Screen Reader Mode Icon Check SCREEN READER MODE to make this survey compatible with screen readers. Question Title * 1. My top priorities for Zero Trust are: (select up to 3) Ensure identity-based access policies (IAM) apply to everything Identity- and App-based access policies to replace network-centric policies Optimize granular network (micro) segmentation policies Map out network flows Centralized identity management Other OK Question Title * 2. Eliminating standing privileges will significantly reduce an attacker’s ability to move laterally Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree OK Question Title * 3. My biggest concern after an initial compromise is that a hacker Installs new software (hacker tools) Moves laterally Stays connected Moves beyond my internal segmentation Escalates their privileges OK Question Title * 4. Do you have processes in place to revoke access for users and workloads? Yes No OK Question Title * 5. Human-to-machine (H2M) and machine-to-machine (M2M) communications should be coordinated within a unified solution Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree OK Question Title * 6. My organization has a hybrid cloud security strategy in place: Strongly agree Agree Somewhat agree Neither agree nor disagree Somewhat disagree Disagree Strongly disagree OK DONE