02851nam a22003735i 450000100090000000300050000900500170001400800410003101000170007202000310008904000290012004200080014905000230015708200220018010000290020224501080023126300090033926400610034830000300040933600260043933700280046533800270049350400510052050502770057152011700084865000450201865000350206365000220209890600450212094200450216595201250221095201250233599900170246022543306CSPC20250324164545.0220511s2022 nju 000 0 eng  a 2022938397 a9781119884842q(paperback) aDLCbengerdacDLCdCSPC apcc04aHD61.5 b.F56 202304a658.47bF497p2231 aFinney, George,eauthor.10aProject Zero Trust :ba story about a strategy for aligning security and the business /cGeorge Finney. a2209 1aHoboken, New Jersey :bJohn Wiley and Sons, Inc.,c2023. axxii, 196 pages ;c24 cm. atextbtxt2rdacontent aunmediatedbn2rdamedia avolumebnc2rdacarrier aIncludes bibliographical references and index.0 aThe case for zero trust -- Zero trust is a strategy -- Trust is a vulnerability -- The crown jewels -- The identity cornerstone -- Zero trust DevOps -- Zero trust SOC -- Cloudy with a chance of trust -- A sustainable culture -- The tabletop exercise -- Every step matters. aImplement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director. Readers will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find: Concrete strategies for aligning your security practices with the business Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives 0aBusiness enterprisesvSecurity measures. 0aComputer securityvManagement. 0aSecurity systems. a0bibccorignewd2eepcnf20gy-gencatlg 2ddcn0cBKh658.47iF497pkCIRm2023e23 00102ddc4070aCSPCbCSPCcCIRd2025-03-20l0oCIR 658.47 F497p 2023p029318r2025-03-20 10:47:29t2-2w2025-03-20yBK 00102ddc4070aCSPCbCSPCcCIRd2025-03-21l0oCIR 658.47 F497p 2023p029314r2025-03-21 11:37:47t1-2w2025-03-21yBK c29207d29207