In Zero Trust We Trust, 1st edition

Published by Cisco Press (February 27, 2024) © 2024

  • Avinash Naduvath
Products list
Products list

This product is expected to ship within 10-12 business days for New Zealand customers

Title overview

For a future where success is measured as much by the security of a system as by the functionality, In Zero Trust We Trust is designed to help everyone at every stage and level of leadership understand not only the conceptual underpinnings, but the real-world context of when, how, and why to deploy Zero Trust security controls. This book provides the starting point for helping you change the mindset of others, and getting them to understand why Zero Trust isn't simply a conversation to be had, but a movement to embrace.

  • Origins of the Zero Trust philosophy in security architecture explained, and why it took so long to catch on
  • Detailed examination of how to ask the right questions so as to implement the right security answers for clients
  • Understanding the metrics by which to measure Zero Trust success, and what maintaining that success looks like
  • Identifying the stakeholders and empowering a Zero Trust team within an enterprise
  • Examples of how to catalyze opinion and tailor tactics to motivate investment in secure Zero Trust architecture
  • Implement, monitor, feedback, repeat: Presenting and building a roadmap for a sustainable security architecture
  • Looking ahead to a Zero Trust Lifecycle Framework and a blueprint for the future

Table of contents

  • Phase 1 Mindset
  • Chapter 1 When It All Begins
  • Chapter 2 The Zero Trust Kaleidoscope
  • Chapter 3 Defining Zero Trust
  • Phase 2 Align to the Business Vision and Mission and Craft Metrics for Success
  • Chapter 4 Always Start with 'Why'
  • Chapter 5 Measuring Zero Trust Success
  • Chapter 6 Understanding Zero Trust Maturity
  • Phase 3 Identify Key Stakeholders and Enable a Zero Trust Team
  • Chapter 7 Zero Trust Avengers, Assemble!
  • Phase 4 Develop the Target Zero Trust Architecture
  • Chapter 8 Building a Zero Trust Architecture
  • Chapter 9 Critical Security Mechanisms for Zero Trust Architectures
  • Phase 5 Present the Zero Trust Strategy and Metrics
  • Chapter 10 Presenting the Zero Trust Strategy
  • Phase 6 Implement, Monitor, Feedback, Repeat
  • Chapter 11 Implementation and Continuous Monitoring
  • Chapter 12 The Road Ahead

Need help?Get in touch