Access a growing selection of included Audible Originals, audiobooks, and podcasts.
You will get an email reminder before your trial ends.
Audible Plus auto-renews for $7.95/mo after 30 days. Upgrade or cancel anytime.
Project Zero Trust  By  cover art

Project Zero Trust

By: George Finney, John Kindervag - foreword
Narrated by: Daniel Thomas May
Try for $0.00

$7.95 a month after 30 days. Cancel anytime.

Buy for $17.19

Buy for $17.19

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's summary

Implement Zero Trust initiatives efficiently and effectively

In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director.

Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find:

  • Concrete strategies for aligning your security practices with the business
  • Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment
  • Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices

Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.

©2022 John Wiley & Sons, Inc. (P)2022 Ascent Audio

More from the same

What listeners say about Project Zero Trust

Average customer ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    33
  • 4 Stars
    10
  • 3 Stars
    3
  • 2 Stars
    2
  • 1 Stars
    3
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    30
  • 4 Stars
    5
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    4
Story
  • 4 out of 5 stars
  • 5 Stars
    27
  • 4 Stars
    5
  • 3 Stars
    3
  • 2 Stars
    1
  • 1 Stars
    4

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Zero Trust is not just a marketing term.. who knew?

I am an IT security professional and thought zero trust was just a generic marketing term - this fictional story of a company implementing zero trust in their environment goes a long way in helping others understand what it is and what it isn’t. The key part is zero trust has to be tailored to each organization and follow certain principles… best IT security book I’ve heard in a long time.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Amazing book on ZT

It's a fantastic book on the concept of Zero Trust. George is a master storyteller. It's an exciting book complete with business and technical perspectives. Striking a perfect balance between the two is hard to achieve, and George has done it with a swagger!

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Excellent for understanding zero trust concepts

Zero Trust can be a complicated concept to wrap your head around. Project Zero Trust puts things in perspective by taking you through a journey of implementing zero trust at a fictional company. Throughout the book, you'll learn not just the concepts of zero trust but also how those concepts interact with real-world scenarios.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

This one will be a classic

Cybersecurity aside, this is just a great story. It’s written in a style similar to The E-myth, another good story coupled short and dense takeaways.
It almost feels like I went through an internship at MarchFit, and I’m much more confident with both selling the idea and leading the implementation of Zero Trust.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

2 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

This is a must hear/read

Probably one of the most critical listening audiobooks I came accross the last 1-2 years. The story is amazing though I would prefer multiple narrators to create a better atmosphere of the conversations. Nevertheless the scenario can easily being a carbon copy of real world. I think this will be a classic and I hope for a future title 2.0. The book/eBook/audobook should be a must for reference on any security practitioner.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    5 out of 5 stars

I'd prefer to read this one

Kudo's to the George and John! Great story that covers all the bases in real-world scenarios.
However, as more characters are developed the audio version starts to become like nails on a chalkboard because some of the voices are so incongruent with the characters.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    4 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    4 out of 5 stars

The Unicorn Project, but for security.

Similar to "The Phoenix Project" although not as good, like "The Unicorn Project" the hard challenges are not described well enough - the characters goes through the implementation of Zero Trust a bit too easily.
Authorization and authentication is only briefly discussed despite being central to the concepts.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Amazing

Wonderful read, very educational and engaging, which is not easy to do! Highly recommended for anyone interested in cybersecurity

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Zero Trust Example Implementation

I enjoyed listening to this book and examples given on implementing Zero Trust. The concept of Zero Trust seemed confusing on the surface. However, after reading this book, my takeaway is Zero Trust focuses on breaking down internal network trust relationships and implementing stricter security controls and observability for internal communications.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    2 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    3 out of 5 stars

Content is fine, voicing is comically bad

Using a fictional narrative to walk a team through learning and implementing zero trust is entertaining and well written. Information is conveyed efficiently with enough spaced repetition to have it sink in.

The performance however is awful. Each character in the story comes across as a caricature. It distracts from the story and adds nothing of value. It became so bad after a couple of hours that I had to shut it down.

I'll finish the story by reading the book.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!