Skip to main content
Daniel J Glover
Back to Blog

Zero Trust: A Strategy, Not a Product

22 min read
Article overview
Written by Daniel J Glover

Practical perspective from an IT leader working across operations, security, automation, and change.

Published 17 January 2026

22 minute read with practical, decision-oriented guidance.

Best suited for

Leaders and operators looking for concise, actionable takeaways.

If I had a pound for every email I received promising to "Install Zero Trust in 24 hours," I would have retired to the Bahamas.

Zero Trust Network Access (ZTNA) is simultaneously the most hyped and most pivotal concept in modern cybersecurity. It is also the most misunderstood. You cannot buy Zero Trust. It is an architectural approach, not a SKU.

This article cuts through the marketing fog to examine what Zero Trust actually means, how to assess your organisation's readiness, and how to implement it in phases without disrupting your business. We will explore the three foundational pillars, provide a practical maturity model, and give you a roadmap for transformation.


The Zero Trust Myth vs Reality

Before we discuss implementation, we need to dispel some persistent myths that vendors perpetuate.

What Zero Trust Is Not

Myth 1: Zero Trust is a product you can buy. Every major security vendor now slaps "Zero Trust" on their product brochures. Firewalls, VPNs, identity providers, endpoint agents - all claim to "enable Zero Trust." None of them deliver it alone. Zero Trust is an architecture, not a product category.

Myth 2: Zero Trust means trusting nothing. The name is unfortunately misleading. Zero Trust does not mean paranoid distrust of everything. It means verifying everything explicitly rather than relying on implicit trust from network location.

Myth 3: Zero Trust replaces your existing security. Zero Trust augments and reorganises your security controls. It does not eliminate the need for firewalls, encryption, or endpoint protection. It changes how these controls coordinate and make decisions.

Myth 4: Zero Trust is only for large enterprises. While implementation complexity scales with organisation size, the principles apply to organisations of any size. A 50-person company can implement Zero Trust principles with standard tooling.

What Zero Trust Actually Is

Zero Trust is a security model based on a simple principle: "Never trust, always verify."

The traditional security model - often called "Castle and Moat" - assumed that if you were inside the corporate network, you were trusted. Everyone inside the castle walls was a friend. This model made sense when:

  • Employees worked in offices
  • Servers lived in data centres
  • Applications were on-premises
  • The network perimeter was well-defined

None of these assumptions hold in 2026. Your employees work from home, coffee shops, and co-working spaces. Your servers are in AWS, Azure, and Google Cloud. Your applications are SaaS. The perimeter has not just eroded - it has evaporated.

Zero Trust assumes the network is already compromised. Every access request - regardless of source - must be explicitly verified against:

  • Identity: Who is making the request?
  • Device: What device are they using, and is it healthy?
  • Context: When, where, and why are they requesting access?
  • Resource: What specifically are they trying to access?
  • Privilege: Should they have access to this resource at this time?

Only after all these factors are verified does access get granted - and only the minimum access required.

The Shift in Thinking

Traditional ModelZero Trust Model
Trust internal network trafficVerify all traffic regardless of source
Wide network access once connectedLeast privilege access to specific resources
Security focused on perimeterSecurity focused on identity and data
Static access permissionsDynamic, context-aware access decisions
VPN as primary remote accessIdentity-centric access without VPN
Implicit trust for internal usersExplicit verification for all users
Flat networks with minimal segmentationMicro-segmented networks with strict boundaries

This shift fundamentally changes how we architect security. As I discussed in Identity is the New Firewall, the network perimeter is dead. Identity has become the new perimeter - and Zero Trust is the architecture that makes identity-centric security operational.


The Three Pillars of Zero Trust

Zero Trust implementations rest on three foundational pillars. Miss any one of them, and your architecture has a structural weakness.

Pillar 1: Identity Verification (The Foundation)

Identity is the cornerstone of Zero Trust. Before any other decision can be made, you must know who is making the request. Not just their username - their verified identity.

As I explored in Identity is the New Firewall, the vast majority of modern breaches involve compromised identities, not smashed firewalls. If an attacker steals a valid credential, network controls are useless. The attacker is the user.

Essential Identity Controls:

Multi-Factor Authentication (MFA): If you still allow single-factor authentication on any external-facing system, you are negligent. But not all MFA is equal:

  • SMS/Voice codes: Vulnerable to SIM swapping and interception. Better than nothing, but barely.
  • Time-based codes (TOTP): Better, but still phishable.
  • Push notifications: Convenient but susceptible to push fatigue attacks.
  • Hardware keys (FIDO2/WebAuthn): Phishing-resistant. The gold standard.
  • Biometric passkeys: The future - phishing-resistant with excellent UX.

Move toward phishing-resistant MFA for all privileged access and sensitive systems.

Single Sign-On (SSO): SSO is not just a convenience feature - it is a security control. It creates:

  • A single authentication point for all applications
  • Centralised logging and auditing
  • One place to revoke access when employees leave
  • Consistent policy enforcement across applications

Every application that supports SSO should use it. Every application that does not should be evaluated for replacement.

Identity Governance and Administration (IGA): Knowing who someone is means nothing if you do not manage what they are allowed to do:

  • Automated provisioning and deprovisioning
  • Access certification and reviews
  • Segregation of duties enforcement
  • Access request workflows

Conditional Access Policies: Identity verification should not be binary. Conditional access evaluates context:

  • Is this a known device?
  • Is the location unusual?
  • What is the user trying to access?
  • What is the risk level of this request?

Based on these factors, you might allow access, require additional verification, or deny access entirely.

Pillar 2: Device Health

Verifying identity is necessary but insufficient. You must also verify the device making the request.

Consider this scenario: Your CEO authenticates with their username, password, and hardware key. Perfect identity verification. But they are connecting from an infected, unmanaged personal iPad they picked up at a conference. Zero Trust says: Access Denied.

The device is part of the trust calculation because a compromised device can compromise everything the user accesses from it.

Device Health Signals:

  • Management status: Is this a managed corporate device or a personal device?
  • OS patch level: Is the operating system current on security updates?
  • Disk encryption: Is the device encrypted at rest?
  • Endpoint protection: Is EDR/antivirus running and healthy?
  • Firewall status: Is the local firewall enabled?
  • Jailbreak/root detection: Has the device been tampered with?
  • Compliance status: Does the device meet your baseline requirements?

Device Trust Tiers:

Not all devices need the same trust level. Consider a tiered approach:

TierDevice TypeTrust LevelAccess Scope
1Managed, fully compliant corporate deviceHighAll corporate resources
2Managed device with minor compliance gapsMediumMost resources, excluding highly sensitive
3BYOD with MDM enrolledLowLimited resources via containerised apps
4Unknown/unmanaged deviceMinimalPublic resources only, or browser-based with no data export

Technical Implementation:

Device health verification typically requires:

  • Mobile Device Management (MDM) for mobile devices
  • Endpoint Detection and Response (EDR) for computers
  • Device compliance policies defining minimum requirements
  • Conditional access integration to enforce device requirements at authentication

Your identity provider and device management platform must integrate to share health signals. Without this integration, you cannot make device-aware access decisions.

Pillar 3: Least Privilege Access

The third pillar addresses what happens after identity and device are verified: granting the minimum access required, for the minimum time required.

The traditional model granted broad access - once authenticated, users could often reach many resources they did not need. Zero Trust inverts this: access is denied by default, and explicitly granted only to specific resources.

Least Privilege Principles:

Default Deny: If access is not explicitly granted, it is denied. This is the opposite of traditional "allow by default" networks.

Just Enough Access (JEA): Grant access only to the specific resources needed for the specific task. A developer does not need access to the HR database. A marketing analyst does not need access to production servers.

Just-In-Time Access (JIT): Why does your administrator have Domain Admin rights 24/7? They use those privileges for perhaps 10 minutes a day. JIT grants elevated privileges only when needed, for a specific duration, with specific approval. When the task is complete, privileges are revoked automatically.

Micro-Segmentation: Traditional networks are "flat" - once inside, you can communicate with anything. Micro-segmentation creates secure zones, limiting lateral movement. The printer cannot talk to the database server. The development environment cannot reach production.

Application-Level Access: Instead of network access, grant application-level access. Users connect to the specific application they need, not to the network where the application lives. This eliminates the concept of "being on the corporate network."

Implementation Considerations:

ControlPurposeImplementation
Privileged Access Management (PAM)Control and audit privileged credentialsCyberArk, BeyondTrust, HashiCorp Vault
Identity Governance (IGA)Lifecycle management and access reviewsSailPoint, Saviynt, Microsoft Entra ID Governance
Zero Trust Network Access (ZTNA)Application-level access without VPNZscaler, Cloudflare Access, Palo Alto Prisma
Software-Defined PerimeterHide applications from unauthorised usersAppgate, Perimeter 81, Google BeyondCorp
Micro-SegmentationLimit lateral movement within networksIllumio, Guardicore, VMware NSX

Zero Trust Maturity Model

Zero Trust implementation is not binary - it is a journey. Most organisations start at a low maturity level and progress through stages over multiple years.

The Five Maturity Levels

LevelNameCharacteristics
0TraditionalPerimeter-based security; implicit trust for internal network; limited identity controls; flat network architecture
1InitialBasic MFA deployed; some network segmentation; centralised identity provider; awareness of Zero Trust concepts
2DevelopingMFA for all users; device health checks begun; ZTNA for some applications; access reviews implemented
3DefinedConditional access policies active; comprehensive device compliance; micro-segmentation advancing; JIT access for privileged accounts
4ManagedReal-time risk assessment; continuous verification; automated response to anomalies; comprehensive visibility
5OptimisedFully automated Zero Trust decisions; AI-driven anomaly detection; continuous improvement; complete asset visibility

Most organisations today are at Level 0 or 1. Reaching Level 3 represents a significant security improvement. Level 5 is aspirational for most - even security-mature organisations rarely achieve full optimisation.

Self-Assessment Checklist

Use this checklist to assess your current Zero Trust maturity:

Identity (Score 0-5 for each):

  • All users have MFA enabled for all external access
  • Phishing-resistant MFA deployed for privileged accounts
  • SSO implemented for all supported applications
  • Automated provisioning/deprovisioning in place
  • Regular access reviews conducted and actioned
  • Conditional access policies evaluate context
  • Identity threat detection monitors for anomalies

Device (Score 0-5 for each):

  • Device inventory is complete and accurate
  • MDM deployed on all mobile devices accessing corporate data
  • EDR deployed on all endpoints
  • Device compliance policies defined and enforced
  • Conditional access integrates device health signals
  • BYOD policy clearly defined with technical controls
  • Unmanaged device access restricted appropriately

Network/Access (Score 0-5 for each):

  • Network segmentation separates critical assets
  • ZTNA deployed for remote application access
  • VPN dependency reduced or eliminated
  • Micro-segmentation limits lateral movement
  • Application-level access replaces network-level access
  • Default deny posture for new connections
  • Visibility into all network traffic

Privileged Access (Score 0-5 for each):

  • Privileged accounts inventoried and monitored
  • PAM solution manages privileged credentials
  • JIT access implemented for administrative tasks
  • Session recording for sensitive access
  • Separation of duties enforced
  • Break-glass procedures documented and tested
  • Regular privileged access reviews conducted

Scoring:

  • 0-35: Level 0-1 (Traditional/Initial)
  • 36-70: Level 2 (Developing)
  • 71-105: Level 3 (Defined)
  • 106-125: Level 4 (Managed)
  • 126-140: Level 5 (Optimised)

The Zero Trust Adoption Roadmap

Migrating to Zero Trust is a multi-year journey. Do not attempt to "rip and replace" your entire security architecture overnight. That path leads to outages, user frustration, and abandoned initiatives.

Instead, approach Zero Trust in phases, starting with your highest-value targets and expanding methodically.

Phase 1: Foundation (Months 1-6)

Objectives:

  • Establish identity as the primary control plane
  • Achieve comprehensive MFA coverage
  • Gain visibility into current access patterns

Week 1-4: Assessment and Planning

  • Conduct current state security assessment
  • Inventory all applications and their authentication methods
  • Map data flows and identify critical assets ("Crown Jewels")
  • Assess existing identity infrastructure
  • Document current network architecture
  • Identify stakeholders and form Zero Trust working group
  • Develop phased implementation plan

Week 5-12: Identity Foundation

  • Deploy or upgrade identity provider (Entra ID, Okta, etc.)
  • Enable MFA for all external access
  • Implement SSO for high-priority applications
  • Configure basic conditional access policies
  • Begin automated provisioning/deprovisioning
  • Deploy phishing-resistant MFA for IT administrators

Week 13-24: Device Visibility

  • Complete device inventory across all platforms
  • Deploy MDM for mobile devices
  • Ensure EDR coverage on all endpoints
  • Define initial device compliance baselines
  • Integrate device signals with identity provider
  • Establish BYOD policy and technical controls

Phase 1 Checkpoint:

Before proceeding to Phase 2, validate:

  • MFA enabled for 100% of external access
  • SSO implemented for top 10 applications
  • Conditional access policies active
  • Device inventory 95%+ complete
  • MDM/EDR coverage on all managed devices
  • Stakeholder support confirmed

Phase 2: Crown Jewels Protection (Months 7-12)

Objectives:

  • Protect most critical applications with full Zero Trust controls
  • Implement ZTNA for sensitive application access
  • Deploy PAM for privileged accounts

Crown Jewels Identification:

Your "Crown Jewels" are the systems and data that would cause the most damage if compromised. Typically:

  • Financial systems (ERP, banking, payment processing)
  • Customer data repositories (CRM, databases)
  • Intellectual property (source code, designs, research)
  • HR systems (employee data, payroll)
  • Executive communications

Week 25-36: ZTNA Deployment

  • Select ZTNA solution aligned with architecture
  • Deploy ZTNA for Crown Jewels applications
  • Configure application-level access policies
  • Integrate with identity and device health signals
  • Train IT staff on ZTNA administration
  • Begin phased user migration from VPN

Week 37-48: Privileged Access Management

  • Inventory all privileged accounts
  • Deploy PAM solution (CyberArk, BeyondTrust, etc.)
  • Implement password vaulting for admin accounts
  • Configure JIT access for administrative tasks
  • Enable session recording for sensitive access
  • Conduct privileged access review

Phase 2 Checkpoint:

  • Crown Jewels applications protected with ZTNA
  • PAM deployed for IT administrative access
  • JIT access operational for routine admin tasks
  • VPN dependency reduced for pilot groups
  • Metrics showing reduced attack surface

Phase 3: Broad Deployment (Months 13-24)

Objectives:

  • Extend Zero Trust controls to all applications
  • Implement micro-segmentation
  • Achieve continuous verification

Week 49-72: Application Expansion

  • Deploy ZTNA for Tier 2 applications
  • Migrate remaining users from VPN
  • Extend SSO to all supported applications
  • Implement risk-based authentication
  • Configure automated response to anomalies

Week 73-96: Network Transformation

  • Design micro-segmentation architecture
  • Deploy initial micro-segmentation for critical segments
  • Implement network traffic analysis
  • Reduce lateral movement paths
  • Validate segmentation effectiveness through testing

Phase 3 Checkpoint:

  • ZTNA deployed for all appropriate applications
  • VPN eliminated or limited to exceptions
  • Micro-segmentation protecting critical assets
  • Continuous monitoring operational
  • Incident response processes updated for Zero Trust

Phase 4: Optimisation (Ongoing)

Objectives:

  • Continuous improvement based on metrics
  • Advanced automation and AI-driven decisions
  • Regular maturity reassessment

Ongoing Activities:

  • Regular access reviews and certification
  • Policy refinement based on operational data
  • Technology refresh as capabilities evolve
  • Red team exercises to validate controls
  • Maturity assessment against framework
  • Stakeholder reporting and ROI demonstration

Vendor Landscape Overview

The Zero Trust market is crowded and confusing. Understanding the landscape helps navigate vendor conversations.

Platform Categories

CategoryWhat It DoesKey Vendors
Identity Provider (IdP)Centralised authentication and SSOMicrosoft Entra ID, Okta, Ping Identity, Google Workspace
Zero Trust Network Access (ZTNA)Application-level access without VPNZscaler Private Access, Cloudflare Access, Palo Alto Prisma Access, Netskope Private Access
Secure Access Service Edge (SASE)Converged network and security servicesZscaler, Netskope, Palo Alto, Cisco
Privileged Access Management (PAM)Secure privileged credentials and sessionsCyberArk, BeyondTrust, Delinea, HashiCorp Vault
Identity Governance (IGA)Access lifecycle and certificationSailPoint, Saviynt, One Identity, Microsoft Entra ID Governance
Endpoint Detection and Response (EDR)Device security and health attestationCrowdStrike, Microsoft Defender, SentinelOne, Carbon Black
Micro-SegmentationNetwork traffic control and lateral movement preventionIllumio, Guardicore (Akamai), VMware NSX

Vendor Selection Considerations

When evaluating vendors, consider:

Integration capability: Zero Trust requires components to share signals. Vendors must integrate with your existing identity, endpoint, and network infrastructure.

Deployment model: Cloud-native vs on-premises vs hybrid. Your infrastructure strategy should guide this choice.

User experience: Security that frustrates users gets bypassed. Evaluate the user experience for each solution.

Operational complexity: More tools means more operational overhead. Consider managed services or converged platforms.

Total cost of ownership: Beyond licensing, consider implementation, training, integration, and ongoing operations.

Vendor viability: Zero Trust is a long-term architecture. Ensure vendors will be around for the journey.

Avoid Vendor Traps

The "complete solution" myth: No single vendor delivers complete Zero Trust. You will need multiple integrated components.

The checkbox approach: Do not buy tools to check compliance boxes. Buy tools that genuinely improve your security posture.

The best-of-breed vs platform debate: There is no universal right answer. Best-of-breed offers capability but complexity. Platforms offer integration but potential gaps. Choose based on your operational maturity and resources.


Migration Priority Matrix

Not all applications and users should migrate at the same time. Prioritise based on risk and impact.

PriorityApplication TypeUser GroupRationale
1 - ImmediateFinancial systems, customer databasesIT administratorsHighest value targets; privileged access most abused
2 - HighEmail, collaboration toolsExecutives, finance staffCommon attack vectors; high-value user targets
3 - MediumDevelopment tools, internal appsGeneral employeesSignificant data access; large user population
4 - LowerPublic-facing marketing, low-sensitivity appsContractors, temporary staffLower data sensitivity; transient users
5 - DeferredLegacy systems without modern authSpecialised usersTechnical constraints; plan for modernisation

Prioritisation Factors

Data sensitivity: What is the classification of data accessible through this system?

User privilege level: Are users accessing administrative functions or routine tasks?

Attack surface: Is the application internet-facing? Does it process untrusted input?

Business criticality: What is the impact of downtime or compromise?

Technical feasibility: Does the application support modern authentication?

User impact: How disruptive will the migration be for users?


Common Implementation Challenges

Zero Trust implementations frequently encounter these challenges. Anticipate them.

Technical Challenges

Legacy application compatibility: Some applications do not support modern authentication (SAML, OIDC, SCIM). Options include:

  • Application proxy solutions that front legacy apps
  • Vendor upgrades or replacements
  • Isolated access with additional compensating controls

Network visibility gaps: You cannot protect what you cannot see. Ensure comprehensive visibility into network traffic before implementing micro-segmentation.

Integration complexity: Zero Trust requires components to share information. Budget significant effort for integration work.

Organisational Challenges

User resistance: Zero Trust may introduce additional verification steps. Communicate the "why" before the "what." Emphasise that security protects users, not just the company.

Stakeholder fatigue: Multi-year transformations risk losing executive attention. Deliver visible wins early and maintain regular progress reporting.

Skills gaps: Zero Trust requires new skills in identity, cloud security, and modern architecture. Plan for training and potentially external support.

Operational Challenges

Alert fatigue: More visibility means more alerts. Invest in tuning and automation to prevent analyst burnout.

Policy complexity: Conditional access policies can become complex quickly. Document policies clearly and review regularly.

Incident response updates: Zero Trust changes how incidents unfold. Update playbooks and train responders on the new architecture.


Measuring Zero Trust Success

Metrics demonstrate progress and justify continued investment.

Key Performance Indicators

CategoryMetricTarget
Coverage% of applications protected by ZTNA100% (excluding documented exceptions)
Coverage% of users with MFA enabled100%
Coverage% of privileged accounts in PAM100%
EffectivenessMean time to revoke access on termination< 1 hour
Effectiveness% of access requests requiring step-up authRisk-appropriate
EffectivenessLateral movement attempts blockedIncreasing
Risk ReductionVPN attack surface eliminatedMeasured in exposed services
Risk ReductionPrivileged session durationDecreasing
OperationalFalse positive rate for anomaly detection< 5%
OperationalUser authentication friction incidentsDecreasing

Demonstrating ROI

Zero Trust investments compete for budget. Demonstrate value through:

  • Reduced breach risk: Quantify risk reduction using frameworks like FAIR
  • Compliance efficiency: Reduced audit findings, faster evidence collection
  • Operational savings: VPN infrastructure retirement, reduced help desk burden
  • Business enablement: Secure remote work, faster onboarding, M&A integration

Zero Trust and the Modern Workplace

Zero Trust aligns perfectly with how organisations actually operate in 2026.

Remote and Hybrid Work

As I explored in Asynchronous IT Leadership, the remote-first world is here to stay. Zero Trust was designed for this reality - it assumes no network is trusted, making work location irrelevant to security posture.

VPNs were designed to extend the corporate network to remote users. But they extend all network access, create performance bottlenecks, and frustrate users. ZTNA provides application-level access without the overhead and risk of full network connectivity.

Cloud and SaaS

Traditional perimeter security cannot protect cloud applications. They are outside the perimeter by definition. Zero Trust's identity-centric model secures cloud resources the same way it secures on-premises resources.

As discussed in SaaS Governance Strategies, managing access to SaaS applications requires robust identity controls. Zero Trust provides the architectural foundation for SaaS security.

API-First Architecture

Modern applications are collections of APIs. As I covered in API-First Enterprise Strategy, APIs need security too. Zero Trust principles - verify identity, check context, grant minimum access - apply equally to human users and service accounts accessing APIs.


Quick Reference: Implementation Checklist

Use this checklist to track your Zero Trust implementation:

Foundation:

  • Executive sponsor identified and engaged
  • Zero Trust working group formed
  • Current state assessment completed
  • Crown Jewels identified and documented
  • Phased implementation plan approved
  • Success metrics defined

Identity:

  • Identity provider deployed or upgraded
  • MFA enabled for all external access
  • Phishing-resistant MFA for privileged users
  • SSO implemented for priority applications
  • Conditional access policies configured
  • Automated provisioning/deprovisioning operational
  • Access review process established

Device:

  • Device inventory complete
  • MDM deployed for mobile devices
  • EDR deployed on all endpoints
  • Compliance baselines defined
  • Device health integrated with access decisions
  • BYOD policy and controls implemented

Access:

  • ZTNA selected and deployed
  • Crown Jewels applications migrated to ZTNA
  • VPN dependency reduced
  • PAM deployed for privileged accounts
  • JIT access configured for admin tasks
  • Network segmentation improved

Operations:

  • Monitoring and alerting operational
  • Incident response playbooks updated
  • User training completed
  • Operational documentation complete
  • Regular maturity assessments scheduled

The Reality Check

Let me be direct: Zero Trust implementation is hard. It takes years, not months. It requires sustained investment, executive commitment, and organisational change management.

But the alternative - relying on perimeter security in a perimeterless world - is worse. Every major breach you read about exploits the gap between traditional security models and modern IT reality.

Start small: Protect your Crown Jewels first. A Zero Trust proxy in front of your most critical application delivers immediate risk reduction.

Build incrementally: Each phase delivers value while building toward the complete architecture.

Accept imperfection: You will never achieve Zero Trust "perfection." The goal is continuous improvement in security posture.

Focus on architecture, not products: The vendors will come and go. The principles endure.


Conclusion

Zero Trust is the security architecture for 2026 and beyond. It acknowledges the reality that networks are untrusted, perimeters are dissolved, and identity is the new control plane.

Do not be seduced by vendor promises of instant Zero Trust. There is no shortcut. But with systematic implementation - identity foundation, device health, least privilege access - you can transform your security posture.

As I discussed in Identity is the New Firewall, identity is the foundation. Build on it. Verify everything. Trust nothing implicitly.

The architecture is clear. The journey is long. Start today.


Building Your Zero Trust Architecture

Transforming from traditional perimeter security to Zero Trust requires experienced guidance and systematic execution. My IT management services and IT compliance services help organisations assess their current maturity, develop phased implementation plans, and execute Zero Trust transformations that deliver measurable risk reduction.

Get in touch to discuss your Zero Trust journey.


Related reading: Identity is the New Firewall explores the identity foundation that Zero Trust requires. SaaS Governance Strategies addresses access control for cloud applications. API-First Enterprise Strategy covers API security in modern architectures.

Share this post

About the author

DG

Daniel J Glover

IT Leader with experience spanning IT management, compliance, development, automation, AI, and project management. I write about technology, leadership, and building better systems.

Continue exploring

Keep building context around this topic

Jump to closely related posts and topic hubs to deepen understanding and discover connected ideas faster.

Browse all articles

Let's Work Together

Need expert IT consulting? Let's discuss how I can help your organisation.

Get in Touch