Back to Search

Zero Trust and Third-Party Risk: Reduce the Blast Radius

AUTHOR Rasner, Gregory C.; Lenz, Mike; Lenz, Mike
PUBLISHER Ascent Audio (11/14/2023)
PRODUCT TYPE Audio (MP3 CD)

Description
Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization--KC Enterprises--to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: explanations of the processes, controls, and programs that make up the zero trust doctrine; descriptions of the five pillars of implementing zero trust with third-party vendors; and numerous examples, use-cases, and stories that highlight the real-world utility of zero trust.
Show More
Product Format
Product Details
ISBN-13: 9798212916585
Binding: CD-Audio (MP3 Format)
Content Language: English
More Product Details
Carton Quantity: 100
Feature Codes: Unabridged
Country of Origin: US
Subject Information
BISAC Categories
Computers | Security - Network Security
Computers | Insurance - Risk Assessment & Management
Computers | Economics - Theory
Descriptions, Reviews, Etc.
publisher marketing
Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization--KC Enterprises--to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: explanations of the processes, controls, and programs that make up the zero trust doctrine; descriptions of the five pillars of implementing zero trust with third-party vendors; and numerous examples, use-cases, and stories that highlight the real-world utility of zero trust.
Show More
List Price $45.95
Your Price  $45.49
Audio