Audiobook6 hours
Zero Trust and Third-Party Risk: Reduce the Blast Radius
Written by Gregory C. Rasner
Narrated by Mike Lenz
Rating: 0 out of 5 stars
()
About this audiobook
Dramatically lower the cyber risk posed by third-party software and vendors in your organization
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.
The author uses the story of a fictional organization-KC Enterprises-to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: explanations of the processes, controls, and programs that make up the zero trust doctrine; descriptions of the five pillars of implementing zero trust with third-party vendors; and numerous examples, use-cases, and stories that highlight the real-world utility of zero trust.
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.
The author uses the story of a fictional organization-KC Enterprises-to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: explanations of the processes, controls, and programs that make up the zero trust doctrine; descriptions of the five pillars of implementing zero trust with third-party vendors; and numerous examples, use-cases, and stories that highlight the real-world utility of zero trust.
Related to Zero Trust and Third-Party Risk
Related audiobooks
CISSP: Tips and Tricks to Learn and Study about Information Systems Security from A-Z Rating: 4 out of 5 stars4/5NIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Hackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsThe Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5CISSP: A Comprehensive Beginners Guide on the Information Systems Security Rating: 0 out of 5 stars0 ratingsThe New Normal in IT: How the Global Pandemic Changed Information Technology Forever Rating: 0 out of 5 stars0 ratingsThe Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5How to Measure Anything in Cybersecurity Risk, 2nd Edition Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsFacing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Hack Your Way to Security Bundle, 2 in 1 Bundle Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCISSP: 3 in 1- Beginner's Guide + Tips and Tricks + Simple and Effective Strategies to Learn About Information Systems Security Rating: 0 out of 5 stars0 ratingsThe Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Rating: 0 out of 5 stars0 ratingsObfuscation: A User's Guide for Privacy and Protest Rating: 4 out of 5 stars4/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5
Economics For You
Nudge: The Final Edition: Improving Decisions About Money, Health, And The Environment Rating: 4 out of 5 stars4/5Chip War: The Quest to Dominate the World's Most Critical Technology Rating: 5 out of 5 stars5/5Don't Trust Your Gut: Using Data to Get What You Really Want in Life Rating: 4 out of 5 stars4/5The Intelligent Investor Rating: 4 out of 5 stars4/5Economics 101: How the World Works Rating: 5 out of 5 stars5/5Marvel Comics: The Untold Story Rating: 4 out of 5 stars4/5The Hypomanic Edge: The Link Between (A Little) Craziness and (A Lot of) Success in America Rating: 4 out of 5 stars4/5Killing Sacred Cows: Overcoming the Financial Myths that are Destroying Your Prosperity Rating: 5 out of 5 stars5/5The Technology Trap: Capital, Labor, and Power in the Age of Automation Rating: 4 out of 5 stars4/5Bad Samaritans: The Myth of Free Trade and the Secret History of Capitalism Rating: 4 out of 5 stars4/5Freakonomics Rev Ed Rating: 4 out of 5 stars4/5Why the Rich Are Getting Richer Rating: 5 out of 5 stars5/5Men Without Work: America's Invisible Crisis Rating: 4 out of 5 stars4/5Poor Economics: A Radical Rethinking of the Way to Fight Global Poverty Rating: 4 out of 5 stars4/5Nomadland: Surviving America in the Twenty-First Century Rating: 4 out of 5 stars4/5The Ascent of Money: A Financial History of the World Rating: 4 out of 5 stars4/5How the World Works Rating: 4 out of 5 stars4/5Think Like a Freak: The Authors of Freakonomics Offer to Retrain Your Brain Rating: 4 out of 5 stars4/5Overdressed: The Shockingly High Cost of Cheap Fashion Rating: 4 out of 5 stars4/5Principles for Dealing with the Changing World Order: Why Nations Succeed or Fail Rating: 5 out of 5 stars5/5A History of the United States in Five Crashes: Stock Market Meltdowns That Defined a Nation Rating: 4 out of 5 stars4/5What We Owe Each Other: A New Social Contract for a Better Society Rating: 4 out of 5 stars4/5San Fransicko: Why Progressives Ruin Cities Rating: 4 out of 5 stars4/5The Genius of Israel: The Surprising Resilience of a Divided Nation in a Turbulent World Rating: 4 out of 5 stars4/5Nothing Is True and Everything Is Possible: The Surreal Heart of the New Russia Rating: 4 out of 5 stars4/5These are the Plunderers: How Private Equity Runs—and Wrecks—America Rating: 5 out of 5 stars5/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5The Myth of Capitalism: Monopolies and the Death of Competition Rating: 4 out of 5 stars4/5The Sovereign Individual: Mastering the Transition to the Information Age Rating: 5 out of 5 stars5/5
Reviews for Zero Trust and Third-Party Risk
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews