Cargando…

A Practitioner's Guide to Adapting the NIST Cybersecurity Framework

The second publication in the Create, Protect, and Deliver Digital Business value series provides practitioners with detailed guidance on creating a NIST Cybersecurity Framework risk management program using NIST Special Publication 800-53, the DVMS Institute's CPD Model, and existing digital b...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Moskowitz, David
Otros Autores: Nichols, David M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : The Stationery Office Ltd, 2022.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Intro
  • Copyright Page
  • Contents
  • Foreword
  • Preface
  • About the authors
  • Acknowledgments
  • 1 The journey
  • 1.1 Using the book
  • 1.2 For NIST Cybersecurity Professional students
  • 1.3 The rest of the story
  • 2 Be the menace within
  • a proactive approach
  • 2.1 Identify and prioritize business systems
  • 2.2 Being the menace
  • 2.3 Understanding strategy-risk
  • 3 Systems: simple, complex, complicated, and resilient
  • 3.1 Speaking in systems
  • 3.2 Leverage, change, and adaptive resilience
  • 3.3 Knowledge management and systems
  • 3.4 Working at the edge of chaos
  • 4 Cybersecurity and the Digital Value Management System™
  • 4.1 Exploring the DVMS
  • 4.2 A systems view of the CPD Model
  • 5 Adapting the way we work
  • 5.1 An adaptive way of working
  • 5.2 A principled approach to creating, protecting, and delivering digital business value
  • 5.3 Organizing to create, protect, and deliver (CPD) digital business value
  • 5.4 The DVMS FastTrack approach
  • 5.5 Agility and resilience (the CPD Model and cybersecurity)
  • 6 Cybersecurity within a system
  • 6.1 A systems approach to cybersecurity
  • 6.2 Overview of the practice relationships within the DVMS
  • 6.3 Applying the DVMS FastTrack approach
  • 7 Digital business risk management
  • 7.1 Mental models and perspectives
  • 7.2 Z-X Model capabilities, practice areas, and practices
  • 7.3 Cybersecurity and Z-X Model capabilities
  • 7.4 Applied GQM and QO-QM: The role of performance measurement
  • 8 The DVMS as a scalable overlay
  • 8.1 Scalability? How?
  • 8.2 Continual innovation
  • 8.3 Digital business risk and resilience
  • Notes
  • Glossary
  • References