Editorial

How to be a trusted advisor in a Zero Trust environment

Brian Chappell, head of product at One Identity, reflects on the human impact of recent cyberattacks on the public sector and the fears expressed by IT leaders in Think Digital Partners about their ability to prevent future attacks. He observes that during thirty years of advising organisations on ways to improve their cybersecurity posture, the initial methods of attack have remained consistent. He argues that this provides public sector leaders and advisors with a powerful tool to defend their systems and get the cybersecurity fundamentals right.

Posted 16 July 2025 by Christine Horton


In the firing line

The devastating cyberattack on pathology services provider, Synnovis last June, which forced London hospitals to cancel operations, has just been blamed for a patient’s death. This tragic outcome reminds us that we have a collective responsibility to safeguard national IT assets.

Yet Think Digital recently reported that 60 percent of public sector IT leaders believe that it is “only a matter of time” before their systems are breached, with phishing and ransomware posing the biggest risks. Almost half reported that their resource is spent on reacting to new threats, rather than proactively reducing risk.

AI versus humanity

Understandably, a lot of focus is given to the evolving threats posed by AI-generated attacks. However, the mechanics of cyberattacks have been largely consistent for the past three decades.

In 1995 we were challenged by buffer overruns and social engineering.

In 2025, hackers and AI agents are looking for new buffer overruns, among other technical vulnerabilities, to exploit. Meanwhile, AI-driven deepfakes, and automated phishing attacks are pushing the same emotional buttons that they always have: trust, empathy, complacency, urgency, stress, fear.

AI-powered attacks sound exceptionally daunting, yet AI-powered defence technologies are also allowing cybersecurity professionals in the public sector to tune out the noise and focus on anomalous activity and alerts that indicate a breach. This works most effectively when underpinned by a robust cybersecurity foundation, where everyone in the organisation understands their responsibility and ability to safeguard systems and data.

Targeting trust

Although the technology used to steal and encrypt data may have evolved, hackers still rely on exploiting trust to gain access to pivotal identities. That provides us with a powerful tool to defend our public sector systems: public awareness.

If we can remove the stigma of a breach and focus on information sharing, we can collectively improve the security posture of the public sector.

Companies used to be too afraid to admit that they had been breached. Cyber criminals played on that fear to extort organisations. Their silence only made it more likely that other organisations would fall prey to the same well-worn tactics.

Removing stigma, without lowering our guard

While victim-shaming should be avoided, neither can we afford to become apathetic.

Because humans are prone to be too trusting, and because bad actors so often gain access to systems and data by exploiting emotions including empathy, apathy, stress, or fear, many organisations have adopted a Zero Trust cybersecurity strategy.

Zero Trust operates on the basis of continually re-verifying access requests and only granting access if requests adhere to clearly defined policies. In addition, a Zero Trust environment will have monitoring in place to continuously check for anomalous behaviour.

Raising awareness

The major lesson is that criminal tactics haven’t changed all that much over the past three decades.  Hackers still rely on persuading humans to lower their guard and open a door, make an exception, flout a policy, reveal a secret, change a password.

What has changed since 1995 is the general public’s awareness of cybercrime and its real-world impacts. Cancelled operations and patient harm have a tangible effect on our lives. That provides an opportunity to take a grassroots approach to educating people about the most common hacking tactics, so that the routes of least resistance become harder for criminals to navigate.

Tackling complacency

One of the most persistent beliefs is that an organisation can be too small to be of interest to hackers or that every avenue for attack has been addressed. A series of high-profile attacks have demonstrated the error of this belief.

Starting from microbusinesses supplying services to the public sector, all the way up to the largest public sector organisations such as the NHS, cybersecurity education is key.

We know we can’t do this alone, that’s why we rely on working in partnership with consultancies, resellers, MSPs and system integrators.

Our channel partners underpin everything we do and can play a vital role in educating the public sector and general public on getting the cybersecurity fundamentals right. One of those fundamentals is to apply the NIST principle of least privilege (PoLP). This central pillar of identity security ensures that people, or APIs, bots, or Oauth tokens, are only provided with access to the applications and systems that they need to perform a particular task. PoLP is a foundation of Zero Trust.

Communication is key

It’s not just about spreading the word, but using the right words to persuade people to change their behaviour, so that public sector organisations can improve their security posture. Talking less about cybersecurity and more about business continuity and patient outcomes is more likely to strike the right chord with department heads, budget holders, and colleagues.

While it’s understandable that public sector IT leaders have an eye on the future and are preparing strategies to defend against AI-powered attacks, let’s not forget the power of human communication to get the cybersecurity fundamentals right.

Event Logo

If you are interested in this article, why not register to attend our Think Digital Identity and Cybersecurity for Government conference, where digital leaders tackle the most pressing issues facing government today.


Register Now