Why Adopting a Zero Trust Approach to Security is Table Stakes Today and How to Get Started