Your path to zero trust : practical steps to achieve a continuous zero trust model
<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Your path to zero trust</title>
<subTitle> : practical steps to achieve a continuous zero trust model</subTitle>
</titleInfo>
<name type="personal" usage="primary" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20210002205">
<namePart>Izuakor, Christine </namePart>
<nameIdentifier>MAPA20210002205</nameIdentifier>
</name>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20210002212">
<namePart>Forcepoint</namePart>
<nameIdentifier>MAPA20210002212</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">usa</placeTerm>
</place>
<issuance>monographic</issuance>
<place>
<placeTerm type="text">Austin, TX</placeTerm>
</place>
<publisher>Forcepoint</publisher>
<dateIssued>2020</dateIssued>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
<extent>19 p.</extent>
</physicalDescription>
<abstract displayLabel="Summary">Zero Trust is more than a buzz phrase. It's a new paradigm way of implementing cybersecurity that has taken on new urgency as increasingly distributed organizations deal with a growing onslaught of complicated and sophisticated threats that result in data breaches. In a business world without perimeters, finding a balance between easy collaboration and data security can be challenging. The sudden increase in remote working has added layers of complexity, with users and data operating outside of traditional IT defenses that implicitly trust people who are inside of the network. </abstract>
<note type="statement of responsibility">Christine Izuakor</note>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080622251">
<topic>Seguridad de la información</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140022700">
<topic>Ciberseguridad</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080592875">
<topic>Protección de datos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080603731">
<topic>Seguridad informática</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140023066">
<topic>Ciberataques</topic>
</subject>
<classification authority="">86</classification>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">160505</recordCreationDate>
<recordChangeDate encoding="iso8601">20210208133646.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20210004087</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>