Book description
Implement Zero Trust initiatives efficiently and effectively
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director.
Readers will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find:
- Concrete strategies for aligning your security practices with the business
- Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment
- Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices
Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.
Table of contents
- Cover
- Title Page
- About the Author
- Acknowledgments
- Foreword
- Introduction
- Chapter 1: The Case for Zero Trust
- Chapter 2: Zero Trust Is a Strategy
- Chapter 3: Trust Is a Vulnerability
- Chapter 4: The Crown Jewels
- Chapter 5: The Identity Cornerstone
- Chapter 6: Zero Trust DevOps
- Chapter 7: Zero Trust SOC
- Chapter 8: Cloudy with a Chance of Trust
- Chapter 9: A Sustainable Culture
- Chapter 10: The Tabletop Exercise
- Chapter 11: Every Step Matters
- Appendix A: Zero Trust Design Principles and Methodology
- Appendix B: Zero Trust Maturity Model
- Appendix C: Sample Zero Trust Master Scenario Events List
- Appendix D: For Further Reading
- Glossary
- Index
- Copyright
- Dedication
- End User License Agreement
Product information
- Title: Project Zero Trust
- Author(s):
- Release date: October 2022
- Publisher(s): Wiley
- ISBN: 9781119884842
You might also like
book
Zero Trust Networks
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind …
book
Zero Trust Security: An Enterprise Guide
Understand how Zero Trust security can and should integrate into your organization. This book covers the …
video
The Zero Trust Framework
5+ Hours of Video Instruction Gives you a vendor-agnostic approach to secure access and resource protection. …
book
Zero Trust Overview and Playbook Introduction
Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria …