Details

Project Zero Trust


Project Zero Trust

A Story about a Strategy for Aligning Security and the Business
1. Aufl.

von: George Finney, John Kindervag

18,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 09.08.2022
ISBN/EAN: 9781119884866
Sprache: englisch
Anzahl Seiten: 224

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Implement Zero Trust initiatives efficiently and effectively</b></p> <p>In <i>Project Zero Trust: A Story About a Strategy for Aligning Security and the Business</i>, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director.</p> <p>Readers will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find:</p> <ul> <li>Concrete strategies for aligning your security practices with the business</li> <li>Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment</li> <li>Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices</li> </ul> <p><i>Project Zero Trust</i> is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.</p>
<p>About the Author xi</p> <p>Acknowledgments xiii</p> <p>Foreword xv</p> <p>Introduction xxi</p> <p>Chapter 1: The Case for Zero Trust 1</p> <p>Key Takeaways 10</p> <p>Chapter 2: Zero Trust Is a Strategy 13</p> <p>Key Takeaways 26</p> <p>The Four Zero Trust Design Principles 27</p> <p>The Five-Step</p> <p>Zero Trust Design Methodology 27</p> <p>The Zero Trust Implementation Curve 27</p> <p>Chapter 3: Trust Is a Vulnerability 29</p> <p>Key Takeaways 39</p> <p>Chapter 4: The Crown Jewels 43</p> <p>Key Takeaways 54</p> <p>Chapter 5: The Identity Cornerstone 57</p> <p>Key Takeaways 71</p> <p>Chapter 6: Zero Trust DevOps 73</p> <p>Key Takeaways 83</p> <p>Chapter 7: Zero Trust SOC 87</p> <p>Key Takeaways 100</p> <p>Chapter 8: Cloudy with a Chance of Trust 103</p> <p>Key Takeaways 113</p> <p>Chapter 9: A Sustainable Culture 117</p> <p>Key Takeaways 129</p> <p>Chapter 10: The Tabletop Exercise 133</p> <p>Key Takeaways 147</p> <p>Chapter 11: Every Step Matters 151</p> <p>Key Takeaways 159</p> <p><b>Appendix A: </b><b>Zero Trust Design Principles and Methodology 165</b></p> <p>The Four Zero Trust Design Principles 165</p> <p>The Five-Step Zero Trust Design Methodology 166</p> <p><b>Appendix B: </b><b>Zero Trust Maturity Model 167</b></p> <p><b>Appendix C: </b><b>Sample Zero Trust Master Scenario Events List 171</b></p> <p><b>Appendix D: </b><b>For Further Reading 179</b></p> <p>Standards, Frameworks, and Other Resources 179</p> <p>Case Studies 180</p> <p>Google BeyondCorp Papers 180</p> <p>Books 181</p> <p>Hardening Guides 181</p> <p>Glossary 183</p> <p>Index 191</p>
<p><b>GEORGE FINNEY</b> is the Chief Security Officer at Southern Methodist University. He has taught Cybersecurity at SMU and been recognized as one of the top 100 Chief Information Security Officers in the world by CISOs Connect. He has over 20 years’ experience in the industry with startups, global telecommunication firms, and nonprofits.
<p><b>Why your organization needs Zero Trust and how to implement it</b> <p>In <i>Project Zero Trust: A Story about a Strategy for Aligning Security and the Business</i>, renowned CISO George Finney delivers a hands-on and step-by-step guide to implementing an effective and practical Zero Trust security strategy at your organization. The book is written as an engaging narrative that follows the story of Dylan, a new IT Director at a company that experiences a ransomware attack on his first day. <p>You’ll learn John Kindervags’ 5-step methodology for implementing Zero Trust, the four key Zero Trust design principles, and discover how to align this framework with your company’s operational and commercial requirements. <p>The author explains how to prevent data breaches and how to minimize the impact of a breach should one occur. He focuses on a strategy of prevention and addresses widespread myths and common pitfalls encountered by technology professionals when implementing Zero Trust. <i>Project Zero Trust</i> also explains how to implement its methodologies and strategies in a distributed cloud environment. <p>An essential read for aspiring and practicing technology professionals, <i>Project Zero Trust</i> will earn a place on the bookshelves of IT leaders, network engineers, sysadmins, and project managers.

Diese Produkte könnten Sie auch interessieren:

Intelligent Systems for Rehabilitation Engineering
Intelligent Systems for Rehabilitation Engineering
von: Roshani Raut, Pranav Pathak, Sandeep Kautish, Pradeep N.
PDF ebook
190,99 €
Decision Intelligence For Dummies
Decision Intelligence For Dummies
von: Pam Baker
EPUB ebook
22,99 €
Intelligent Systems for Rehabilitation Engineering
Intelligent Systems for Rehabilitation Engineering
von: Roshani Raut, Pranav Pathak, Sandeep Kautish, Pradeep N.
EPUB ebook
190,99 €