Stap 1: Afbakenen (protect surface)
Stap 2: Modelleren (flows + policy)
Stap 3: Ontwerpen & plannen (enforcement + telemetry + 30/60/90 backlog voor dié iteratie)

© Vaal Consulting 2026. Privacy Policy.

© Vaal Consulting 2025. Privacy Policy.

© Vaal Consulting 2025. Privacy Policy.

