Muutke küpsiste eelistusi

NIST 2.0 Cybersecurity Framework: Practical Risk Management using Real-World Incidents [Kõva köide]

(DCT Associates)
  • Formaat: Hardback, 208 pages
  • Ilmumisaeg: 21-Apr-2026
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1394352182
  • ISBN-13: 9781394352180
Teised raamatud teemal:
  • Kõva köide
  • Hind: 81,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 108,30 €
  • Säästad 25%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 208 pages
  • Ilmumisaeg: 21-Apr-2026
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1394352182
  • ISBN-13: 9781394352180
Teised raamatud teemal:
Learn to identify, protect, defend, and recover from cyber incidents

The NIST 2.0 Cybersecurity Framework delivers clear guidance on applying the gold standard NIST framework in complex, real-world situations. Drawing on her extensive cybersecurity research and reporting, author Cynthia Brumfield explains how to identify risks, defend against threats, and recover from incidents using compelling case studies.

The book examines high-profile incidents, including Microsofts Midnight Blizzard attack, the Ticketmaster data breach, and the Columbus ransomware incident, to illustrate NIST functions, and inform readers on how to create asset inventories, implement protective measures, detect suspicious activity, respond to incidents, and establish governance policies. Each chapter provides implementation examples, references, and demystification of NIST framework controls for securing assets and managing risks.

The book includes:





Real-world case studies from Microsoft, Ticketmaster, MGM Resorts and Caesers Entertainment, and other organizations that illustrate practical applications of the NIST framework Implementation guidance covering all six NIST functions: Identify, Protect, Detect, Respond, Recover, and Govern Chapter summaries and quizzes that reinforce learning objectives and help readers assess their understanding Clear and concise explanations of how to achieve the outcomes articulated across the NIST categories and subcategories

Whether youre a student, organizational decision-maker, IT professional, public or private cybersecurity worker, or government contractor, this book provides the practical knowledge needed to implement the NIST 2.0 Framework effectively. Youll learn from real-world failures and successes to build a robust cybersecurity program.
Foreword xvii
Acknowledgements xix

1 Overview of Risk Management and the NIST Cybersecurity Framework 1
1.1 Brief Overview of Risk Management Principles 1
1.2 Background on the NIST Cybersecurity Framework 3

2 NIST Function Identify 11
2.1 IDENTIFY (ID): The Organization's Current Cybersecurity Risks Are
Understood 12

3 NIST Function Protect 43
3.1 Protect: Safeguards to Manage the Organization's Cybersecurity Risks Are
Used 44

4 NIST Function Detect 81
4.1 DETECT: Possible Cybersecurity Attacks and Compromises Are Found and
Analyzed 82

5 NIST Function Respond 99
5.1 RESPOND (RS): Actions Regarding a Detected Cybersecurity Incident Are
Taken 100

6 NIST Function Recover 117
6.1 RECOVER (RC): Assets and Operations Affected by a Cybersecurity Incident
Are Restored 118

7 NIST Function Govern 129
7.1 GOVERN (GV): The Organization's Cybersecurity Risk Management Strategy,
Expectations, and Policy Are Established, Communicated, and Monitored 130

AppendixQuiz Answer Key 171
Index 175
CYNTHIA BRUMFIELD is a veteran technology and communications industry writer, analyst, and publisher who now focuses exclusively on cybersecurity. She publishes a leading cybersecurity news destination, Metacurity.com, and is the author of Cybersecurity Risk Management. She has also written extensively for cybersecurity publications including CSO Online and Cyberscoop. Her work has won numerous AZBEE awards from the American Society of Business Publication Editors and The Folio: Eddie & Ozzie Awards.