Zscaler ZTE best-practices

A lot of organizations are looking to adopt a zero-trust network architecture but oftentimes, do not know where to begin. I am interested in hearing from our Zenith users on some of their best practices for walking through a network transformation. What POC’s do you set up, and what resources and information are valuable? I am hoping to curate a list of topics from the community to start building out a community lead KB on walking through this journey.