Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides realistic guidance and the requirements you need to successfully plan and execute a journey to Zero Trust while getting more value from your existing security architecture. It will aid you in designing a credible and defensible Zero Trust security architecture for your organization and implement a stepwise strategy that delivers significantly improved security and streamlined operations.
"Zero Trust isn’t just a catch aphorism, it is within your grasp and waiting to be implemented everywhere. This book will help you achieve your Zero Trust goals with velocity and precision. Nation-state actors and cyber criminals have proven that the perimeter-based security model is no longer valid."
Gregory J. Touhill, CISSP, CISM, Brigadier General, USAF (Ret.)
"What a great technical read that helps the reader learn how to move to Zero Trust. In particular, Chapter 18 is all about scenarios and use cases that should be thought about as an organization moves along this path."
Dr. Chase Cunningham, Dr. Zero Trust