EasterBlack-owned or founded brands at TargetGroceryClothing, Shoes & AccessoriesBabyHomeFurnitureKitchen & DiningOutdoor Living & GardenToysElectronicsVideo GamesMovies, Music & BooksSports & OutdoorsBeautyPersonal CareHealthPetsHousehold EssentialsArts, Crafts & SewingSchool & Office SuppliesParty SuppliesLuggageGift IdeasGift CardsClearanceTarget New ArrivalsTarget Finds#TargetStyleTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores

Privileged Access Management - by Gregory C Rasner & Maria C Rasner (Paperback)

Privileged Access Management - by  Gregory C Rasner & Maria C Rasner (Paperback) - 1 of 1
$49.99 when purchased online
Target Online store #3991

About this item

Highlights

  • Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach.
  • About the Author: Gregory C. Rasner (CISSP, CIPM, ITIL, CCNA) is the founder and CEO of Third Party Threat Hunting LLC, bringing his unique and extensive knowledge of third-party, supply chain, and cybersecurity risk to the market.
  • 284 Pages
  • Computers + Internet, Security

Description



Book Synopsis



Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These identities and accounts that have elevated access are the key targets of the bad actors and nearly every event, breach, or incident that occurs is the result of a privileged account being broken into.

Many organizations struggle to control these elevated accounts, what tools to pick, how to implement them correctly, and implement proper governance to ensure success in their zero trust strategy. This book defines a strategy for zero trust success that includes a privileged access strategy with key tactical decisions and actions to guarantee victory in the never-ending war against the bad actors.

What You Will Learn:

  • The foundations of Zero Trust security and Privileged Access Management.
  • Tie-ins to the ZT strategy and discussions about successful implementation with strategy and governance.
  • How to assess your security landscape including current state, risk-based gaps, tool and technology selection, and assessment output.
  • A step-by-step strategy for Implementation, including planning, execution, governance, and root-cause analysis.

Who This Book is for:

  • C-level suite: not designed to be overly technical, but cover material enough to allow this level to be conversant in strategy and leadership needs to success.
  • Director-level in Cyber and IT: this level of personnel are above the individual contributors (IC) and require the information in this book to translate the strategy goals set by C-suite and the tactics required for the ICs to implement and govern.
  • GRC leaders and staff.
  • Individual Contributors: while not designed to be a technical manual for engineering staff, it does provide a Rosetta Stone for themto understand how important strategy and governance are to their success.



About the Author



Gregory C. Rasner (CISSP, CIPM, ITIL, CCNA) is the founder and CEO of Third Party Threat Hunting LLC, bringing his unique and extensive knowledge of third-party, supply chain, and cybersecurity risk to the market. He is the author of the books "Cybersecurity & Third-Party Risk: Third-Party Threat Hunting" (Wiley, 2021) and "Zero Trust and Third-Party Risk" (Wiley, 2023), and the content creator of the training and certification program "Third-Party Cyber Risk Assessor (TPCRA)" (Third Party Risk Association, 2023). He frequently serves as a keynote speaker and panelist on topics related to cybersecurity and risk management, along with writing blogs, podcasts, and online articles. Greg was the SVP and Leader for Cyber Third-Party Risk at Truist Financial Corp., and he received his B.A. from Claremont McKenna College. He is also actively engaged in leadership roles with cybersecurity and third-party risk task forces, boards, and industry groups.

Maria C. Rasner (CISM, CCSK, CCZT, ITIL) has extensive experience in Identity and Access Management (IAM) and Privileged Access Management (PAM). She has run governance, operations, remediation, implementation, and large IAM and PAM programs at small to large enterprises. Her experience and certifications include cloud certifications in Microsoft and AWS and implementation of PIM in the cloud. Maria has published several articles in the ISSA online journal and Identity Defined Security Alliance. Maria is passionate about mentoring others and has been part of her organization's WIT (Women in IT) program to help empower women achieve their career goals in IT. Maria currently works for a large US bank as an IAM leader.

Dimensions (Overall): 9.21 Inches (H) x 6.14 Inches (W) x .63 Inches (D)
Weight: .94 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 284
Genre: Computers + Internet
Sub-Genre: Security
Publisher: Apress
Theme: General
Format: Paperback
Author: Gregory C Rasner & Maria C Rasner
Language: English
Street Date: July 15, 2025
TCIN: 1006000004
UPC: 9798868814303
Item Number (DPCI): 247-23-5541
Origin: Made in the USA or Imported

Shipping details

Estimated ship dimensions: 0.63 inches length x 6.14 inches width x 9.21 inches height
Estimated ship weight: 0.94 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
See the return policy for complete information.

Related Categories

Get top deals, latest trends, and more.

Privacy policy

Footer

About Us

About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

Help

Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member ServicesLegal & Privacy

Stores

Find a StoreClinicPharmacyTarget OpticalMore In-Store Services

Services

Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacy PolicyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy