Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These identities and accounts that have elevated access are the key targets of the bad actors and nearly every event, breach, or incident that occurs is the result of a privileged account being broken into.
Many organizations struggle to control these elevated accounts, what tools to pick, how to implement them correctly, and implement proper governance to ensure success in their zero trust strategy. This book defines a strategy for zero trust success that includes a privileged access strategy with key tactical decisions and actions to guarantee victory in the never-ending war against the bad actors.
What You Will Learn:
Who This Book is for:
Gregory C. Rasner (CISSP, CIPM, ITIL, CCNA) is the founder and CEO of Third Party Threat Hunting LLC, bringing his unique and extensive knowledge of third-party, supply chain, and cybersecurity risk to the market. He is the author of the books "Cybersecurity & Third-Party Risk: Third-Party Threat Hunting" (Wiley, 2021) and "Zero Trust and Third-Party Risk" (Wiley, 2023), and the content creator of the training and certification program "Third-Party Cyber Risk Assessor (TPCRA)" (Third Party Risk Association, 2023). He frequently serves as a keynote speaker and panelist on topics related to cybersecurity and risk management, along with writing blogs, podcasts, and online articles. Greg was the SVP and Leader for Cyber Third-Party Risk at Truist Financial Corp., and he received his B.A. from Claremont McKenna College. He is also actively engaged in leadership roles with cybersecurity and third-party risk task forces, boards, and industry groups.
Maria C. Rasner (CISM, CCSK, CCZT, ITIL) has extensive experience in Identity and Access Management (IAM) and Privileged Access Management (PAM). She has run governance, operations, remediation, implementation, and large IAM and PAM programs at small to large enterprises. Her experience and certifications include cloud certifications in Microsoft and AWS and implementation of PIM in the cloud. Maria has published several articles in the ISSA online journal and Identity Defined Security Alliance. Maria is passionate about mentoring others and has been part of her organization's WIT (Women in IT) program to help empower women achieve their career goals in IT. Maria currently works for a large US bank as an IAM leader.
Chapter 1: Privileged Access Management: The Essentials- Chapter 2: Zero Trust: Origins and Evolutions.- Chapter 3: Assessments and Solutions.- Chapter 4: PAM Governance.- Chapter 5: Blueprint for Successfull Implementation.- Chapter 6: Conclusion.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.