Episode 45 Zero Trust in Action – Compliance Meets Strategy

Episode 45 Zero Trust in Action – Compliance Meets Strategy

Author: Intex IT March 11, 2026 Duration: 18:08
In this episode of Cyber Security Happy Hour, Christie breaks down how the Zero Trust security model aligns with major compliance frameworks, including PCI DSS v4.0 and ISO/IEC 27001. Zero Trust is no longer just a buzzword it is a strategic, adaptive approach built on “never trust, always verify.” But how does that fit with prescriptive or risk‑based compliance requirements? Christie explores where Zero Trust naturally strengthens compliance, where gaps emerge, and what organisations can do to bridge them. In this episode, you'll learn: How Zero Trust principles map to PCI DSS v4.0 access controls, MFA, and segmentation Why Zero Trust complements ISO 27001’s risk-based ISMS approach Real-world challenges organisations face when shifting to Zero Trust Practical steps to make Zero Trust work with your compliance programmes Tools and technologies that support both Zero Trust and compliance readiness Whether you’re planning a Zero Trust rollout or preparing for your next audit, this episode provides clear, actionable insights to help you navigate both worlds with confidence. Grab your drink of choice, tune in, and enjoy another round of practical cyber‑security wisdom.   Enjoy!   Need help  preparing for PCI DSS v4.0? Book a free 20‑minute consultation with our cybersecurity team at https://intexit.co.uk/pci-dss/     You can listen on:   At Intex IT Website: https://intexit.co.uk/podcast/   ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/  Do not forget to subscribe to the podcast so you never miss an episode. #podcast #CyberSecurity #InfoSec #DataProtection #PrivacyMatters #ThreatIntelligence #ZeroTrust #SecureTheFuture #CyberAware #RiskManagement #DigitalDefense #SecurityAwareness #Encryption #ITSecurity #CloudSecurity #HackerDefense #NetworkSecurity #PhishingPrevention #IdentityProtection #SecurityEducation #IncidentResponse #MalwareDefense #IoTSecurity #CyberResilience #SecureSoftware #PatchManagement #CISOInsights CyberHygiene  #CyberThreats #SecureInfrastructure  #ThreatDetection #SecurityConsulting   

Grab a drink and settle in for Cyber Security Happy Hour Podcast, where the conversation is as engaging as the topics are critical. Hosted by Christie Ogubere and brought to you by Intex IT, this series takes the intimidating world of digital defense and makes it accessible, relevant, and surprisingly conversational. Think of it as a regular catch-up with knowledgeable friends who work in the trenches of technology, business, and education, breaking down complex threats, strategies, and industry shifts without the jargon. You'll hear genuine discussions that range from practical advice for protecting a small business to analyzing major breaches and exploring the human elements behind the screens. This isn't a dry lecture; it's a lively dialogue designed for professionals who need to stay informed and anyone curious about the forces shaping our digital lives. Tune in for a podcast that feels like a necessary pit-stop in your week, offering clarity and perspective on everything from ransomware to regulatory changes, all while reminding you that cybersecurity is fundamentally about people.
Author: Language: English Episodes: 46

Cyber Security Happy Hour Podcast
Podcast Episodes
Episode 35 Conducting an ISO 27001 Risk Assessment [not-audio_url] [/not-audio_url]

Duration: 17:49
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Episode 35 Conducting an ISO 27001 Risk Assessment In the podcast I will be discussing the steps to conduct RISK Assessment as part of the ISO 27001 Impleme…
Episode 34 ISO 27001 Gap Analysis [not-audio_url] [/not-audio_url]

Duration: 11:44
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Episode 34 ISO 27001 Gap Analysis In the podcast I will be discussing the steps to conduct a ISMS Gap Analysis. Identify the scope: Obtain a copy of…
Episode 33 Defining your ISO 27001 ISMS Scope [not-audio_url] [/not-audio_url]

Duration: 11:52
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Defining your ISO 27001 ISMS Scope The boundaries of the information security management system (ISMS) The Scope should be defined to ensure that all…
Episode 32 Changes to ISO/IEC 27001(2022) [not-audio_url] [/not-audio_url]

Duration: 11:34
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Changes to ISO/IEC 27001(2022) What are the ISO 27001 and 27002 standards What is the difference between ISO 27001 and 27002? Annex A controls Certif…
Episode 31 Cyber Security vs Physical Security [not-audio_url] [/not-audio_url]

Duration: 11:46
Welcome to the Cyber Security Happy Hour Podcast Host: Christie Topic: Cyber Security vs Physical Security Cyber Security Physical Security Differences between Cyber and Physical Security Physical security components Phy…
Episode 30 Cyber Forensics [not-audio_url] [/not-audio_url]

Duration: 18:12
Welcome to the Cyber Security Happy Hour Podcast. Host: Christie Topic: Cyber ForensicsWhat is Computer Forensics? Examples of Cyber Forensics? Forensics ProceduresTypes of computer forensics Skills and Knowledge require…
Episode 28 Log4J Vulnerabilities [not-audio_url] [/not-audio_url]

Duration: 11:56
Welcome to Episode 28 of the Cyber Security Happy Podcast. I am your host Christie the topic of today podcast is Episode 28 is Log4J Vulnerabilities What is Log4J? How does Log4j Work? Systems Affected CVSS Patching and…
Episode 27 Why you need Cyber Insurance [not-audio_url] [/not-audio_url]

Duration: 11:33
Welcome to Episode 27 of the Cyber Security Happy Podcast. I am your host Christie the topic of today podcast is Episode 27 Why you need Cyber Insurance. What is Cyber Risk Insurance? How are you affected by Cyber Attack…
Episode 26 Robinhood‘s Data Breach - Cyber Attack [not-audio_url] [/not-audio_url]

Duration: 14:54
Welcome to Episode 26 of the Cyber Security Happy Podcast. I am your host Christie the topic of today podcast is Episode 26 Robinhood‘s Data Breach - Cyber Attack Robinhood who are they? What is a data breach? What happe…