NIST CSF 2.0 Your essential introduction to managing cybersecurity risks
A concise introduction to the NIST CSF 2.0 The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organize their critical activities and ensure they remai...
Uloženo v:
| Hlavní autor: | |
|---|---|
| Médium: | E-kniha |
| Jazyk: | angličtina |
| Vydáno: |
Ely
IT Governance Publishing
27.02.2025
IT Governance Publishing Ltd |
| Témata: | |
| ISBN: | 9781787785700, 178778570X, 9781787785694, 1787785696 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | A concise introduction to the NIST CSF 2.0
The NIST CSF (Cybersecurity Framework) 2.0 is designed to
protect organizations from cyber attacks. Although the CSF was
developed to help US organizations involved in infrastructure to
systematically organize their critical activities and ensure they
remain up to date, Version 2.0 states that “
The CSF is designed to be used by organizations of all sizes
and sectors, including industry, government, academia, and
nonprofit organizations, regardless of the maturity level of
their cybersecurity programs.” NIST 2.0 is an
effective and flexible framework that is well-known across the
US, and increasingly across the rest of the world. It also aligns
closely with ISO 27001 and ISO 22301, and all three standards can
operate concurrently.
This book will help you understand how to:
Begin implementing the NIST CSF 2.0 in your
organization
Build a cybersecurity program, adapt an existing one, or
review existing security practices
Integrate the NIST CSF 2.0 with other frameworks such as
ISO 27001 and ISO 22301
Organizations that comply with the NIST CSF 2.0, ISO 27001,
and ISO 22301 demonstrate their commitment to cybersecurity to
current and prospective stakeholders. |
|---|---|
| AbstractList | A concise introduction to the NIST CSF 2.0
The NIST CSF (Cybersecurity Framework) 2.0 is designed to
protect organizations from cyber attacks. Although the CSF was
developed to help US organizations involved in infrastructure to
systematically organize their critical activities and ensure they
remain up to date, Version 2.0 states that “
The CSF is designed to be used by organizations of all sizes
and sectors, including industry, government, academia, and
nonprofit organizations, regardless of the maturity level of
their cybersecurity programs.” NIST 2.0 is an
effective and flexible framework that is well-known across the
US, and increasingly across the rest of the world. It also aligns
closely with ISO 27001 and ISO 22301, and all three standards can
operate concurrently.
This book will help you understand how to:
Begin implementing the NIST CSF 2.0 in your
organization
Build a cybersecurity program, adapt an existing one, or
review existing security practices
Integrate the NIST CSF 2.0 with other frameworks such as
ISO 27001 and ISO 22301
Organizations that comply with the NIST CSF 2.0, ISO 27001,
and ISO 22301 demonstrate their commitment to cybersecurity to
current and prospective stakeholders. This is a practical and accessible guide to understanding the National Institute of Standards and Technology's updated Cybersecurity Framework. Whether you're part of a small business, enterprise, or public sector organization, this resource breaks down the core functions-Identify, Protect, Detect, Respond, and Recover-while highlighting new additions like Govern and expanded supply chain risk considerations.Perfect for IT professionals, risk managers, and decision-makers, this guide helps you align your cybersecurity strategy with industry best practices, manage risks effectively, and build organizational resilience in an ever-evolving threat landscape. It's your starting point for implementing a flexible, scalable, and outcomes-driven approach to cybersecurity. |
| Author | ANDREW PATTISON |
| Author_xml | – sequence: 1 fullname: Pattison, Andrew |
| BookMark | eNpVjzFPwzAQhY0ACWgzsqIuDAwptmP7ciOKWqhUwdAyW7ZroyYhqZIC6r_HEAZ6y927-_T07oqcNW3jCblmdEpj3SPkDHKAXCoUJyQ50qf_NVB6QZK-31oqo1JI5SUZPy9W60mxmk_4lI7JeTB175O_PiKv89m6eEqXL4-L4mGZGsYQZRpQbIRBm0tunUMIjgEE6RQPnknBVbDcSqEYj7vA0DlJA_iMWu9MgGxE7gbfL1Pvfbfxb93HIQ763XROH30Q2duBrZr209d6120jddC2bStd7X7ix_Q8cjcDV_b7tvs997osNZcCBSrIvgELDlNU |
| ContentType | eBook |
| Copyright | 2025 Andrew Pattison 2025 |
| Copyright_xml | – notice: 2025 Andrew Pattison – notice: 2025 |
| DOI | 10.0000/9781787785694 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Law Computer Science |
| EISBN | 9781787785694 1787785696 9781787785700 178778570X |
| ExternalDocumentID | 9781787785694 book_kpNISTCSF2 jj.25494967 |
| GroupedDBID | ALMA_UNASSIGNED_HOLDINGS I4C |
| ID | FETCH-LOGICAL-a11995-f94d4a9b852bcc97fc177f5c62fe15426fb2b546125c6f19cc50f7e30becaf73 |
| IEDL.DBID | K-E |
| ISBN | 9781787785700 178778570X 9781787785694 1787785696 |
| IngestDate | Fri Nov 21 19:24:31 EST 2025 Mon Sep 15 19:02:14 EDT 2025 Thu Sep 25 05:22:19 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Keywords | Team Management Cyber threat Personal identifiable information auditing Cybersecurity Framework cyber resilience Workplace Culture Business Continuity Management National Institute of Standards and Technology ISO 27002 CSF ISO 27001 data protection Senior Management phishing NIST 2.0 cyber security data security information security Cybersecurity Workplace Cyber crime PII Project Management NIST cyber protection Teamwork ISO 22301 identity theft |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a11995-f94d4a9b852bcc97fc177f5c62fe15426fb2b546125c6f19cc50f7e30becaf73 |
| PageCount | 89 |
| ParticipantIDs | walterdegruyter_marc_9781787785694 knovel_primary_book_kpNISTCSF2 jstor_books_jj_25494967 |
| PublicationCentury | 2000 |
| PublicationDate | 20250227 2025 [2025] |
| PublicationDateYYYYMMDD | 2025-02-27 2025-01-01 |
| PublicationDate_xml | – month: 02 year: 2025 text: 20250227 day: 27 |
| PublicationDecade | 2020 |
| PublicationPlace | Ely |
| PublicationPlace_xml | – name: Ely |
| PublicationYear | 2025 |
| Publisher | IT Governance Publishing IT Governance Publishing Ltd |
| Publisher_xml | – name: IT Governance Publishing – name: IT Governance Publishing Ltd |
| RestrictionsOnAccess | restricted access |
| SSID | ssib058576905 ssib058880268 ssib059260344 ssib060977901 ssib060476370 ssib060802626 |
| Score | 2.4530027 |
| Snippet | A concise introduction to the NIST CSF 2.0
The NIST CSF (Cybersecurity Framework) 2.0 is designed to
protect organizations from cyber attacks. Although the CSF... This is a practical and accessible guide to understanding the National Institute of Standards and Technology's updated Cybersecurity Framework. Whether you're... |
| SourceID | walterdegruyter knovel jstor |
| SourceType | Publisher |
| SubjectTerms | auditing Business Continuity Management COM019000 COMPUTERS / System Administration / Disaster & Recovery COM053000 COMPUTERS / Security / General Computer Science COMPUTERS / Security / Networking Criminology & Criminal Justice CSF Cyber crime cyber protection cyber resilience cyber security Cyber threat Cybersecurity Cybersecurity Framework data protection data security Frameworks identity theft information security ISO 22301 ISO 27001 ISO 27002 Law LAW / Communications LAW / Computer & Internet LAW / Criminal Law / General National Institute of Standards and Technology NIST NIST 2.0 Personal identifiable information phishing PII Project Management Security Studies Senior Management Software Engineering Team Management Teamwork Technology Workplace Workplace Culture |
| Subtitle | Your essential introduction to managing cybersecurity risks |
| TableOfContents | Front Matter
ABOUT THE AUTHOR
ACKNOWLEDGEMENTS
Table of Contents
INTRODUCTION
CHAPTER 1:: AIMS OF THE FRAMEWORK
CHAPTER 2:: FRAMEWORK CORE
CHAPTER 3:: CSF IMPLEMENTATION RESOURCES
CHAPTER 4:: CATEGORIES IN DETAIL
CHAPTER 5:: RISK MANAGEMENT
CHAPTER 6:: IMPLEMENTING THE FRAMEWORK
CHAPTER 7:: ALIGNMENT WITH OTHER FRAMEWORKS
GLOSSARY
FURTHER READING Title Page Table of Contents Introduction 1. Aims of the Framework 2. Framework Core 3. CSF Implementation Resources 4. Categories in Detail 5. Risk Management 6. Implementing the Framework 7. Alignment with other Frameworks Glossary NIST CSF 2.0: Your essential introduction to managing cybersecurity risks |
| Title | NIST CSF 2.0 |
| URI | https://www.jstor.org/stable/jj.25494967 https://app.knovel.com/hotlink/toc/id:kpNISTCSF2/nist-csf-2-0-your-essential/nist-csf-2-0-your-essential?kpromoter=Summon |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwxV1Lb9QwELb64AAHCuK10K4sxNWs4zh2zIXDalctjxWiBVVcItuxYbtVstqkRfvvGTsNUTnAkaMTJ5bGM55vbM83CL1KXWqlTxyRFoycK69JXkow95R7nnFPTdy6-PpBLhb5-bn6tIO2fS5MKG61quprdxmX6R91Gw4yJ21tJ8vyzWq9ODk9m57O2STwyhLbeMIIJVuQOwlc2xWYxeXf3r1dreM1N1CTbptpF-0D5GDBON6TWa-KAKIlxI3Z0AY9ZwMyzxTEAengGQXlYKiD6ouQwioGZCOoCsR-SUgtAxOReSY6VkGZ_27zjgI0eJDJref9VUlwkp1o7qH7P-Nheum-b662bX94G33i_OA_SvMB2nchSeMh2nHVI_QuDIBhBMxeU0wwrGAbPOu_xifhMn7ZseTitsZ9aSY83RoAvzcF_PDnZbNqHqMv89nZ9Jjc1IggOonZ5V7xkmtl8owZa5X0NpHSZ1Yw7wAeMuENMxkPQM4KnyhrM-qlSykor_YyfYL2qrpyzxDOjAE05ErFtObg3I0RSnmqS14qTTUfoadxGooQ_jTFxUURgmuuhByhcSflYt1RhMQuxSDfEXr5x4QVgamkuDXNz__1lxfoLgvVh-MG0CHaazdX7gjdsdftstmM0e7047dx1OJfBAsGsg |
| linkProvider | Knovel |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=NIST+CSF+2.0&rft.au=Pattison%2C+Andrew&rft.date=2025-01-01&rft.pub=IT+Governance+Publishing+Ltd&rft.isbn=9781787785694&rft_id=info:doi/10.0000%2F9781787785694&rft.externalDBID=n%2Fa&rft.externalDocID=9781787785694 |
| thumbnail_s | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fcontent.knovel.com%2Fcontent%2FThumbs%2Fthumb17079.gif |

