No Trust Podcast – From Special Ops to Cybersecurity: A New Perspective
In this latest episode of the No Trust Podcast, John Spiegel and Jaye Tillson sit down again with Chase Cunningham—better known as Dr. Zero Trust—to explore how lessons from special operations, military intelligence, and situational awareness directly shape the way we should think about modern cybersecurity. Why Listen This episode with Dr. Zero Trust is a masterclass in blending military discipline with corporate cybersecurity realities. From situational awareness to leadership under fire, Cunningham offers both humor and hard-earned truths that every security leader should hear.
PODCAST
John Spiegel
9/1/20256 min read


From the Battlefield to the Boardroom
Cunningham, a retired Navy cryptologic chief, set the stage by clarifying what “special operations” really means. While most people picture Rangers or SEALs, his work was in signals intelligence and cryptologic support—helping find the bad guys so front-line operators could do their job. That background, he explained, built a mindset of situational awareness, adaptability, and resilience that carries directly into cyber defense.
“The value of situational awareness and deterrence is huge. I tell my kids it’s okay to put off a vibe of ‘don’t mess with me.’ I’d rather people think twice than catch me off guard.” — Dr. Zero Trust
Stress, Planning, and the Uncomfortable Truth
The conversation drew sharp parallels between military training and corporate cybersecurity:
No plan survives first contact. Like in combat, an organization’s response plan rarely plays out as written once a ransomware attack hits.
Get comfortable being uncomfortable. Cunningham pointed to SEAL training as an example of preparing for chaos. Companies need to simulate that stress in red-team scenarios rather than checking a compliance box.
Leadership under fire matters. Too often, corporate leaders freeze or squabble during a crisis. “You need a single throat to choke,” Cunningham argued. “If you don’t know who’s in charge, chaos takes over.”
The Human Side of Zero Trust
Beyond technology, the episode dove into people and teams:
Houseplants vs. growers. Some employees are content doing one thing well—like a houseplant in the sun. Others crave growth and learning. Both can play a role, but leaders must know the difference.
Trust and rotation. Cunningham recalled moving every 3–4 years in the Navy, constantly adapting to new teams. The key, he said, is a shared mission and clarity of roles—something many corporate orgs still lack.
After-action reviews. In the military, daily debriefs are standard. In cyber, Cunningham says they’re rare but essential: “Everyone should know what worked, what didn’t, and how we’ll do better next time.”
A Ransomware Walkthrough
In one of the episode’s highlights, John pressed Cunningham to walk through a fictional ransomware crisis. His response echoed a field mission plan:
Identify command. Who’s in charge?
Isolate and contain. Even if it means “cutting cables with an axe.”
Keep the business running. Decide what can stay operational.
Recover and learn. Share the full story with the entire organization.
“You’re going to triage anyway. Better to be decisive, isolate the infection, and move forward than to chase endpoints while the enemy advances.” — Dr. Zero Trust
A Lighter Side: Tacos, Golf, and StratCon Dreams
Of course, no No Trust episode ends without a few fun detours. The group laughed about John missing dinner together at China Poblano in Vegas after Black Hat 2025, swapped golf stories (St. Andrews, Pinehurst, and the bucket-list dream of Pebble Beach), and even floated the idea of hosting a StratCon security conference at Pebble—if only a sponsor steps up.
Why Listen
This episode with Dr. Zero Trust is a masterclass in blending military discipline with corporate cybersecurity realities. From situational awareness to leadership under fire, Cunningham offers both humor and hard-earned truths that every security leader should hear.
👉 Listen to the full episode on the No Trust Podcast
Full Transcript (Edited for Clarity)
Jaye
Welcome back to another episode of No Trust. Today we’re joined by a good friend of the show, Chase Cunningham—better known as Dr. Zero Trust. We’ve talked Zero Trust with him before, but this time we’re diving into his military background in special operations and how that mindset translates to cybersecurity.
Dr. Zero Trust
Thanks for having me. I’m Chase Cunningham, retired Navy cryptologic chief. I was a cryptologic collections operator, which basically means we gathered signals and intelligence, packaged it, and passed it along for targeting. I wasn’t a SEAL or Delta operator—people sometimes assume that—but special operations includes a wide range of roles. My work was in the intel and cryptologic side, supporting those frontline teams.
Jaye
So, you were finding the bad guys.
Dr. Zero Trust
Exactly. We collected from classified and unclassified sources—social media, news, technical signals—and put that together for missions. The interesting part is we weren’t tied to one service. Even though I was Navy, I supported Army, Air Force, Coast Guard. We were kind of the “redheaded stepchildren” of the military—nobody claimed us, but we were always at the table.
John
Before we dive into cyber, I have to call you out. You two went to my favorite Vegas restaurant, China Poblano, without me.
Jaye
For the record, it wasn’t planned! Chase was already there. I just showed up.
Dr. Zero Trust
(Laughs) True story.
Situational Awareness
Jaye
Let’s talk mindset. Does that training stick with you day-to-day?
Dr. Zero Trust
Absolutely. Situational awareness is constant. For example, walking to Black Hat, I kept my head up, hands out of my pockets, sunglasses on, and pace deliberate. That way, even when someone acting erratic came at me, he ignored me and targeted someone less aware. Deterrence matters.
John
How does that apply to cyber?
Dr. Zero Trust
In engagements, I push for red-team ops. Day one, I’ll drop a ransomware scenario on the table and watch how they respond. Stress reveals weaknesses. Plans fall apart fast, and it’s important to practice that chaos before it happens for real.
Planning, Pressure, and Leadership
Jaye
But you can’t prepare for every scenario. How do you train people for the unknown?
Dr. Zero Trust
It’s about mindset and muscle memory. Like SEALs say: get comfortable being uncomfortable. Train for stress so your response becomes second nature. When the helicopter crashed during the Bin Laden raid, they executed without panic. In cyber, it’s the same: things will go wrong. You need leaders who don’t fold.
John
Have you seen overplanning hurt organizations?
Dr. Zero Trust
Yes. Too many cooks in the kitchen. The key question: who’s in charge? If that’s unclear, chaos follows. And sometimes it’s not the C-suite. Junior staff often step up better than executives under stress. Leaders should accept that and let capable people lead.
Teams and Trust
Jaye
In corporate life, turnover is high. How do you build trust in teams that haven’t worked together long?
Dr. Zero Trust
In the military, we rotated every 3–4 years. New teams, new units. What kept us aligned was mission clarity. In corporate, too many orgs lack a clear mission. Without that, alignment is tough. Also, in the military, if someone was incompetent, you could remove them. That accountability doesn’t exist as cleanly in corporate life.
John
So, for a security leader, what’s the takeaway?
Dr. Zero Trust
Three things:
Make sure your “alphabet soup” staff can actually do the job.
Align everyone on the mission of the organization.
Empower decision-making during crises. No debates when the house is on fire.
People and Growth
Jaye
What about hiring? CISOs often haven’t done every job under them.
Dr. Zero Trust
That’s fine—but today, with tools like ChatGPT, there’s no excuse not to at least understand the basics. Leaders who refuse to learn beyond their silo are a risk. I call it the houseplant theory: some people are happy just converting CO₂ to oxygen in their sunny spot. That’s fine, but you invest in the people hungry to grow.
Jaye
But sometimes you do need both. Diversity of drive and temperament can balance a team.
John
True—though you don’t want a houseplant in your incident response war room.
After-Action Reviews
Jaye
The military does hot washes and debriefs. Should we be doing more of that in cyber?
Dr. Zero Trust
Yes—regular cadence, not just post-mortems after big incidents. In my last SOC, we did two debriefs daily. Everyone shared what they saw, so no surprises hit from left field. In cyber, we should be excellent at this. Too often, we aren’t.
John
But what about blame culture?
Dr. Zero Trust
Leaders need to take accountability. “The buck stops here.” If staff fear punishment, they’ll hide information. Leaders must shield them, own the fallout, and drive learning.
Crisis Walkthrough
John
Walk us through a ransomware attack—special ops style.
Dr. Zero Trust
Step one: appoint a commander. Step two: isolate the infection—pull cables, shut systems down, whatever it takes. Step three: decide what stays online to keep the business running. Step four: recover, learn, and share the full story with the entire organization.
Jaye
But companies hate disruption.
Dr. Zero Trust
Disruption will happen anyway. Better to triage decisively than chase the problem while it spreads.
Closing and Fun Questions
Jaye
One lesson from the military that applies directly to cyber?
Dr. Zero Trust
Two is one, one is none. Always plan for failure, build redundancy, and assume things will go wrong.
John
On the lighter side—what’s your favorite dish at China Poblano?
Dr. Zero Trust
The birria tacos. Done right, they’re unbeatable.
Jaye
Best golf course you’ve played? And your bucket-list course?
Dr. Zero Trust
St. Andrews for the experience. Pebble Beach is still on the list.
John
We’ll make StratCon at Pebble happen someday… with the right sponsor.
Dr. Zero Trust
(Laughs) If anyone wants to sponsor us, let’s talk. And if you’re listening, please consider donating to a veterans charity—I’ll connect you directly.
Link here - Vets
End of Transcript