Get Free Shipping on orders over $89
Securing AI Using Zero Trust Principles : Networking Technology: Security - Cindy Green-Ortiz

Securing AI Using Zero Trust Principles

By: Cindy Green-Ortiz, Zig Zsiga, Saskia Laura Schröer

eText | 18 May 2026 | Edition Number 1

At a Glance

eText


$61.75

or 4 interest-free payments of $15.44 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Securing AI Using Zero Trust Principles

Strategic Guidance for Defending AI Systems in a Rapidly Evolving Threat Landscape

Artificial intelligence is reshaping industries, driving innovation in critical sectors such as healthcare, finance, energy, and government. Yet, as organizations integrate AI into business operations, they inherit new risks, many of which conventional security models fail to address. Adversaries are weaponizing AI to automate reconnaissance, bypass defenses, and exploit vulnerable systems. The solution is not more trust, but less.

Zero Trust offers a foundational paradigm shift: no identity, device, system, or interaction is inherently trusted. Security must be continuously enforced, context-aware, and resilient by design. This book demonstrates how Zero Trust, when strategically applied to AI environments, enables organizations to secure data pipelines, mitigate emergent threats, and maintain control over evolving digital ecosystems.

Key insights include

  • AI Through a Security Lens: Demystifies machine learning, generative AI, and large language models with a focus on operational and business impact.
  • Zero Trust Foundations: Provides a historical and architectural overview of Zero Trust, including Cisco's Five Zero Trust Categories.
  • Security by Design for AI: Offers guidance on protecting AI development workflows, from data ingestion and model training to inference and deployment.
  • Threat Mitigation Strategies: Addresses adversarial AI, data poisoning, shadow AI, and insider misuse through identity enforcement, segmentation, and telemetry.
  • Strategic Execution: Maps Zero Trust principles to regulatory frameworks including NIST AI RMF, EU AI Act, DORA, and ISO 27001, and provides actionable templates for running successful Zero Trust Segmentation Workshops.

Who Should Read This Book:

  • CISOs and security architects building AI-resilient architectures
  • AI and data leaders embedding AI into enterprise infrastructure
  • Risk, compliance, and governance professionals navigating regulatory change
  • Technical teams seeking secure-by-design methodologies for AI initiatives

Why This Matters Now:

AI systems are expanding faster than most organizations can govern them. The risks, ranging from operational disruption to model corruption, require proactive, architectural defenses. This book bridges the gap between AI innovation and trusted enterprise security.

Securing AI Using Zero Trust Principles delivers the strategic playbook for building resilient, trustworthy, and standards-aligned AI systems that can withstand the threats of today and tomorrow.

on
Desktop
Tablet
Mobile

More in Artificial Intelligence

The Pigeon Strategy - Hajrë Hyseni

eBOOK

Late Night - A M Howcroft

eBOOK

RRP $16.49

$15.99