Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Zero Trust Overview and Playbook Introduction
  • Table Of Contents Toc
  • Feedback & Rating feedback
Zero Trust Overview and Playbook Introduction

Zero Trust Overview and Playbook Introduction

By : Mark Simos, Nikhil Kumar
4.8 (13)
close
close
Zero Trust Overview and Playbook Introduction

Zero Trust Overview and Playbook Introduction

4.8 (13)
By: Mark Simos, Nikhil Kumar

Overview of this book

Zero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats. The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards. The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality. This first book in the series helps you understand what Zero Trust is, why it’s important for you, and what success looks like. You’ll learn about the driving forces behind Zero Trust – security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success. By the end of this book, you’ll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!
Table of Contents (13 chapters)
close
close
Free Chapter
2
Chapter 2: Reading the Zero Trust Playbook Series

Who this book is for

This first book serves as both a standalone overview of Zero Trust for anyone and an introduction to the playbooks in Zero Trust Overview and Playbook Introduction. with a part to play in Zero Trust to understand what Zero Trust is, why it’s important to you, and what success looks like.

This table provides a list of roles that will benefit from this book:

Role Type

Roles

Organizational senior leaders

Member of board of directors

Chief Executive Officer (CEO)

Chief Financial Officer (CFO)

Chief Operating Officer (COO)

Chief Legal Officer (CLO)

Chief Privacy Officer (CPO)

Chief Risk Officer (CRO)

Chief Compliance Officer (CCO)

Product and business line leaders

Communications/public relations director

Adjacent/ancillary roles

Human resources

Business analysts

Internal readiness/training

Internal and external communications

Risk and compliance roles

Risk team

Compliance and audit team

Technology senior leaders

Chief Digital Officer (CDO)

Chief Information Officer (CIO)

Chief Technology Officer (CTO)

Chief Information Security Officer (CISO)

Enterprise security integration (deputy CISOs and staff, security [business] analysts)

Technology directors

Software delivery Vice President (VP)

Security directors

Architects

Enterprise architects

Security architects

Infrastructure architects

Business architects

Information architects

Access architects

Solution architects

Software/application architects

Managers

Technology managers

Security managers

Security Operations (SecOps) managers

Product line managers/directors

Product owners

Software development directors

Technology delivery managers

Software testing/quality managers

Security posture management

Security posture management

Security governance and compliance management

People security (user education and insider risk)

Technical engineering and operations

Cloud engineering and operations

Endpoint/productivity

Identity

Infrastructure

CI/CD infrastructure

Network

Data security

Operational Technology (OT) security

Security posture engineering and operations

Application and product security

Software security engineers

Software developers

Software testers

Supply chain security

Internet of Things (IoT) security

Security operations

Triage analysts

Investigation analysts

Threat hunting

Detection engineering

Attack simulation (red and purple teaming)

Incident management

Threat intelligence

Figure Preface.1 - Illustrative list of roles that enable Zero Trust

The book is written for people who are currently in these roles (and similar roles) as well as those who aspire to work in these roles, work with people in the roles, and provide consulting and advice to these roles.

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY