Cargando…

Zero trust and third-party risk : reduce the blast radius /

Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rasner, Gregory C. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : Wiley, [2024]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1395539206
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 230901s2024 nju o 001 0 eng d
040 |a YDX  |b eng  |e rda  |c YDX  |d OCLCO  |d YDX  |d ORMDA 
020 |a 9781394203154  |q electronic book 
020 |a 1394203152  |q electronic book 
020 |a 9781394203185  |q electronic book 
020 |a 1394203187  |q electronic book 
020 |z 1394203144 
020 |z 9781394203147 
035 |a (OCoLC)1395539206 
037 |a 9781394203147  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b R37 2024 
082 0 4 |a 005.8  |2 23/eng/20231009 
049 |a UAMI 
100 1 |a Rasner, Gregory C.,  |e author. 
245 1 0 |a Zero trust and third-party risk :  |b reduce the blast radius /  |c Gregory C. Rasner. 
264 1 |a Hoboken, New Jersey :  |b Wiley,  |c [2024] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization--KC Enterprises--to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trust An essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk. 
588 |a Description based on online resource; title from digital title page (viewed on October 09, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Risk management. 
776 0 8 |c Original  |z 1394203144  |z 9781394203147  |w (OCoLC)1378701274 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781394203147/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 20465015 
938 |a YBP Library Services  |b YANK  |n 305674393 
994 |a 92  |b IZTAP