Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Unveiling NIST Cybersecurity Framework 2.0
  • Table Of Contents Toc
Unveiling NIST Cybersecurity Framework 2.0

Unveiling NIST Cybersecurity Framework 2.0

By : Jason Brown
close
close
Unveiling NIST Cybersecurity Framework 2.0

Unveiling NIST Cybersecurity Framework 2.0

By: Jason Brown

Overview of this book

Discover what makes the NIST Cybersecurity Framework (CSF) pivotal for both public and private institutions seeking robust cybersecurity solutions with this comprehensive guide to implementing the CSF, updated to cover the latest release, version 2.0. This book will get you acquainted with the framework’s history, fundamentals, and functions, including governance, protection, detection, response, and recovery. You’ll also explore risk management processes, policy development, and the implementation of standards and procedures. Through detailed case studies and success stories, you’ll find out about all of the practical applications of the framework in various organizations and be guided through key topics such as supply chain risk management, continuous monitoring, incident response, and recovery planning. You’ll see how the NIST framework enables you to identify and reduce cyber risk by locating it and developing project plans to either mitigate, accept, transfer, or reject the risk. By the end of this book, you’ll have developed the skills needed to strengthen your organization’s cybersecurity defenses by measuring its cybersecurity program, building a strategic roadmap, and aligning the business with best practices.
Table of Contents (17 chapters)
close
close
Lock Free Chapter
1
Part 1:Why Select the NIST Cybersecurity Framework?
4
Part 2: NIST Cybersecurity Framework Functions
11
Part 3: Applying the Framework

Framework structure

There must be a structured format when creating policies; otherwise, how would you know what you are looking for? The structure does not have to be difficult to implement, nor are we implementing the Dewey Decimal System. However, there should be a method to your madness.

As we look at the overall structure of how the policies, standards, and procedures should be laid out, it is important to know what goes into the document too. Policies should be high-level documents stating the intent for a task, or its why. Standards are mid- to low-level documents stating the what. Procedures should state how something is to be configured. If our objective is to be high level, then what is the point of writing the document? Third-party assessors, or your strategic partners, may want to view what is in your policies. The intention is to have the ability to share information without the need for a Non-Disclosure Agreement (NDA). In fact, you should write your policies in such...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Unveiling NIST Cybersecurity Framework 2.0
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon