Preview

Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Project Zero Trust

By: George Finney, John Kindervag - foreword
Narrated by: Daniel Thomas May
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $17.19

Buy for $17.19

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's summary

Implement Zero Trust initiatives efficiently and effectively

In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director.

Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find:

  • Concrete strategies for aligning your security practices with the business
  • Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment
  • Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices

Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.

©2022 John Wiley & Sons, Inc. (P)2022 Ascent Audio
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Project Zero Trust

Average customer ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    38
  • 4 Stars
    14
  • 3 Stars
    3
  • 2 Stars
    2
  • 1 Stars
    3
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    35
  • 4 Stars
    7
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    4
Story
  • 4.5 out of 5 stars
  • 5 Stars
    30
  • 4 Stars
    8
  • 3 Stars
    4
  • 2 Stars
    1
  • 1 Stars
    4

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Amazing book on ZT

It's a fantastic book on the concept of Zero Trust. George is a master storyteller. It's an exciting book complete with business and technical perspectives. Striking a perfect balance between the two is hard to achieve, and George has done it with a swagger!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Zero Trust is not just a marketing term.. who knew?

I am an IT security professional and thought zero trust was just a generic marketing term - this fictional story of a company implementing zero trust in their environment goes a long way in helping others understand what it is and what it isn’t. The key part is zero trust has to be tailored to each organization and follow certain principles… best IT security book I’ve heard in a long time.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Excellent for understanding zero trust concepts

Zero Trust can be a complicated concept to wrap your head around. Project Zero Trust puts things in perspective by taking you through a journey of implementing zero trust at a fictional company. Throughout the book, you'll learn not just the concepts of zero trust but also how those concepts interact with real-world scenarios.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    5 out of 5 stars

I'd prefer to read this one

Kudo's to the George and John! Great story that covers all the bases in real-world scenarios.
However, as more characters are developed the audio version starts to become like nails on a chalkboard because some of the voices are so incongruent with the characters.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

This one will be a classic

Cybersecurity aside, this is just a great story. It’s written in a style similar to The E-myth, another good story coupled short and dense takeaways.
It almost feels like I went through an internship at MarchFit, and I’m much more confident with both selling the idea and leading the implementation of Zero Trust.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

2 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

This is a must hear/read

Probably one of the most critical listening audiobooks I came accross the last 1-2 years. The story is amazing though I would prefer multiple narrators to create a better atmosphere of the conversations. Nevertheless the scenario can easily being a carbon copy of real world. I think this will be a classic and I hope for a future title 2.0. The book/eBook/audobook should be a must for reference on any security practitioner.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    4 out of 5 stars

Project phoenix for security

Easy to listen to, not too long and rather comprehensive overview of various areas of cyber security. Generally a good introduction to the zero trust philosophy.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

The Unicorn Project, but for security.

Similar to "The Phoenix Project" although not as good, like "The Unicorn Project" the hard challenges are not described well enough - the characters goes through the implementation of Zero Trust a bit too easily.
Authorization and authentication is only briefly discussed despite being central to the concepts.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Amazing

Wonderful read, very educational and engaging, which is not easy to do! Highly recommended for anyone interested in cybersecurity

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Zero Trust Example Implementation

I enjoyed listening to this book and examples given on implementing Zero Trust. The concept of Zero Trust seemed confusing on the surface. However, after reading this book, my takeaway is Zero Trust focuses on breaking down internal network trust relationships and implementing stricter security controls and observability for internal communications.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!