Free Resource from ISACA Shares Zero Trust Tactics for Strengthening Cyber Defenses

Zero Trust: How to Beat Adversaries at Their Own Game
Author: ISACA
Date Published: 6 April 2022

ISACA is also making additional complimentary security resources available in light of recent global volatility

Schaumburg, IL, USARecent global events have underscored the heightened importance for enterprises to strengthen their efforts against cybersecurity threats. For those seeking to boost their defenses through a zero trust strategy, ISACA has released a new resource, Zero Trust: How to Beat Adversaries at Their Own Game, that provides a primer complete with tactics for thwarting hackers.

Zero Trust outlines the benefits of applying the zero trust principle and explores key considerations and components to include identity and access management, leveraging cloud technologies and device posture health checking.

The paper also walks through a brief history of exploitations and includes a listing of key compromises reported in the latter half of 2021 for context. Additionally, Zero Trust delves into the tactics that hackers commonly use—like account compromise, lateral movement and ransomware—and how enterprises can apply zero trust technologies to interrupt a hacker’s tactical life cycle, such as:

  • Extending the control plane outside the enterprise
  • Using virtualization as a defensive solution
  • Planning to fail effectively
  • Employing intelligence to monitor insider threat activities

“With the increase in remote working and use of personal devices for business purposes, converging with a complex threat landscape with sophisticated hackers, it is becoming even more important for enterprises to become more intentional in the strategy they employ to strengthen their defenses,” says Jonathan Brandt, ISACA director, professional practices and innovation. “Many enterprises find that adopting a zero trust approach backed by a solid strategy allows them to develop a more robust security posture which minimizes the impacts of incidents, while also identifying unnecessary or otherwise duplicative technologies which carries cost savings and simplifies security management.”

A complimentary copy of the white paper can be downloaded at http://store.ngskmc-eis.net/s/#/store/browse/detail/a2S4w000005DtLZEA0.

In response to this period of heightened global volatility, ISACA has also made additional security-related resources available free of charge, including Implementing the NIST Cybersecurity Framework Using COBIT 2019, COBIT 2019: Information Security Focus Area and Cybersecurity Fundamentals Study Guide. For a full list of free materials available, read this ISACA Now blog post.

About ISACA

For more than 50 years, ISACA® (srjv.ngskmc-eis.net) has advanced the best talent, expertise and learning in technology. ISACA equips individuals with knowledge, credentials, education and community to progress their careers and transform their organizations, and enables enterprises to train and build quality teams. ISACA is a global professional association and learning organization that leverages the expertise of its more than 150,000 members who work in information security, governance, assurance, risk and privacy to drive innovation through technology. It has a presence in 188 countries, including more than 220 chapters worldwide. In 2020, ISACA launched One In Tech, a philanthropic foundation that supports IT education and career pathways for under-resourced, under-represented populations.

Twitter: www.twitter.com/ISACANews
LinkedIn: www.linkedin.com/company/isaca
Facebook: www.facebook.com/ISACAGlobal
Instagram: www.instagram.com/isacanews

Media Contacts

Emily Van Camp, +1.847.385.7223, communications@ngskmc-eis.net
Kristen Kessinger, +1.847.660.5512,  communications@ngskmc-eis.net