ABSTRACT

"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that shows us that our past approaches, while earnest in their efforts, have not stopped attackers. Zero Trust strategically focuses on and systematically removes the power and initiatives hackers and adversaries need to win as they circumvent security controls. This book will help you and your organization have a better understanding of what Zero Trust really is, recognize its history, and gain prescriptive knowledge that will help you and your enterprise finally begin beating the adversaries in the chess match that is cyber security strategy."

Dr. Chase Cunningham (aka Dr. Zero Trust), Cyberware Expert

Today’s organizations require a new security approach that effectively adapts to the challenges of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they are located. Zero Trust is increasingly becoming the critical security approach of choice for many enterprises and governments; however, security leaders often struggle with the significant shifts in strategy and architecture required to holistically implement Zero Trust.

This book seeks to provide an end-to-end view of the Zero Trust approach across organizations’ digital estates that includes strategy, business imperatives, architecture, solutions, human elements, and implementation approaches that could significantly enhance these organizations' success in learning, adapting, and implementing Zero Trust. The book concludes with a discussion of the future of Zero Trust in areas such as artificial intelligence, blockchain technology, operational technology (OT), and governance, risk, and compliance.

The book is ideal for business decision makers, cybersecurity leaders, security technical professionals, and organizational change agents who want to modernize their digital estate with the Zero Trust approach.

chapter |5 pages

Introduction

part 1|47 pages

History, Introduction, and Fundamentals of Zero Trust

chapter Chapter 1|33 pages

History of and Introduction to Zero Trust

chapter Chapter 2|13 pages

Zero Trust – Disrupting the Business Model

part 2|126 pages

Current Status and Best Practices of the Zero Trust Journey

chapter Chapter 3|18 pages

Zero Trust Maturity and Implementation Assessment

chapter Chapter 4|33 pages

Identity Is the New Security Control Plane

chapter Chapter 5|59 pages

Zero Trust Architecture Components

chapter Chapter 6|15 pages

Zero Trust Project Plan and Program Approach

part 3|22 pages

Future Horizon of Zero Trust

chapter Chapter 7|19 pages

Future Horizon of Zero Trust