Zero trust and third-party risk: reduce the blast radius
Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
[2024]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781394203147/?ar |
Zusammenfassung: | Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization--KC Enterprises--to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trust An essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk. |
Beschreibung: | Includes index. - Description based on online resource; title from PDF title page (ProQuest Ebook Central, viewed on October 09, 2023) |
Umfang: | 1 Online-Ressource (xx, 220 Seiten) |
ISBN: | 9781394203154 1394203152 1394203187 9781394203185 9781394203147 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-097093467 | ||
003 | DE-627-1 | ||
005 | 20240228122038.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231030s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781394203154 |c electronic book |9 978-1-394-20315-4 | ||
020 | |a 1394203152 |c electronic book |9 1-394-20315-2 | ||
020 | |a 1394203187 |c electronic book |9 1-394-20318-7 | ||
020 | |a 9781394203185 |c electronic bk. |9 978-1-394-20318-5 | ||
020 | |a 9781394203147 |9 978-1-394-20314-7 | ||
035 | |a (DE-627-1)097093467 | ||
035 | |a (DE-599)KEP097093467 | ||
035 | |a (ORHE)9781394203147 | ||
035 | |a (DE-627-1)097093467 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20231009 | |
100 | 1 | |a Rasner, Gregory C. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Zero trust and third-party risk |b reduce the blast radius |c Gregory C. Rasner |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2024] | |
264 | 4 | |c ©2024 | |
300 | |a 1 Online-Ressource (xx, 220 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Description based on online resource; title from PDF title page (ProQuest Ebook Central, viewed on October 09, 2023) | ||
520 | |a Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization--KC Enterprises--to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trust An essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Risk management | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
776 | 1 | |z 9781394203147 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781394203147 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781394203147/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-097093467 |
---|---|
_version_ | 1821494937491865600 |
adam_text | |
any_adam_object | |
author | Rasner, Gregory C. |
author_facet | Rasner, Gregory C. |
author_role | aut |
author_sort | Rasner, Gregory C. |
author_variant | g c r gc gcr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)097093467 (DE-599)KEP097093467 (ORHE)9781394203147 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03141cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-097093467</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122038.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231030s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394203154</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-394-20315-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394203152</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-394-20315-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394203187</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-394-20318-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394203185</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-394-20318-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394203147</subfield><subfield code="9">978-1-394-20314-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)097093467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP097093467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781394203147</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)097093467</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20231009</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rasner, Gregory C.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Zero trust and third-party risk</subfield><subfield code="b">reduce the blast radius</subfield><subfield code="c">Gregory C. Rasner</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 220 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Description based on online resource; title from PDF title page (ProQuest Ebook Central, viewed on October 09, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization--KC Enterprises--to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trust An essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781394203147</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781394203147</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781394203147/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-097093467 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:19Z |
institution | BVB |
isbn | 9781394203154 1394203152 1394203187 9781394203185 9781394203147 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xx, 220 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Wiley |
record_format | marc |
spelling | Rasner, Gregory C. VerfasserIn aut Zero trust and third-party risk reduce the blast radius Gregory C. Rasner Hoboken, New Jersey Wiley [2024] ©2024 1 Online-Ressource (xx, 220 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Description based on online resource; title from PDF title page (ProQuest Ebook Central, viewed on October 09, 2023) Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization--KC Enterprises--to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trust An essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk. Computer security Risk management Sécurité informatique Gestion du risque risk management 9781394203147 Erscheint auch als Druck-Ausgabe 9781394203147 |
spellingShingle | Rasner, Gregory C. Zero trust and third-party risk reduce the blast radius Computer security Risk management Sécurité informatique Gestion du risque risk management |
title | Zero trust and third-party risk reduce the blast radius |
title_auth | Zero trust and third-party risk reduce the blast radius |
title_exact_search | Zero trust and third-party risk reduce the blast radius |
title_full | Zero trust and third-party risk reduce the blast radius Gregory C. Rasner |
title_fullStr | Zero trust and third-party risk reduce the blast radius Gregory C. Rasner |
title_full_unstemmed | Zero trust and third-party risk reduce the blast radius Gregory C. Rasner |
title_short | Zero trust and third-party risk |
title_sort | zero trust and third party risk reduce the blast radius |
title_sub | reduce the blast radius |
topic | Computer security Risk management Sécurité informatique Gestion du risque risk management |
topic_facet | Computer security Risk management Sécurité informatique Gestion du risque risk management |
work_keys_str_mv | AT rasnergregoryc zerotrustandthirdpartyriskreducetheblastradius |