IT Cyber Security NIST Risk Management Framework: Implementing NIST SP 800-37R2 Risk Management Framework (RMF) and NIST SP 800-53R5 Security and Privacy Controls
Format:
Paperback
En stock
0.29 kg
Sí
Nuevo
Amazon
USA
- Effective risk management is at the heart of good cybersecurity practice. Adopting a risk-based approach allows managers to assess the relative strengths and weaknesses of different security decisions within the context of a complex operational environment. The primary purpose of risk management is to ensure a disciplined and systematic response to the risks that the organization considers a critical priority. This book is an in-depth look at implementing the NIST RMF process with selecting adequate NIST security controls. It shows you how to leverage each of these steps with examples you can use to secure your organization, no matter its size, structure, or sector. If your job requires you to manage cyber security risks in the high-stakes world of enterprise IT, this book is for you. You'll examine risks, threats, opportunities, and vulnerabilities at the strategic and operational levels. This includes Cybersecurity IT value generation for the business, and the IT NIST Risk Management Framework (RMF).You'll also explore risk appetite, risk tolerance, and mitigation strategies, selecting, implementing, tailoring, assessing, and monitoring NIST security controls. The bookcase study will highlight issues related to legal and regulatory compliance and stakeholder communication.By the end of this book, you will be able to:Understand the seven-step NIST Risk management and complianceApply appropriate risk-management techniques and models including risk scenarios.Conduct risk analysis and assessmentAlign cyber security and enterprise risk management.Manage and monitor the status of NIST risk-management strategies and plans.Provide oversight of related legal and regulatory compliance such as HIPPA and credit card regulation PCI DSSDesign and use effective techniques to communicate cybersecurity risks to stakeholders in a clear mannerSelect and tailor the proper NIST security and privacy controlsUnderstand the difference between IT audit and assessment.Track risks and create cyber security performance indicators The book will provide you with a foundational understanding of risk and how to identify, assess, and mitigate risk. You will become familiar with the concepts, tools, and techniques used to develop a risk management process. You will also learn how to use these tools and techniques to effectively manage risk using the NIST seven-step approach along with security and privacy controls.
IMPORT EASILY
By purchasing this product you can deduct VAT with your RUT number