Zero Trust Architecture
$59.99
Quantity | Discount |
---|---|
5 + | $44.99 |
- Description
- Additional information
Description
The most thorough, incisive, and practical guide to Zero Trust: theory, origins, evolution, implementation, and operations
- How Zero Trust can adapt to the complexity and risks of modern environments, support hybrid workplaces, and protect people, devices, apps, and data everywhere
- What’s here now, what isn’t, and how to drive value as you plan and execute your journey towards Zero Trust
- Realistic, vendor-agnostic insights for use with any Zero Trust solutions, from a team of Cisco’s leading security experts
- For every architect, engineer, technical professional, and technical decision-maker
Cindy Green-Ortiz is a Cisco senior security architect, cybersecurity strategist, architect, and entrepreneur. She works in the Customer Experience, Global Enterprise Segment for Cisco. She holds the CISSP, CISM, CSSLP, CRISC, PMP, and CSM Certifications, along with two degrees—a BS-CIS Magna Cum Laude and AS-CIS with Honors. She has been with Cisco for 6+ years. Cindy has been in the cybersecurity field for 40 years, where she has held D-CIO, D-CISO, and Corporate Security Architecture Leadership roles, founding two technology businesses as CEO. Cindy is a Cisco Chairman’s Club winner (Club Cisco). She is an active blogger for Cisco and has published whitepapers for Cisco and the US Department of Homeland Security. She has spoken to many groups, including PMI International Information Systems & Technology Symposium-Cybersecurity Keynote; Cisco SecCon, and Cisco Live. Cindy is President Emeritus and serves now as the treasurer of Charlotte InfraGard and cofounder of the InfraGard CyberCamp. Cindy lives in Charlotte, North Carolina, with her amazing husband, Erick, and their two wonderful daughters. Cindy and her family love to travel and see the world.
Brandon Fowler is a technical leader for Cisco Customer Experience Professional Services. He holds both CCNP Security and ITIL v4 foundation certifications. Brandon joined Cisco in 2018 with more than 12 years of experience across enterprise networking and security domains. For the past 8 years, his focus has been on identity, access management, and segmentation with expertise across multiple industry verticals, including retail and distribution, hospitality and entertainment, financial services, and healthcare. Additionally, he has helped to develop some of Cisco’s current Zero Trust service offerings. Brandon also helps mentor and advise other employees within Cisco and enjoys being challenged and learning new technologies. In his personal time, he enjoys working on cars, photography, and video gaming.
David Houck is a security architect, mentor, and advocate. He has been working with Cisco Customer Experience since 2011. David leads delivery teams in implementing solutions globally to financial, energy, retail, healthcare, and manufacturing organizations that focus on identifying and meeting technical and business outcomes. He has presented on the value and implementation of Cisco solutions globally to customers, partners, and internal audiences. David has worked in networking and security since 2005, with experience in service provider voice, infrastructure, ISP operations, plus data center design and operation before coming to Cisco to focus on security solutions and architecture. He enjoys mentoring to provide experiences and opportunities to see others flourish.
Hank Hensel is a senior security architect working for Cisco’s CX Security Services providing security consultation, assessment, and design advisory services to Cisco’s US and international customers. Hank has worked more than 30 years (7 years at Cisco) in leadership positions in IT systems, cybersecurity, design, and integration. Hank’s areas of expertise include security and infrastructure, project management, disaster recovery, business continuity, risk analysis and mitigation, data mapping, data classification, and cybersecurity infrastructure design. Hank has displayed his expertise and leadership in several different industries, including international banking and finance, healthcare, pharmaceutical, energy, renewable energy, oil and gas, passenger and transit rail, manufacturing, mining, wet infrastructure, chemical, nuclear enrichment, public sector
defense, municipality and state infrastructure, and law enforcement. Hank’s expertise and extensive training in networking, security, and strong focus with industrial control systems allow him to engage in nearly all areas of a customer’s operations, policies, and practices. Hank holds CCIE (# 3577), CISSP, GICSP, and CMMC-RP, and other certifications. Hank practices Cisco’s core values in all customer engagements, which have directly contributed to his consistent project successes in every engagement he has been involved in. Hank’s success can be attributed to these values and their consistent culmination by being recognized as a “Trusted Advisor” in nearly every engagement he has been a part of for Cisco. Hank’s role of trust and deep experience extend beyond customer relationships to new service offerings development and Cisco team support. Hank was the original developer of the current CX advisory segmentation service offering that has been in use for the last seven years and has contributed to the development of the new CX advisory Zero Trust service offering. Finally, Hank is currently contributing to building a consulting service offering for the renewables energy sector.
Patrick Lloyd is a senior solutions architect for Cisco’s Customer Experience Security Services team. He focuses on identity and access management, including segmentation, network access control, identity
exchange, and identity integration in the Northeast United States and Canada region. Patrick has worked in technology delivery at Cisco for 13 years, ranging from stints in the technical assistance center (TAC), working as a routing and switching design engineer, security design engineer, and solutions architect. His focus is guiding customers through introducing visibility and identity exchange to minimize business risk and lateral attack vectors. Previously, Patrick worked in higher education and defense industries in system administration and operational roles. Patrick has extensive experience in integrating identity into various industries, including healthcare, manufacturing, finance, and defense. Utilizing Cisco technologies and the methodologies covered in this book to build a layered security model, Patrick has architected segmentation architectures, including smart building architectures, for more than 100 customers. Patrick’s technology focuses span from TrustSec for segmentation, analyzing traffic flow with Cisco Secure Network Analytics/Stealthwatch for development of segmentation policies, implementing firewall and advanced malware protection, and securing critical building systems through policy and segmentation while maintaining availability. Patrick resides in Durham, North Carolina, where he teaches self-defense and is a student pilot when not consumed with technology.
Andrew McDonald is a Cisco network and security architect; he works in the Customer Experience, Security Advisory team for Cisco. He specializes in leading delivery teams creating network segmentation and Zero Trust designs and implementation plans. He has been with Cisco for more than 22 years, working as an escalation engineer, network consulting engineer, systems integration architect, and security architect. Andrew has worked with global customers in all industry verticals and at every level, from front-line support engineers to C-suite executives across multiple technical disciplines. Andrew has worked in the networking and communications industry for more than 40 years. In 1981, he started as a telecommunications technician for Digital Equipment Corporation, where he developed an entry level into a lifelong career.
Jason Frazier is a principal engineer with the Network Services group in Cisco IT. In his current role, Jason focuses on Zero Trust technologies, Cisco DNA, operational excellence, automation, and security. Jason
has deep knowledge of networking technologies, including programmability, enterprise network architecture, and identity. Jason joined Cisco in 1999. He is known throughout the company for his work ethic, passion, loyalty, and drive. Jason currently holds nine patents. For Cisco Live, he is a veteran speaker, hackathon coordinator, blogger, booth orchestrator, or anything called for. Jason is also the author of Cisco Press books.
Jason has been happily married to his wife, Christy, for 22 years. Their oldest son, Davis (16), is Jason’s best friend. Jason is also wrapped around the finger of their daughter, Sidney (14). Most nonwork time is spent doing something with or for his kids. He likes to spend time on a bike, when possible. Jason and family like to travel when they can. As a computer engineering graduate of NC State University, Jason and his family enjoy Wolfpack sporting events as well.
Today’s organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they’re located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
A team of Cisco’s leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that’s been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco’s own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model.
Through real world experiences and case study examples, you’ll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust.
Foreword
Introduction
Part I: Concepts
1. Overview of Zero Trust (ZT): It’s a Journey
2. Cisco Zero Trust: Security Capability Requirements
3. Zero Trust Reference Architecture and Enclave Design
4. Security Capability Use Cases
5. Segmentation
Part II: Implementation
6. Segmentation Methods: Pros and Cons
7. Segmentation Foundational Functions and Applications (CMDB, App Inv, VLAN, Host Naming)
8. Map Functions to Segments / Implement Solutions
9. Test and Monitor ZT Segmentation and Solutions (LLD / SVS) – Phased
Conclusion (Journey)
Afterword
Bibliography
Acknowledgements
Additional information
Dimensions | 0.60 × 7.38 × 9.13 in |
---|---|
Series | |
Imprint | |
Format | |
ISBN-13 | |
ISBN-10 | |
Author | Andrew McDonald, Brandon Fowler, Cindy Green-Ortiz, David Houck, Hank Hensel, Jason Frazier, Patrick Lloyd |
Subjects | professional, higher education, Employability, IT Professional, 2-EB INTERNET WORKINGS |