Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
OK
Zero Trust Overview and Playbook Introduction: Guidance for business, security, and technology leaders and practitioners
Purchase options and add-ons
Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry experts
Key Features- Get simple, clear, and practical advice for everyone from CEOs to security operations
- Organize your Zero Trust journey into role-by-role execution stages
- Integrate real-world implementation experience with global Zero Trust standards
- Purchase of the print or Kindle book includes a free eBook in the PDF format
Zero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats.
The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards.
The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality.
This first book in the series helps you understand what Zero Trust is, why it's important for you, and what success looks like. You'll learn about the driving forces behind Zero Trust - security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success.
By the end of this book, you'll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!
What you will learn- Find out what Zero Trust is and what it means to you
- Uncover how Zero Trust helps with ransomware, breaches, and other attacks
- Understand which business assets to secure first
- Use a standards-based approach for Zero Trust
- See how Zero Trust links business, security, risk, and technology
- Use the six-stage process to guide your Zero Trust journey
- Transform roles and secure operations with Zero Trust
- Discover how the playbook guides each role to success
Whether you're a business leader, security practitioner, or technology executive, this comprehensive guide to Zero Trust has something for you. This book provides practical guidance for implementing and managing a Zero Trust strategy and its impact on every role (including yours!). This is the go-to guide for everyone including board members, CEOs, CIOs, CISOs, architects, engineers, IT admins, security analysts, program managers, product owners, developers, and managers. Don't miss out on this essential resource for securing your organization against cyber threats.
Table of Contents- Zero Trust - This Is the Way
- Reading the Zero Trust Playbook Series
- Zero Trust is Security for Today's World
- Standard Zero Trust Capabilities
- Artificial Intelligence (AI) and Zero Trust
- How to Scope, Size, and Start Zero Trust
- What Zero Trust Success Looks Like
- Adoption with the Three-Pillar Model
- The Zero Trust Six-Stage Plan
- Zero Trust Playbook Roles
- ISBN-101800568665
- ISBN-13978-1800568662
- PublisherPackt Publishing
- Publication dateOctober 30, 2023
- LanguageEnglish
- Dimensions9.25 x 7.52 x 0.5 inches
- Print length240 pages
Similar items that may deliver to you quickly
Editorial Reviews
Review
“What is lost in the race for a better solution to the growing cyber threats is a unified definition and set of capabilities for the successful implementation of Zero Trust in an organization’s environment. Through their series of books, the authors of The Zero Trust Playbook Series, Nikhil Kumar and Mark Simos, attempt to answer questions surrounding Zero Trust – including the core defining capabilities and characteristics and how to successfully implement a Zero Trust architecture.
Nikhil and Mark both have extensive professional experience on the front lines of cyber defense, advising global organizations on architecture and best practices. As they delve into the topic of Zero Trust, they not only define the topic but also provide answers to the why, as well as detailed guidance on the how.
There has never been a greater need for a change in the cybersecurity defense methodology, and Zero Trust will bring the industry a long way toward maturity. Grounding this topic in pragmatic guidance while also clarifying why the purpose is a worthy task, I commend Nikhil and Mark for embarking on this journey”
--Ann Johnson, Corporate Vice President – Microsoft
“Zero Trust Introduction and Playbook Overview" is an indispensable guide for cybersecurity and tech professionals navigating Zero Trust implementation complexities. It offers clear, practical insights and a structured playbook series tailored to diverse organizational roles. With rich content covering scoping, AI integration, and success factors, the book's role-based approach targets business leaders, tech experts, managers, and practitioners. The three-pillar model and six-stage plan ensure a holistic understanding, while real-world examples, including Acme case studies, provide practical application insights. Precision in language and well-organized chapters make it accessible to a broad audience. Emphasizing organizational accountability and culture for business leaders and technology strategy integration for tech leaders, the book provides a synchronized roadmap for diverse roles. While occasional repetition could be streamlined for conciseness, the book's thoroughness compensates, making it a vital reference for navigating the cybersecurity landscape, facilitating a seamless transition from theory to implementation.”
Fabrizio Di Carlo - Group Manager @ Avanade | Architecture, Cloud and Security | Board Advisor | Zero Trust | Current research topic: Web3 Security
About the Author
Mark Simos helps individuals and organizations meet cybersecurity, cloud, and digital transformation goals. Mark is the Lead Cybersecurity Architect for Microsoft where he leads the development of cybersecurity reference architectures, strategies, prescriptive planning roadmaps, best practices, and other security and Zero Trust guidance. Mark also co-chairs the Zero Trust working group at The Open Group and contributes to open standards and other publications like the Zero Trust Commandments. Mark has presented at numerous conferences including Black Hat, RSA Conference, Gartner Security and Risk Management, Microsoft Ignite and BlueHat, and Financial Executives International.
Nikhil is Founder at ApTSi with prior leadership roles at Price Waterhouse and other firms. He has led setup and implementation of Digital Transformation and enterprise security initiatives (such as PCI Compliance) and built out Security Architectures. An Engineer and Computer Scientist with a passion for biology, Nikhil is an expert in Security, Information, and Computer Architecture. Known for communicating to the board and implementing with engineers and architects, he is an MIT mentor, innovator and pioneer. Nikhil has authored numerous books, standards, and articles, and presented at conferences globally. He co-chairs The Zero Trust Working Group, a global standards initiative led by The Open Group.
Product details
- Publisher : Packt Publishing (October 30, 2023)
- Language : English
- Paperback : 240 pages
- ISBN-10 : 1800568665
- ISBN-13 : 978-1800568662
- Item Weight : 15.1 ounces
- Dimensions : 9.25 x 7.52 x 0.5 inches
- Best Sellers Rank: #157,623 in Books (See Top 100 in Books)
- #18 in Computer Networking (Books)
- #114 in Computer Network Security
- #3,606 in Unknown
- Customer Reviews:
About the author
Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
I found the book to be very generic and more about cybersecurity change and project management.
Apparently a series of books are planned so maybe future books will get into more specifics.
Then breaking it out by role is just genius. There may be other tech books written this way but this is the first I have seen laid out like this and it should make sense to you whether you are just starting in the cybersecurity world or if you are a veteran that has been around for a while. You can focus singularly on the role that you do every day or you can see what is required from other roles and help champion those methodologies throughout the company.
Well done guys!
Some attributes about the book that have been invaluable for me:
- It appeals to multiple audiences across the organization - and is comprehensive across roles
- It focuses strongly on simplifying the complexity of ZT and overall security
- The playbook format is particularly useful in making ZT real, and in implementing a complicated process
- The visual diagrams are particularly useful for people that learn in pictures - or who want to see an illustration to enhance their understanding
In short, if you only buy one ZT book -- this is the one. It's that good.