-

Free Resource from ISACA Shares Zero Trust Tactics for Strengthening Cyber Defenses

ISACA is also making additional complimentary security resources available in light of recent global volatility

SCHAUMBURG, Ill.--(BUSINESS WIRE)--Recent global events have underscored the heightened importance for enterprises to strengthen their efforts against cybersecurity threats. For those seeking to boost their defenses through a zero trust strategy, ISACA has released a new resource, Zero Trust: How to Beat Adversaries at Their Own Game, that provides a primer complete with tactics for thwarting hackers.

Zero Trust outlines the benefits of applying the zero trust principle and explores key considerations and components to include identity and access management, leveraging cloud technologies and device posture health checking.

The paper also walks through a brief history of exploitations and includes a listing of key compromises reported in the latter half of 2021 for context. Additionally, Zero Trust delves into the tactics that hackers commonly use—like account compromise, lateral movement and ransomware—and how enterprises can apply zero trust technologies to interrupt a hacker’s tactical life cycle, such as:

  • Extending the control plane outside the enterprise
  • Using virtualization as a defensive solution
  • Planning to fail effectively
  • Employing intelligence to monitor insider threat activities

“With the increase in remote working and use of personal devices for business purposes, converging with a complex threat landscape with sophisticated hackers, it is becoming even more important for enterprises to become more intentional in the strategy they employ to strengthen their defenses,” says Jonathan Brandt, ISACA director, professional practices and innovation. “Many enterprises find that adopting a zero trust approach backed by a solid strategy allows them to develop a more robust security posture which minimizes the impacts of incidents, while also identifying unnecessary or otherwise duplicative technologies which carries cost savings and simplifies security management.”

A complimentary copy of the white paper can be downloaded at https://store.isaca.org/s/#/store/browse/detail/a2S4w000005DtLZEA0.

In response to this period of heightened global volatility, ISACA has also made additional security-related resources available free of charge, including Implementing the NIST Cybersecurity Framework Using COBIT 2019, COBIT 2019: Information Security Focus Area and Cybersecurity Fundamentals Study Guide. For a full list of free materials available, read this ISACA Now blog post.

About ISACA

For more than 50 years, ISACA® (www.isaca.org) has equipped individuals with knowledge, credentials, education and community to progress their careers and transform their organizations, and enabled enterprises to train and build quality teams. A global professional association and learning organization, ISACA leverages the expertise of its more than 150,000 members who work in information security, governance, assurance, risk and privacy to drive innovation through technology. It has a presence in 188 countries, including more than 220 chapters worldwide. In 2020, ISACA launched One In Tech, a philanthropic foundation.

Contacts

Emily Van Camp, evcamp@isaca.org, +1.847.385.7223
Kristen Kessinger, communications@isaca.org, +1.847.660.5512

ISACA


Release Versions

Contacts

Emily Van Camp, evcamp@isaca.org, +1.847.385.7223
Kristen Kessinger, communications@isaca.org, +1.847.660.5512

More News From ISACA

ISACA, Nasscom Join Hands to Standardize Digital Skills for India’s Workforce

NEW DELHI--(BUSINESS WIRE)--ISACA, a global professional association and learning organization working in digital trust fields serving 185,000 members and operating in more than 190 countries, has exchanged an MoU with IT-ITeS SSC Nasscom, the national standard-setting body for IT skills for the alignment of its credentials to NSQF (National Skill Qualification Framework). Sector Skills Council Nasscom, set up under the aegis of National Skill Development Corporation (NSDC) and Ministry of Skil...

Four Ways to Incorporate AI into Threat Intelligence Programs

SCHAUMBURG, Ill.--(BUSINESS WIRE)--Threat environments have become more complex, especially with the rise of generative AI and the rapid commercialization of the cybercrime ecosystem. Enterprises have also long struggled to realize meaningful value from traditional cyberthreat intelligence programs. However, there are steps that cybersecurity professionals can take to improve the effectiveness of their threat intelligence programs, as outlined in ISACA’s new white paper, Building a Threat-Led C...

AI-Driven Cyber Threats Are the Biggest Concern for Cybersecurity Professionals Going Into 2026, Finds New ISACA Research

LONDON--(BUSINESS WIRE)--Over half (51%) of European IT and cybersecurity professionals fear AI-driven cyber threats and deepfakes will keep them up at night next year, according to new ISACA research. What’s driving this concern is a lack of preparedness for AI-related risks across the industry. Only 14% of respondents feel their organisation is very prepared to manage the risks associated with generative AI solutions in 2026. The majority (82%) feel they are only somewhat prepared, not very p...
Back to Newsroom