Information security policy development, cyber resiliency, and frameworks such as Zero Trust Architecture can be considered complex when evaluated in isolation. However, cybersecurity practitioners must be able to ground cybersecurity programs with solid architecture recommendations, policy, and tactics to ensure business resiliency.
Write at least two paragraphs identifying at least two challenges that a new practitioner may face while trying to incorporate these three concepts into a cybersecurity program.