الاستماع والقراءة

خطوة إلى عالم لا حدود له من القصص

  • اقرأ واستمع إلى ما تريده
  • أكثر من مليون عنوان
  • العناوين الحصرية + أصول القصة
  • 7 الشهر يورو في EGP89 يوم تجربة مجانية، ثم
  • من السهل الإلغاء في أي وقت
جرب مجانا
Details page - Device banner - 894x1036

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

1 التقييمات

5

المدة
7H 51دقيقة
اللغة
اللغة الإنجليزية
Format
الفئة

كتب واقعية

Implement Zero Trust initiatives efficiently and effectively

In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director.

Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find:

● Concrete strategies for aligning your security practices with the business

● Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment

● Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices

Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.

© 2022 Ascent Audio (دفتر الصوت ): 9781663725165

تاريخ الإصدار

دفتر الصوت : ٤ أكتوبر ٢٠٢٢

الوسوم

    واستمتع آخرون أيضًا...

    1. If It's Smart, It's Vulnerable Mikko Hypponen
    2. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    3. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    4. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    5. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
    6. Cloud Security For Dummies Ted Coombs
    7. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    8. Cybersecurity For Dummies Joseph Steinberg
    9. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    10. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    11. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    12. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    13. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    14. The Art of Deception: Controlling the Human Element of Security William L. Simon
    15. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    16. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    17. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    18. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    19. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    20. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    21. Cybersecutity First Principles Rick Howard
    22. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    23. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    24. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    25. Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove
    26. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    27. Cybercrime Investigators Handbook Graeme Edwards
    28. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    29. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    30. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    31. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    32. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    33. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
    34. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    35. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
    36. Zero Trust Networks: Building Secure Systems in Untrusted Networks (2nd Edition) Christina Morillo
    37. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    38. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
    39. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    40. Ransomware Protection Playbook Roger A. Grimes
    41. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
    42. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    43. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    44. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    45. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard

    ما مميزات اشتراك Storytel؟

    • أكثر من 200000 عنوان

    • وضع الأطفال (بيئة آمنة للأطفال)

    • تنزيل الكتب للوصول إليها دون الاتصال بالإنترنت

    • الإلغاء في أي وقت

    أكثر شهرة

    شهري

    قصص لكل المناسبات.

    89 EGP / شهر
    7 أيام مجانًا
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    سنويا

    قصص لكل المناسبات.

    708 EGP /سنة
    7 أيام مجانًا
    وفر 33%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    6 أشهر

    قصص لكل المناسبات.

    474 EGP /ستة أشهر
    7 أيام مجانًا
    وفر 12%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن