ENG
FR
Go Back
Cyber Security

An honest chat about ZERO TRUST, with Director of Cybersecurity at Plurilock, Paul Baker

Why Zero Trust is the Future of Cybersecurity

In this episode of 10 Questions to Cyber Resilience, Assurance IT co-founder Luigi Tiano sits down with Paul Baker, Director of Cybersecurity at Plurilock, to discuss the critical role of Zero Trust in today’s cyber landscape.

Topics Covered:

🔐 What is Zero Trust? – Understanding the core principles.
🚫 Never Assume Trust – Why every user and device must be verified.
🏢 How to Get Enterprises to Prioritize Zero Trust – Overcoming resistance to change.
💰 Calculating the Cost of Network Protection – Is it as straightforward as it seems?
👥 How to Get People to Buy into Cybersecurity – Bridging the gap between security and convenience.
🔑 Zero Trust & Identity Access Management (IAM) – Strengthening authentication processes.
📲 Continuous Authentication vs. MFA – Which offers better security?
Is Continuous Authentication Safe? – Debunking myths and concerns.
📊 Measuring the Effectiveness of Zero Trust – Key metrics for success.
🛡️ Does Zero Trust Help with Cyber Insurance? – How it impacts coverage and compliance.
📈 Long-Term Benefits of Zero Trust – Future-proofing cybersecurity strategies.

Resources:

🔗 Paul Baker on LinkedIn
🔗 Plurilock
🔗 Luigi Tiano on LinkedIn
🔗 Assurance IT

About Paul Baker

Paul Baker is a customer-focused cybersecurity leader with extensive experience working with stakeholders at all levels—from developers to C-suite executives. He specializes in identifying client needs, assessing security solutions, and driving technology adoption for businesses looking to strengthen their cyber defenses.

About 10 Questions to Cyber Resilience

A bi-monthly podcast where IT leaders share real-world strategies for strengthening cybersecurity. Each episode tackles 10 critical questions designed to bring businesses one step closer to cyber resilience.

About Assurance IT

Since 2011, Assurance IT has helped mid-market businesses in Canada with data protection and privacy. Their PPR Methodology—Prepare, Protect, and Recover—provides a structured approach to achieving cybersecurity and compliance objectives.

Featured Posts
Cyber Talk

Access monthly conversations with IT & Tech Leaders about the hottest cyber security topics in the industry.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.