|
|
|||
|
||||
OverviewLearn to identify, protect, defend, and recover from cyber incidents The NIST 2.0 Cybersecurity Framework delivers clear guidance on applying the gold standard NIST framework in complex, real-world situations. Drawing on her extensive cybersecurity research and reporting, author Cynthia Brumfield explains how to identify risks, defend against threats, and recover from incidents using compelling case studies. The book examines high-profile incidents, including Microsoft’s Midnight Blizzard attack, the Ticketmaster data breach, and the Columbus ransomware incident, to illustrate NIST functions, and inform readers on how to create asset inventories, implement protective measures, detect suspicious activity, respond to incidents, and establish governance policies. Each chapter provides implementation examples, references, and demystification of NIST framework controls for securing assets and managing risks. The book includes: Real-world case studies from Microsoft, Ticketmaster, MGM Resorts and Caeser’s Entertainment, and other organizations that illustrate practical applications of the NIST framework Implementation guidance covering all six NIST functions: Identify, Protect, Detect, Respond, Recover, and Govern Chapter summaries and quizzes that reinforce learning objectives and help readers assess their understanding Clear and concise explanations of how to achieve the outcomes articulated across the NIST categories and subcategories Whether you’re a student, organizational decision-maker, IT professional, public or private cybersecurity worker, or government contractor, this book provides the practical knowledge needed to implement the NIST 2.0 Framework effectively. You’ll learn from real-world failures and successes to build a robust cybersecurity program. Full Product DetailsAuthor: Cynthia Brumfield (DCT Associates)Publisher: John Wiley & Sons Inc Imprint: John Wiley & Sons Inc ISBN: 9781394352180ISBN 10: 1394352182 Pages: 208 Publication Date: 21 April 2026 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Awaiting stock The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you. Table of ContentsForeword xvii Acknowledgements xix 1 Overview of Risk Management and the NIST Cybersecurity Framework 1 1.1 Brief Overview of Risk Management Principles 1 1.2 Background on the NIST Cybersecurity Framework 3 2 NIST Function Identify 11 2.1 IDENTIFY (ID): The Organization's Current Cybersecurity Risks Are Understood 12 3 NIST Function Protect 43 3.1 Protect: Safeguards to Manage the Organization's Cybersecurity Risks Are Used 44 4 NIST Function Detect 81 4.1 DETECT: Possible Cybersecurity Attacks and Compromises Are Found and Analyzed 82 5 NIST Function Respond 99 5.1 RESPOND (RS): Actions Regarding a Detected Cybersecurity Incident Are Taken 100 6 NIST Function Recover 117 6.1 RECOVER (RC): Assets and Operations Affected by a Cybersecurity Incident Are Restored 118 7 NIST Function Govern 129 7.1 GOVERN (GV): The Organization's Cybersecurity Risk Management Strategy, Expectations, and Policy Are Established, Communicated, and Monitored 130 Appendix–Quiz Answer Key 171 Index 175ReviewsAuthor InformationCYNTHIA BRUMFIELD is a veteran technology and communications industry writer, analyst, and publisher who now focuses exclusively on cybersecurity. She publishes a leading cybersecurity news destination, Metacurity.com, and is the author of Cybersecurity Risk Management. She has also written extensively for cybersecurity publications including CSO Online and Cyberscoop. Her work has won numerous AZBEE awards from the American Society of Business Publication Editors and The Folio: Eddie & Ozzie Awards. Tab Content 6Author Website:Countries AvailableAll regions |
||||