NIST CSF 2.0 Your essential introduction to managing cybersecurity risks

A concise introduction to the NIST CSF 2.0 The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remai...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autor: Pattison, Andrew
Médium: E-kniha
Jazyk:angličtina
Vydáno: Ely IT Governance Publishing 27.02.2025
IT Governance Publishing Ltd
Témata:
ISBN:9781787785700, 178778570X, 9781787785694, 1787785696
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract A concise introduction to the NIST CSF 2.0 The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “ The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.” NIST 2.0 is an effective and flexible framework that is well-known across the US, and increasingly across the rest of the world. It also aligns closely with ISO 27001 and ISO 22301, and all three standards can operate concurrently. This book will help you understand how to: Begin implementing the NIST CSF 2.0 in your organization Build a cybersecurity program, adapt an existing one, or review existing security practices Integrate the NIST CSF 2.0 with other frameworks such as ISO 27001 and ISO 22301 Organizations that comply with the NIST CSF 2.0, ISO 27001, and ISO 22301 demonstrate their commitment to cybersecurity to current and prospective stakeholders.
AbstractList A concise introduction to the NIST CSF 2.0 The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remain up to date, Version 2.0 states that “ The CSF is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and nonprofit organizations, regardless of the maturity level of their cybersecurity programs.” NIST 2.0 is an effective and flexible framework that is well-known across the US, and increasingly across the rest of the world. It also aligns closely with ISO 27001 and ISO 22301, and all three standards can operate concurrently. This book will help you understand how to: Begin implementing the NIST CSF 2.0 in your organization Build a cybersecurity program, adapt an existing one, or review existing security practices Integrate the NIST CSF 2.0 with other frameworks such as ISO 27001 and ISO 22301 Organizations that comply with the NIST CSF 2.0, ISO 27001, and ISO 22301 demonstrate their commitment to cybersecurity to current and prospective stakeholders.
This is a practical and accessible guide to understanding the National Institute of Standards and Technology's updated Cybersecurity Framework. Whether you're part of a small business, enterprise, or public sector organization, this resource breaks down the core functions-Identify, Protect, Detect, Respond, and Recover-while highlighting new additions like Govern and expanded supply chain risk considerations.Perfect for IT professionals, risk managers, and decision-makers, this guide helps you align your cybersecurity strategy with industry best practices, manage risks effectively, and build organizational resilience in an ever-evolving threat landscape. It's your starting point for implementing a flexible, scalable, and outcomes-driven approach to cybersecurity.
Author ANDREW PATTISON
Author_xml – sequence: 1
  fullname: Pattison, Andrew
BookMark eNpVjzFPwzAQhY0ACWgzsqIuDAwptmP7ciOKWqhUwdAyW7ZroyYhqZIC6r_HEAZ6y927-_T07oqcNW3jCblmdEpj3SPkDHKAXCoUJyQ50qf_NVB6QZK-31oqo1JI5SUZPy9W60mxmk_4lI7JeTB175O_PiKv89m6eEqXL4-L4mGZGsYQZRpQbIRBm0tunUMIjgEE6RQPnknBVbDcSqEYj7vA0DlJA_iMWu9MgGxE7gbfL1Pvfbfxb93HIQ763XROH30Q2duBrZr209d6120jddC2bStd7X7ix_Q8cjcDV_b7tvs997osNZcCBSrIvgELDlNU
ContentType eBook
Copyright 2025 Andrew Pattison
2025
Copyright_xml – notice: 2025 Andrew Pattison
– notice: 2025
DOI 10.0000/9781787785694
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Law
Computer Science
EISBN 9781787785694
1787785696
9781787785700
178778570X
ExternalDocumentID 9781787785694
book_kpNISTCSF2
jj.25494967
GroupedDBID ALMA_UNASSIGNED_HOLDINGS
I4C
ID FETCH-LOGICAL-a11995-f94d4a9b852bcc97fc177f5c62fe15426fb2b546125c6f19cc50f7e30becaf73
IEDL.DBID K-E
ISBN 9781787785700
178778570X
9781787785694
1787785696
IngestDate Fri Nov 21 19:24:31 EST 2025
Mon Sep 15 19:02:14 EDT 2025
Thu Sep 25 05:22:19 EDT 2025
IsPeerReviewed false
IsScholarly false
Keywords Team Management
Cyber threat
Personal identifiable information
auditing
Cybersecurity Framework
cyber resilience
Workplace Culture
Business Continuity Management
National Institute of Standards and Technology
ISO 27002
CSF
ISO 27001
data protection
Senior Management
phishing
NIST 2.0
cyber security
data security
information security
Cybersecurity
Workplace
Cyber crime
PII
Project Management
NIST
cyber protection
Teamwork
ISO 22301
identity theft
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a11995-f94d4a9b852bcc97fc177f5c62fe15426fb2b546125c6f19cc50f7e30becaf73
PageCount 89
ParticipantIDs walterdegruyter_marc_9781787785694
knovel_primary_book_kpNISTCSF2
jstor_books_jj_25494967
PublicationCentury 2000
PublicationDate 20250227
2025
[2025]
PublicationDateYYYYMMDD 2025-02-27
2025-01-01
PublicationDate_xml – month: 02
  year: 2025
  text: 20250227
  day: 27
PublicationDecade 2020
PublicationPlace Ely
PublicationPlace_xml – name: Ely
PublicationYear 2025
Publisher IT Governance Publishing
IT Governance Publishing Ltd
Publisher_xml – name: IT Governance Publishing
– name: IT Governance Publishing Ltd
RestrictionsOnAccess restricted access
SSID ssib058576905
ssib058880268
ssib059260344
ssib060977901
ssib060476370
ssib060802626
Score 2.4530027
Snippet A concise introduction to the NIST CSF 2.0 The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF...
This is a practical and accessible guide to understanding the National Institute of Standards and Technology's updated Cybersecurity Framework. Whether you're...
SourceID walterdegruyter
knovel
jstor
SourceType Publisher
SubjectTerms auditing
Business Continuity Management
COM019000 COMPUTERS / System Administration / Disaster & Recovery
COM053000 COMPUTERS / Security / General
Computer Science
COMPUTERS / Security / Networking
Criminology & Criminal Justice
CSF
Cyber crime
cyber protection
cyber resilience
cyber security
Cyber threat
Cybersecurity
Cybersecurity Framework
data protection
data security
Frameworks
identity theft
information security
ISO 22301
ISO 27001
ISO 27002
Law
LAW / Communications
LAW / Computer & Internet
LAW / Criminal Law / General
National Institute of Standards and Technology
NIST
NIST 2.0
Personal identifiable information
phishing
PII
Project Management
Security Studies
Senior Management
Software Engineering
Team Management
Teamwork
Technology
Workplace
Workplace Culture
Subtitle Your essential introduction to managing cybersecurity risks
TableOfContents Front Matter ABOUT THE AUTHOR ACKNOWLEDGEMENTS Table of Contents INTRODUCTION CHAPTER 1:: AIMS OF THE FRAMEWORK CHAPTER 2:: FRAMEWORK CORE CHAPTER 3:: CSF IMPLEMENTATION RESOURCES CHAPTER 4:: CATEGORIES IN DETAIL CHAPTER 5:: RISK MANAGEMENT CHAPTER 6:: IMPLEMENTING THE FRAMEWORK CHAPTER 7:: ALIGNMENT WITH OTHER FRAMEWORKS GLOSSARY FURTHER READING
Title Page Table of Contents Introduction 1. Aims of the Framework 2. Framework Core 3. CSF Implementation Resources 4. Categories in Detail 5. Risk Management 6. Implementing the Framework 7. Alignment with other Frameworks Glossary
NIST CSF 2.0: Your essential introduction to managing cybersecurity risks
Title NIST CSF 2.0
URI https://www.jstor.org/stable/jj.25494967
https://app.knovel.com/hotlink/toc/id:kpNISTCSF2/nist-csf-2-0-your-essential/nist-csf-2-0-your-essential?kpromoter=Summon
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwxV1Lb9QwELb64AAHCuK10K4sxNWs4zh2zIXDalctjxWiBVVcItuxYbtVstqkRfvvGTsNUTnAkaMTJ5bGM55vbM83CL1KXWqlTxyRFoycK69JXkow95R7nnFPTdy6-PpBLhb5-bn6tIO2fS5MKG61quprdxmX6R91Gw4yJ21tJ8vyzWq9ODk9m57O2STwyhLbeMIIJVuQOwlc2xWYxeXf3r1dreM1N1CTbptpF-0D5GDBON6TWa-KAKIlxI3Z0AY9ZwMyzxTEAengGQXlYKiD6ouQwioGZCOoCsR-SUgtAxOReSY6VkGZ_27zjgI0eJDJref9VUlwkp1o7qH7P-Nheum-b662bX94G33i_OA_SvMB2nchSeMh2nHVI_QuDIBhBMxeU0wwrGAbPOu_xifhMn7ZseTitsZ9aSY83RoAvzcF_PDnZbNqHqMv89nZ9Jjc1IggOonZ5V7xkmtl8owZa5X0NpHSZ1Yw7wAeMuENMxkPQM4KnyhrM-qlSykor_YyfYL2qrpyzxDOjAE05ErFtObg3I0RSnmqS14qTTUfoadxGooQ_jTFxUURgmuuhByhcSflYt1RhMQuxSDfEXr5x4QVgamkuDXNz__1lxfoLgvVh-MG0CHaazdX7gjdsdftstmM0e7047dx1OJfBAsGsg
linkProvider Knovel
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=NIST+CSF+2.0&rft.au=Pattison%2C+Andrew&rft.date=2025-01-01&rft.pub=IT+Governance+Publishing+Ltd&rft.isbn=9781787785694&rft_id=info:doi/10.0000%2F9781787785694&rft.externalDBID=n%2Fa&rft.externalDocID=9781787785694
thumbnail_s http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fcontent.knovel.com%2Fcontent%2FThumbs%2Fthumb17079.gif