Try free for 30 days
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- Narrated by: KC Wayman
- Length: 3 hrs and 20 mins
Failed to add items
Add to basket failed.
Add to Wish List failed.
Remove from Wish List failed.
Follow podcast failed
Unfollow podcast failed
Buy Now for $17.00
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also picked
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- By: Taimur Ijlal
- Narrated by: Craig Neutzling
- Length: 1 hr and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- By: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further.
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- By: Taimur Ijlal
- Narrated by: Craig Neutzling
- Length: 1 hr and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
Zero Trust Architecture
- Networking Technology: Security
- By: Cindy Green-Ortiz, Brandon Fowler, David Houck, and others
- Narrated by: Alex Freeman
- Length: 11 hrs and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- By: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrated by: Mike Lenz
- Length: 8 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Certified Information Security Manager CISM Study Guide
- By: Mike Chapple PhD CISM
- Narrated by: Daniel Henning
- Length: 19 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further.
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
NIST Cyber Security Framework
- V1 2-in-1 Information Security & Policy
- By: Bruce Brown
- Narrated by: Kim Pepper
- Length: 11 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you need a thorough but straightforward breakdown of the NIST Cybersecurity Framework v1.0? This TWO-BOOK BUNDLE gives a working explanation of the NIST CSF and a method of practical application. Equip yourself with a dual weapon against cyber threats – a theoretical understanding and actionable strategies. Whether you're a cybersecurity novice or a seasoned expert, this 2-in-1 bundle is a must-have resource.
-
The Business Case for AI
- A Leader's Guide to AI Strategies, Best Practices & Real-World Applications
- By: Kavita Ganesan
- Narrated by: Stephanie Richardson
- Length: 9 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
AI is much more than a sexy marketing gimmick. At its core, it’s a powerful business tool that can make operations and decision-making more efficient, employees more productive, and customers delighted. Unfortunately, leaders who want to take advantage of artificial intelligence often don’t know where to start. The process can feel overwhelming—from analyzing existing processes and software systems and choosing where to apply AI automation, to preparing every tier of the organization for the transition.
-
Zero Trust and Third-Party Risk
- Reduce the Blast Radius
- By: Gregory C. Rasner
- Narrated by: Mike Lenz
- Length: 6 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.
-
The Home Network Manual
- The Complete Guide to Setting Up, Upgrading, and Securing Your Home Network
- By: Marlon Buchanan
- Narrated by: Helpful Matthew
- Length: 4 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
After listening to this audiobook, you'll be equipped with all the tools and information you need to have the trouble-free, fast, and secure home network you need. If getting every device in your home on your home network has been a chore, or if you’re putting up with situations like your video streaming services buffering every few moments, your online games kicking you because your Wi-Fi drops, or your Zoom sessions fuzzing out and freezing into that impossible to understand robot voice, then you need to listen to this audiobook!
-
Cybersecurity All-in-One for Dummies
- By: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, and others
- Narrated by: Tom Perkins
- Length: 24 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
wish I read it when it was released
- By JayZee on 21-12-2022
Publisher's Summary
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets
Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach?
We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
But all hope is not lost.
There’s a new knight in shining armor that promises to turn the tide in our favor–Zero Trust Security.
Step into a future where your digital assets are well-guarded with the help of this must-have guide. Inside, you'll discover:
- The fundamentals and principles of Zero Trust Security–set yourself on the right path to fortify your digital fortress
- The alarming cyber threat landscape of today… and how Zero Trust Security is a beacon of hope amidst it
- The pillars of Zero Trust Architecture (plus their instrumental role in safeguarding your data)
- The technological aspects and critical considerations for Zero Trust implementation
- How to operationalize Zero Trust… and ensure it's not just a strategy but your new reality
- The complex interplay between compliance, regulations, and Zero Trust–navigate the complexities of legal requirements with confidence
- Practical strategies to tackle the challenges and barriers in Zero Trust adoption
And much more!
With this book’s straightforward explanations, direct insights, and actionable tips and strategies for seamless integration, you’ll find yourself seamlessly navigating the complex world of Zero Trust Security in no time.
The future of cybersecurity is Zero Trust. Are you 100% ready for it? Click "Add to Cart" right now.