NIST Cybersecurity Framework  
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781787780422
Pages: 0

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781787780422 Price: INR 1044.75
Add to cart Buy Now
Subject(s): Contents
This pocket guide serves as an introduction to the National Institute of Standards and Technology (NIST) and to its Cybersecurity Framework (CSF). Now more than ever, organizations need to have a strong and flexible cybersecurity strategy in place in order to both protect themselves and be able to continue business in the event of a successful attack.   The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices. With this pocket guide you can: Adapt the CSF for organizations of any size to implement Establish an entirely new cybersecurity program, improve an existing one, or simply provide an opportunity to review your cybersecurity practices Break down the CSF and understand how other frameworks, such as ISO 27001 and ISO 22301, can integrate into your cybersecurity framework By implementing the CSF in accordance with their needs, organizations can manage cybersecurity risks in the most cost-effective way possible, maximizing the return on investment in the organization’s security. This pocket guide also aims to help you take a structured, sensible, risk-based approach to cybersecurity.
Rating
Description
Subject(s): Contents
This pocket guide serves as an introduction to the National Institute of Standards and Technology (NIST) and to its Cybersecurity Framework (CSF). Now more than ever, organizations need to have a strong and flexible cybersecurity strategy in place in order to both protect themselves and be able to continue business in the event of a successful attack.   The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices. With this pocket guide you can: Adapt the CSF for organizations of any size to implement Establish an entirely new cybersecurity program, improve an existing one, or simply provide an opportunity to review your cybersecurity practices Break down the CSF and understand how other frameworks, such as ISO 27001 and ISO 22301, can integrate into your cybersecurity framework By implementing the CSF in accordance with their needs, organizations can manage cybersecurity risks in the most cost-effective way possible, maximizing the return on investment in the organization’s security. This pocket guide also aims to help you take a structured, sensible, risk-based approach to cybersecurity.
Table of contents
  • Cover
  • Title
  • Copyright
  • About the Author
  • Contents
  • Introduction
    • The growing digital ecosystem
    • Federal responses
    • Past cyber incidents
    • The NIST Cybersecurity Framework
  • Chapter 1: Aims of the Framework
    • Relevant factors and variables
    • Implementation benefits
    • Structure
  • Chapter 2: Framework core
    • Functions
      • Identify
      • Protect, detect, and respond
      • Recover
    • Categories
    • Subcategories
    • Informative references
      • ISO 27001
      • COBIT
      • NIST SP 800-53
      • ISA 62443
      • CIS CSC
    • How the core elements interact
    • Implementation – risk management
      • Methodologies
      • Risk responses
      • NIST’s Risk Management Framework
  • Chapter 3: Framework profiles
    • Current profile
    • Target profile
    • How the two profiles interact
  • Chapter 4: Framework implementation tiers
    • How to view the tiers
    • Risk management aspects
      • Risk management processes
      • Integrated risk management program
      • External participation
    • Tier 1: Partial
    • Tier 2: Risk-informed
    • Tier 3: Repeatable
    • Tier 4: Adaptive
    • How the tiers, profiles, and core interact
  • Chapter 5: Implementing the Framework
    • Step 1: Determine objectives, priorities, and scope
    • Step 2: Identify assets and risks
    • Step 3: Create a current profile
    • Step 4: Conduct a risk assessment
    • Step 5: Create a target profile
    • Step 6: Perform a gap analysis
    • Step 7: Implement the action plan
    • Continual improvement
    • Decision-making and implementation responsibilities
  • Chapter 6: Alignment with other frameworks
    • ISO 27001
    • ISO 22301
    • Combining ISO 27001 and ISO 22301
  • Appendix: Key changes from Version 1.0 to 1.1
  • Glossary
  • Further reading
User Reviews
Rating