DiscoverZero Trust JourneyEpisode 22: Super Users, Super Endpoints: Securing IT, OT, IoT in a Zero Trust World
Episode 22: Super Users, Super Endpoints: Securing IT, OT, IoT in a Zero Trust World

Episode 22: Super Users, Super Endpoints: Securing IT, OT, IoT in a Zero Trust World

Update: 2025-07-19
Share

Description

Guest: Ben Tyminski
Host: Dr. Victor Monga
Co-host: Steve Turner

In this episode, the hosts are joined by Ben Tyminski, a security architect whose hands-on experience spans from finance to media, and from traditional endpoints to the ever-expanding universe of OT and IoT. Ben breaks down why “endpoint” is a moving target in today’s Zero Trust landscape—covering everything from laptops and servers to containers, appliances, and industrial controls. If you think endpoint security is just about laptops, think again.

Highlights:
--| The evolution of endpoints: why they now include OT, IoT, containers, and even Fargate.
--| Asset management and device posture: what’s actually possible in a hybrid, always-changing environment.
--| Microsegmentation, host firewalls, and how real-world Zero Trust controls get deployed.
--| Navigating the tension between super user/admin flexibility and organizational risk.
--| Cross-industry lessons learned: why working closely with help desk and SOC unlocks smarter security.

Another candid “Geek Show” discussion with technical deep-dives and real stories from the front lines of Zero Trust transformation.

Subscribe to our LinkedIn to never miss news, updates, and quizzes to earn digital badges.

Disclaimer: The views expressed are those of the speakers.

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Episode 22: Super Users, Super Endpoints: Securing IT, OT, IoT in a Zero Trust World

Episode 22: Super Users, Super Endpoints: Securing IT, OT, IoT in a Zero Trust World

Victor Monga