Zero Trust and Third-Party Risk cover art

Zero Trust and Third-Party Risk

Reduce the Blast Radius

Preview
Get this deal Try Premium Plus free
Offer ends December 16, 2025 11:59pm GMT.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Just £0.99/mo for your first 3 months of Audible.
1 bestseller or new release per month—yours to keep.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at £8.99/mo after 3 months. Cancel monthly.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

Zero Trust and Third-Party Risk

By: Gregory C. Rasner
Narrated by: Mike Lenz
Get this deal Try Premium Plus free

£8.99/mo after 3 months. Cancel monthly. Offer ends December 16, 2025 11:59pm GMT.

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £10.99

Buy Now for £10.99

Only £0.99 a month for the first 3 months. Pay £0.99 for the first 3 months, and £8.99/month thereafter. Renews automatically. Terms apply. Start my membership

About this listen

Dramatically lower the cyber risk posed by third-party software and vendors in your organization

In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.

The author uses the story of a fictional organization—KC Enterprises—to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: explanations of the processes, controls, and programs that make up the zero trust doctrine; descriptions of the five pillars of implementing zero trust with third-party vendors; and numerous examples, use-cases, and stories that highlight the real-world utility of zero trust.

©2024 John Wiley & Sons, Inc. (P)2023 Ascent Audio
Insurance Security & Encryption Technology Computer Security Cybersecurity Hacking Software Programming

Listeners also enjoyed...

Cyber Security cover art
Certified Information Security Manager CISM Study Guide cover art
Cyber Intelligence Driven Risk cover art
Cyber Essentials cover art
Alice and Bob Learn Application Security cover art
Cybersecurity Program Development for Business cover art
Essential CISM: Updated for the 16th Edition CISM Review Manual cover art
Essential CISA Exam Guide: Updated for the 26th Edition cover art
Prepare for the ISACA Certified Information Security Manager Exam cover art
Cybersecurity for Beginners cover art
Eleventh Hour CISSP® cover art
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge cover art
A Leader’s Guide to Cybersecurity cover art
Solutions Architect's Handbook cover art
Simple CISSP cover art
Site Reliability Engineering cover art
All stars
Most relevant
Good listen, interesting content. some parts don't lend themselves well to audio, but enjoyable all the same.

Good listen for those interested in ZT.

Something went wrong. Please try again in a few minutes.