Catalogue

Record Details

Catalogue Search


Back To Results
Showing Item 10 of 1585

Zero trust overview and playbook introduction guidance for business, security, and technology leaders and practitioners  Cover Image E-book E-book

Zero trust overview and playbook introduction guidance for business, security, and technology leaders and practitioners

Simos, Mark (author.). Johnson, Ann, (writer of foreword.). Kumar, Nikhil, (author.).

Summary: Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry experts Key Features Get simple, clear, and practical advice for everyone from CEOs to security operations Organize your Zero Trust journey into role-by-role execution stages Integrate real-world implementation experience with global Zero Trust standards Purchase of the print or Kindle book includes a free eBook in the PDF format Book Description Zero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats. The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards. The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality. This first book in the series helps you understand what Zero Trust is, why it's important for you, and what success looks like. You'll learn about the driving forces behind Zero Trust - security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success. By the end of this book, you'll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust! What you will learn Find out what Zero Trust is and what it means to you Uncover how Zero Trust helps with ransomware, breaches, and other attacks Understand which business assets to secure first Use a standards-based approach for Zero Trust See how Zero Trust links business, security, risk, and technology Use the six-stage process to guide your Zero Trust journey Transform roles and secure operations with Zero Trust Discover how the playbook guides each role to success Who this book is for Whether you're a business leader, security practitioner, or technology executive, this comprehensive guide to Zero Trust has something for you. This book provides practical guidance for implementing and managing a Zero Trust strategy and its impact on every role (including yours!). This is the go-to guide for everyone including board members, CEOs, CIOs, CISOs, architects, engineers, IT admins, security analysts, program managers, product owners, developers, and managers. Don't miss out on this essential resource for securing your organization against cyber threats.

Record details

  • ISBN: 9781800568662
  • ISBN: 1800568665
  • ISBN: 1800561466
  • ISBN: 9781800561465
  • Physical Description: 1 online resource
    remote
    electronic resource
  • Publisher: Birmingham, UK : Packt Publishing Ltd., 2023.

Content descriptions

Formatted Contents Note: AI models reflect any biases in their data -- How can Zero Trust help manage AI security risk? -- Zero Trust -- the top four priorities for managing AI risk -- How will AI impact Zero Trust? -- Summary -- Chapter 6: How to Scope, Size, and Start Zero Trust -- Agile security -- think big, start small, move fast -- What is agile security? -- Applying agility in practice -- Focus on progress instead of perfection -- Always ruthlessly prioritize -- Myths and misconceptions that block security agility -- Pursuing perfect security is a delusion -- Pursuing perfect solutions is a perfect waste
Subject: Computer security
Sécurité informatique
Genre: Electronic books.

Back To Results
Showing Item 10 of 1585

Additional Resources