Get Free Shipping on orders over $79
Privileged Access Management : Strategies for Zero Trust in the Enterprise - Gregory C. Rasner

Privileged Access Management

Strategies for Zero Trust in the Enterprise

By: Gregory C. Rasner, Maria C. Rasner

eText | 14 July 2025

At a Glance

eText


$84.99

or 4 interest-free payments of $21.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These identities and accounts that have elevated access are the key targets of the bad actors and nearly every event, breach, or incident that occurs is the result of a privileged account being broken into.

Many organizations struggle to control these elevated accounts, what tools to pick, how to implement them correctly, and implement proper governance to ensure success in their zero trust strategy. This book defines a strategy for zero trust success that includes a privileged access strategy with key tactical decisions and actions to guarantee victory in the never-ending war against the bad actors.

What You Will Learn:

  • The foundations of Zero Trust security and Privileged Access Management.
  • Tie-ins to the ZT strategy and discussions about successful implementation with strategy and governance.
  • How to assess your security landscape including current state, risk-based gaps, tool and technology selection, and assessment output.
  • A step-by-step strategy for Implementation, including planning, execution, governance, and root-cause analysis.

Who This Book is for:

  • C-level suite: not designed to be overly technical, but cover material enough to allow this level to be conversant in strategy and leadership needs to success.
  • Director-level in Cyber and IT: this level of personnel are above the individual contributors (IC) and require the information in this book to translate the strategy goals set by C-suite and the tactics required for the ICs to implement and govern.
  • GRC leaders and staff.
  • Individual Contributors: while not designed to be a technical manual for engineering staff, it does provide a Rosetta Stone for themto understand how important strategy and governance are to their success.
on
Desktop
Tablet
Mobile

More in Data Encryption

Scam : Inside Southeast Asia's Cybercrime Compounds - Ivan Franceschini

eBOOK