The book provides you with information on how to implement and manage a zero-trust architecture.
Tom Madsen has 20+ years of experience in cybersecurity behind him, across many different industry segments, like finance, medical, and systems development in a secure manner. He is the author of many articles for a local Danish online magazine and is a regular writer for www.cybersecuritry-magazine.com. He has authored two other books: "The Art of War Fort Cyber Security", published by Springer, and "Security Architecture - How and Why", published by River Publishers.
1. Why Zero-trust 2. How to Zero-trust 3. Zero-trust - The Network Level 4. Zero-trust Identity 5. Cloud and Zero-trust 6. 5G and Zero-trust 7. Zero-trust Governance/Compliance 8. OT Zero-trust Security 9. Next Steps