Zero Trust and Third-Party Risk


Book Description

Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you’ll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization—KC Enterprises—to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You’ll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trust An essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk.




Cybersecurity and Third-Party Risk


Book Description

Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic. The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing. Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation. Understand the basics of third-party risk management Conduct due diligence on third parties connected to your network Keep your data and sensitive information current and reliable Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and Equifax The time to talk cybersecurity with your data partners is now. Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.




Zero Trust Networks


Book Description

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it. The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. Understand how perimeter-based defenses have evolved to become the broken model we use today Explore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty) Get example configuration for open source tools that you can use to build a zero trust network Learn how to migrate from a perimeter-based network to a zero trust network in production




Summary of Gregory C. Rasner's Cybersecurity and Third-Party Risk


Book Description

Please note: This is a companion version & not the original book. Sample Book Insights: #1 On December 10, 2020, ESET researchers announced they had found that a chat software called Able Desktop, part of a widely used business management suite in Mongolia, was exploited to deliver the HyperBro backdoor, the Korplug RAT, and another RAT named Tmanger. #2 On December 13, 2020, FireEye, a global leader in cybersecurity, published the first details about the SolarWinds Supply-Chain Attack, a global intrusion campaign that inserted a trojan into the SolarWinds Orion business software updates to distribute the malware. #3 The most recent attack reflects a particular focus on the United States and many other democracies, but it also provides a powerful reminder that people in virtually every country are at risk and need protection. #4 On December 17, 2020, ESET Research announced that it had detected a large supply-chain attack against the digital signing authority of the government of Vietnam, the website for the Vietnam Government Certification Authority. The website was hacked as early as July 23rd, and no later than August 16, 2020. The compromised toolkits contained malware known as PhantomNet.




Zero Trust Journey Across the Digital Estate


Book Description

"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that shows us that our past approaches, while earnest in their efforts, have not stopped attackers. Zero Trust strategically focuses on and systematically removes the power and initiatives hackers and adversaries need to win as they circumvent security controls. This book will help you and your organization have a better understanding of what Zero Trust really is, recognize its history, and gain prescriptive knowledge that will help you and your enterprise finally begin beating the adversaries in the chess match that is cyber security strategy." Dr. Chase Cunningham (aka Dr. Zero Trust), Cyberware Expert Today’s organizations require a new security approach that effectively adapts to the challenges of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they are located. Zero Trust is increasingly becoming the critical security approach of choice for many enterprises and governments; however, security leaders often struggle with the significant shifts in strategy and architecture required to holistically implement Zero Trust. This book seeks to provide an end-to-end view of the Zero Trust approach across organizations’ digital estates that includes strategy, business imperatives, architecture, solutions, human elements, and implementation approaches that could significantly enhance these organizations' success in learning, adapting, and implementing Zero Trust. The book concludes with a discussion of the future of Zero Trust in areas such as artificial intelligence, blockchain technology, operational technology (OT), and governance, risk, and compliance. The book is ideal for business decision makers, cybersecurity leaders, security technical professionals, and organizational change agents who want to modernize their digital estate with the Zero Trust approach.




Zero Trust Security


Book Description

This book delves into the complexities of business settings. It covers the practical guidelines and requirements your security team will need to design and execute a zero-trust journey while maximizing the value of your current enterprise security architecture. The goal of Zero Trust is to radically alter the underlying concept and approach to enterprise security, moving away from old and clearly unsuccessful perimeter-centric techniques and toward a dynamic, identity-centric, and policy-based approach. This book helps the readers to earn about IPS, IDS, and IDPS, along with their varieties and comparing them. It also covers Virtual Private Networks, types of VPNs.and also to understand how zero trust and VPN work together By the completion of the book, you will be able to build a credible and defensible Zero Trust security architecture for your business, as well as implement a step-by-step process that will result in considerably better security and streamlined operations. TABLE OF CONTENTS 1. Introduction to Enterprise Security 2. Get to Know Zero Trust 3. Architectures With Zero Trust 4. Zero Trust in Practice 5. Identity and Access Management (IAM) 6. Network Infrastructure 7. Network Access Control 8. Intrusion Detection and Prevention Systems 9. Virtual Private Networks 10. Next-Generation Firewalls 11. Security Operations 12. Privileged Access Management (PAM) 13. Data Protection 14. Infrastructure and Platform as a Service 15.Software as a Service (SaaS) 16. IoT Devices 17. A Policy of Zero Trust 18. Zero Trust Scenarios 19. Creating a Successful Zero Trust Environment




In Zero Trust We Trust


Book Description

Before an enterprise answers “How can we achieve a Zero Trust architecture?” they should be asking “Why are we looking at Zero Trust as an access model? Does it align with our vision?” In an innovative format, Cisco security architecture expert Avinash Naduvath guides you through the philosophical questions and practical answers for an enterprise looking to start the Zero Trust journey. A conversational model will take you from the initial stages of identifying goals and pitching solutions, through practical tasks that highlight tangible outcomes—including common primary use cases—in order to bring focus to the correct implementation and maintenance of a Zero Trust architecture. For a future where success is measured as much by the security of a system as by the functionality, In Zero Trust We Trust is designed to help everyone at every stage and level of leadership understand not only the conceptual underpinnings, but the real-world context of when, how, and why to deploy Zero Trust security controls. This book provides the starting point for helping you change the mindset of others, and getting them to understand why Zero Trust isn’t simply a conversation to be had, but a movement to embrace. Origins of the Zero Trust philosophy in security architecture explained, and why it took so long to catch on Detailed examination of how to ask the right questions so as to implement the right security answers for clients Understanding the metrics by which to measure Zero Trust success, and what maintaining that success looks like Identifying the stakeholders and empowering a Zero Trust team within an enterprise Examples of how to catalyze opinion and tailor tactics to motivate investment in secure Zero Trust architecture Implement, monitor, feedback, repeat: Presenting and building a roadmap for a sustainable security architecture Looking ahead to a Zero Trust Lifecycle Framework and a blueprint for the future




How to Start Your Own Cybersecurity Consulting Business


Book Description

The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words, that is what the average tenure of a CISO is at a business. At the end of their stay, many CISOs look for totally different avenues of work, or they try something else – namely starting their own Cybersecurity Consulting business. Although a CISO might have the skill and knowledge set to go it alone, it takes careful planning to launch a successful Cyber Consulting business. This ranges all the way from developing a business plan to choosing the specific area in Cybersecurity that they want to serve. How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO is written by an author who has real-world experience in launching a Cyber Consulting company. It is all-encompassing, with coverage spanning from selecting which legal formation is most suitable to which segment of the Cybersecurity industry should be targeted. The book is geared specifically towards the CISO that is on the verge of a total burnout or career change. It explains how CISOs can market their experience and services to win and retain key customers. It includes a chapter on how certification can give a Cybersecurity consultant a competitive edge and covers the five top certifications in information security: CISSP, CompTIA Security+, CompTIA CySA+, CSSP, and CISM. The book’s author has been in the IT world for more than 20 years and has worked for numerous companies in corporate America. He has experienced CISO burnout. He has also started two successful Cybersecurity companies. This book offers his own unique perspective based on his hard-earned lessons learned and shows how to apply them in creating a successful venture. It also covers the pitfalls of starting a consultancy, how to avoid them, and how to bounce back from any that prove unavoidable. This is the book for burned-out former CISOs to rejuvenate themselves and their careers by launching their own consultancies.




Intelligent Systems for Smart Cities


Book Description

This book presents the select proceedings of the 2nd International Conference on Intelligent Systems and Applications 2023. The theme of this conference is ‘Intelligent Systems for Smart Cities'. It covers the topics of intelligent systems in multiple aspects such as healthcare, supply chain and logistics, smart homes and smart structures, banking and finance, a sustainable environment, social media and cyber security, crime prevention, and disaster management. The book will be useful for researchers and professionals interested in the broad field of artificial intelligence and machine learning.




Project Zero Trust


Book Description

Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director. Readers will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find: Concrete strategies for aligning your security practices with the business Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.