Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Zero Trust Overview and Playbook Introduction
  • Table Of Contents Toc
  • Feedback & Rating feedback
Zero Trust Overview and Playbook Introduction

Zero Trust Overview and Playbook Introduction

By : Mark Simos, Nikhil Kumar
4.8 (12)
close
close
Zero Trust Overview and Playbook Introduction

Zero Trust Overview and Playbook Introduction

4.8 (12)
By: Mark Simos, Nikhil Kumar

Overview of this book

Zero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats. The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards. The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality. This first book in the series helps you understand what Zero Trust is, why it’s important for you, and what success looks like. You’ll learn about the driving forces behind Zero Trust – security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success. By the end of this book, you’ll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!
Table of Contents (13 chapters)
close
close
Lock Free Chapter
2
Chapter 2: Reading the Zero Trust Playbook Series

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

access control 40

Acme Bank example 128

cultural elements 200

key roles 199

Zero Trust security priorities 200-204

Acme Energy

components 111

Agile delivery

and playbooks 160, 161

agile roadmap 130

in Zero Trust 131

long term 130

medium term 130

planning, example 131

short term 130

Zero Trust strategy, building 132-134

agile security 75, 76

agility

applying 76

principles 76

AI shared responsibility model 72

analysis paralysis

avoiding 162

antifragility 78

APIs 41

applications and systems 43, 44

architect alignment 186

artificial general intelligence (AGI) 67

artificial intelligence (AI) 20, 43, 61, 98, 194

impact 63-66

impact, on Zero Trust 73, 74

limitations 67-69

asset-centric and data-centric...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Zero Trust Overview and Playbook Introduction
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon