Fundamentals of Adopting the NIST Cybersecurity Framework

The first publication in the Create, Protect, and Deliver Digital Business value series sets out how the ever-changing threat landscape intersects with digital business risk. It introduces the Create, Protect, and Deliver (CPD) Model - a dynamic model of systems - to explain how any business value t...

Descripción completa

Detalles Bibliográficos
Autor principal: Moskowitz, David (-)
Autor Corporativo: DVMS Institute, author (author)
Otros Autores: Nichols, David M., author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: London : The Stationery Office Ltd 2022.
Edición:Second edition
Colección:Create, protect, and deliver digital business value series ; v. 1.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009757132306719
Tabla de Contenidos:
  • Intro
  • Copyright Page
  • Contents
  • Foreword
  • Preface
  • About the authors
  • Acknowledgments
  • Chapter 1: Looking through the wrong end of the telescope
  • 1.1: For NIST Cybersecurity Professional (NCSP) students
  • 1.2: Using the book
  • 1.3: The rest of the story
  • Chapter 2: A clear and present danger
  • 2.1: Digital evolution and the expanding attack surface
  • 2.2: Evolving threat landscape
  • 2.3: Lessons learned
  • Chapter 3: Cybersecurity and business risk
  • 3.1: Understanding enterprise risk management
  • 3.2: ERM is an essential precursor to the adoption of the NIST-CSF
  • 3.3: Introducing the CPD Model
  • Chapter 4: Introduction to the NIST-CSF
  • 4.1: Framework Core
  • 4.2: Implementation Tiers
  • 4.3: Framework Profiles
  • 4.4: Create or improve a cybersecurity program
  • Chapter 5: Introduction to NIST-CSF and the CPD Model
  • 5.1: The "first principles" of the CPD Model
  • 5.2: NIST-CSF and the CPD Model
  • 5.3: Cybersecurity and the CPD Model
  • Chapter 6: Beyond the Framework?
  • 6.1: Before adopting the NIST-CSF
  • 6.2: Getting ready to get ready
  • 6.3: What do you do with what you know now?
  • 6.4: What does "adoption" of the NIST-CSF look like?
  • Glossary
  • References.