• Complain

George Finney - Project Zero Trust: A Story about a Strategy for Aligning Security and the Business

Here you can read online George Finney - Project Zero Trust: A Story about a Strategy for Aligning Security and the Business full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Wiley, genre: Art. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
  • Author:
  • Publisher:
    Wiley
  • Genre:
  • Year:
    2022
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Project Zero Trust: A Story about a Strategy for Aligning Security and the Business" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Implement Zero Trust initiatives efficiently and effectively

In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the companys new IT Security Director.

Readers will learn John Kindervags 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. Theyll also find:

  • Concrete strategies for aligning your security practices with the business
  • Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment
  • Strategies for preventing breaches that encourage efficiency and cost reduction in your companys security practices

Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.

George Finney: author's other books


Who wrote Project Zero Trust: A Story about a Strategy for Aligning Security and the Business? Find out the surname, the name of the author of the book and a list of all author's works by series.

Project Zero Trust: A Story about a Strategy for Aligning Security and the Business — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Project Zero Trust: A Story about a Strategy for Aligning Security and the Business" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Project Zero Trust A Story about a Strategy for Aligning Security and the Business - image 1
Table of Contents
Guide
Pages
Project Zero Trust
A Story about a Strategy for Aligning Security and the Business

George Finney

Project Zero Trust A Story about a Strategy for Aligning Security and the Business - image 2

Copyright 2023 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada and the United Kingdom.

ISBN: 978-1-119-88484-2
ISBN: 978-1-119-88485-9 (ebk.)
ISBN: 978-1-119-88486-6 (ebk.)

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permission.

Trademarks: WILEY and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

If you believe you've found a mistake in this book, please bring it to our attention by emailing our Reader Support team at with the subject line Possible Book Errata Submission.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Control Number: 2022938397

Cover images: Alhovik/Shutterstock; venimo/Shutterstock
Cover design: Wiley

More Wiley Books for Cybersecurity Leaders

Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk by Andrew Gorecki

Cybersecurity and Third-Party Risk: Third Party Threat Hunting by Gregory C. Rasner

How to Measure Anything in Cybersecurity Risk by Douglas W. Hubbard and Richard Seiersen

Navigating the Cybersecurity Career Path by Helen E. Patton

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter and Kai Roer

Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership by Marcus J. Carey and Jennifer Jin

You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions by Ira Winkler and Tracy Celaya Brown

To Amanda and Story

About the Author

George Finney is a Chief Information Security Officer who believes that people are the key to solving our cybersecurity challenges. George is the bestselling author of several cybersecurity books, including the award-winning book Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future (Greenleaf Book Group Press, 2020). George was recognized in 2021 as one of the top 100 CISOs in the world by CISOs Connect. He has worked in cybersecurity for over 20 years and has helped startups, global telecommunications firms, and nonprofits improve their security posture. George is also an attorney, but don't hold that against him.

Acknowledgments

I couldn't have written this book without the help of a huge number of people who were willing to take their time and share their expertise with me. I'd first like to thank my friend and mentor, John Kindervag, for his help throughout my career as I took my organization through our Zero Trust journey and as I developed this story.

I also owe a debt of gratitude to my publisher, Jim Minatel, who not only believed in the project, but that I could actually somehow pull it off. And I'd like to thank the team at Wiley and Sons, particularly John Sleeva, Pete Gaughan, and Melissa Burlock for their invaluable contributions to make this book what it is.

Cybersecurity is a team sport. We can't do what we do without sharing our experiences with one another. When I picked up my phone and began asking for help, the community came together and answered the call. I'd like to personally thank Zach Vinduska for being right there with me all the way through the creation of the book. I'd also like to thank Adam Shostack for his insights and helping make all of the details come to life.

I'd also like to give a huge shout out to my friends and colleagues Jason Fruge, Helen Patton, Eve Maler, Russ Kirby, Rob LaMagna-Reiter, Exodus Almasude, Chase Cunningham, Josh Danielson, Jordan Mauriello, Malcolm Harkins, and Steve King. I consider myself incredibly lucky to know all of you.

And, finally, I'd like to thank my wife Amanda and my daughter Story for their support, their inspiration, and their understanding while I pursued my dream of being a writer.

George Finney

Foreword

When my friend George Finney told me he was going to write a novel about Zero Trust, my initial response was, Why? The idea that anyone would want to read a novel about Zero Trust, let alone write one, was a bit of a head-scratcher. Gratifying, to be sure, but still bizarre. You see, when I first created the concept of Zero Trust, folks thought I was crazy. Not just quirky crazy, like so many of us in IT and cybersecurity, but genuinely insane crazy.

I have spent many years trying to convince people to be open-minded enough to consider building Zero Trust environments. The notion that someone wanted to write a book of fiction revolving around an idea I had created was mind-blowing. So that's how George ended up sitting on my living room sofa while I told him the story of how Zero Trust came to be.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Project Zero Trust: A Story about a Strategy for Aligning Security and the Business»

Look at similar books to Project Zero Trust: A Story about a Strategy for Aligning Security and the Business. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Project Zero Trust: A Story about a Strategy for Aligning Security and the Business»

Discussion, reviews of the book Project Zero Trust: A Story about a Strategy for Aligning Security and the Business and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.