|
|
|||
|
||||
OverviewGain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risks Key Features Implement NIST RMF with step-by-step instructions for effective security operations Draw insights from case studies illustrating the application of RMF principles in diverse organizational environments Discover expert tips for fostering a strong security culture and collaboration between security teams and the business Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionOvercome the complexities of the NIST Risk Management Framework (RMF) with this comprehensive and practical resource. Offering invaluable insights, this guide equips individuals and organizations with the understanding and tools necessary to implement the framework and safeguard against cyber threats. Complete with clear explanations, best practices, and real-world examples, this book guides you through the RMF process, covering its history, components, and stages. You’ll then delve into the RMF approach—prepare, categorize, select, implement, assess, authorize, and monitor—and deepen your understanding as you explore real-world case studies. The book also focuses on cultivating practical skills for implementing the RMF in your organization, covering essential tasks such as forming a security team, conducting security assessments, and preparing for audits. What’s more? You’ll learn how to establish continuous monitoring processes, develop robust incident response plans, and analyze security incidents efficiently. By the end of this risk management book, you’ll have gained the practical skills and confidence to systematically manage and mitigate cybersecurity risks within your organization.What you will learn Understand how to tailor the NIST Risk Management Framework to your organization's needs Come to grips with security controls and assessment procedures to maintain a robust security posture Explore cloud security with real-world examples to enhance detection and response capabilities Master compliance requirements and best practices with relevant regulations and industry standards Explore risk management strategies to prioritize security investments and resource allocation Develop robust incident response plans and analyze security incidents efficiently Who this book is forThis book is for cybersecurity professionals, IT managers and executives, risk managers, and policymakers. Government officials in federal agencies, where adherence to NIST RMF is crucial, will find this resource especially useful for implementing and managing cybersecurity risks. A basic understanding of cybersecurity principles, especially risk management, and awareness of IT and network infrastructure is assumed. Full Product DetailsAuthor: Thomas Marsland , Jaclyn “Jax” ScottPublisher: Packt Publishing Limited Imprint: Packt Publishing Limited ISBN: 9781835089842ISBN 10: 1835089844 Pages: 240 Publication Date: 30 April 2024 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of ContentsReviewsAuthor Information"Thomas Marsland is a cybersecurity leader with a focus on designing systems and processes that embrace security at their foundations, while protecting scalability and minimizing technical debt. He enjoys working on problems in operations and technology, delivering value to organizations with a mission-focused mindset. A 22-year veteran of the United States Navy, his work history includes nuclear power, IT, cybersecurity, and executive leadership in the cybersecurity and technology fields, including for the US Navy and Cloud Range. In his spare time, he leads VetSec, a 501c3 with the mission to help veterans find cybersecurity careers. Originally from Port Ludlow, WA, Tom currently resides in Ravensdale, WA with his wife and children. Jaclyn ""Jax"" Scott is a tenured Special Operations Warrant Officer with nearly 18 years of experience working in military cyber, electronic warfare, and intelligence operations. She is the founder and content creator of Beans and Bytes tech blog, co-host of the cybersecurity podcast Hackerz and Haecksen, and the president of Outpost Gray, a cybersecurity consulting firm. Jax is an expert in military cyber policy and has led global development operations in cyber countermeasures to mitigate near-peer attacks. She is currently pursuing her master's in Cyber Intelligence at Georgetown University." Tab Content 6Author Website:Countries AvailableAll regions |