Unveiling the NIST Risk Management Framework (RMF): a practical guide to implementing RMF and managing risks in your organization
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham
Packt Publishing, Limited
2024
|
Ausgabe: | 1st edition |
Schlagwörter: | |
Links: | https://portal.igpublish.com/iglibrary/search/PACKT0007153.html https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31255744 https://portal.igpublish.com/iglibrary/search/PACKT0007153.html https://portal.igpublish.com/iglibrary/search/PACKT0007153.html https://portal.igpublish.com/iglibrary/search/PACKT0007153.html |
Umfang: | 1 Online-Ressource (240 Seiten) |
ISBN: | 9781805126126 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049876557 | ||
003 | DE-604 | ||
005 | 20250214 | ||
007 | cr|uuu---uuuuu | ||
008 | 240919s2024 xx o|||| 00||| eng d | ||
020 | |a 9781805126126 |9 978-1-80512-612-6 | ||
035 | |a (ZDB-30-PQE)EBC31255744 | ||
035 | |a (ZDB-30-PAD)EBC31255744 | ||
035 | |a (ZDB-89-EBL)EBL31255744 | ||
035 | |a (ZDB-221-PCR)9781805126126 | ||
035 | |a (OCoLC)1432598162 | ||
035 | |a (DE-599)BVBBV049876557 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s |a DE-706 |a DE-91 |a DE-573 | ||
082 | 0 | |a 658.478 | |
100 | 1 | |a Marsland, Thomas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Unveiling the NIST Risk Management Framework (RMF) |b a practical guide to implementing RMF and managing risks in your organization |
250 | |a 1st edition | ||
264 | 1 | |a Birmingham |b Packt Publishing, Limited |c 2024 | |
264 | 4 | |c © 2024 | |
300 | |a 1 Online-Ressource (240 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Information technology-Security measures | |
700 | 1 | |a Scott, Jaclyn |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Marsland, Thomas |t Unveiling the NIST Risk Management Framework (RMF) |d Birmingham : Packt Publishing, Limited,c2024 |z 9781835089842 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/search/PACKT0007153.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE | ||
912 | |a ZDB-221-PCR | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035216007 | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0007153.html |l DE-573 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31255744 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0007153.html |l DE-91 |p ZDB-221-PCR |q TUM_Paketkauf_2025 |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0007153.html |l DE-706 |p ZDB-221-PCR |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2840895 |
---|---|
_version_ | 1824079657008365569 |
adam_text | |
any_adam_object | |
author | Marsland, Thomas Scott, Jaclyn |
author_facet | Marsland, Thomas Scott, Jaclyn |
author_role | aut aut |
author_sort | Marsland, Thomas |
author_variant | t m tm j s js |
building | Verbundindex |
bvnumber | BV049876557 |
collection | ZDB-30-PQE ZDB-221-PCR |
contents | Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to the NIST Risk Management Framework -- Chapter 1: Understanding Cybersecurity and Risk Management -- Introduction to cybersecurity fundamentals -- The digital revolution -- Defining cybersecurity -- The cybersecurity imperative -- The journey begins -- Overview of risk management concepts -- The nature of risk -- The risk management process -- Risk management in cybersecurity -- NIST and risk management -- Identifying common cyber threats -- Types of cyber threats -- Recognizing the signs -- Recognizing vulnerabilities -- Common vulnerabilities -- Vulnerability scanning tools -- NIST frameworks - compare and contrast -- NIST CSF -- NIST RMF -- Comparison and contrast -- Summary -- Chapter 2: NIST Risk Management Framework Overview -- The history and evolution of the NIST RMF -- Precursors to the RMF -- The emergence of the NIST RMF -- Why it matters -- The key components and stages of the RMF -- The core components of the NIST RMF -- The stages of the NIST RMF -- Roles and responsibilities in the RMF -- Authorizing Official -- Chief Information Officer -- Chief Information Security Officer -- Information System Owner -- Security Control Assessor -- Security Officer -- Summary -- Chapter 3: Benefits of Implementing the NIST Risk Management Framework -- Advantages of adopting NIST RMF -- Structured approach to risk management -- Alignment with industry standards -- A holistic approach to risk management -- Efficiency through standardization -- Enhanced security posture -- Compliance and regulatory alignment -- Risk reduction and resilience -- Cost efficiency -- Informed decision-making -- Flexibility and adaptability -- Compliance and regulatory considerations -- A common compliance challenge -- The role of the NIST RMF. Holistic compliance alignment -- Specific regulatory considerations -- Compliance and the RMF life cycle -- Efficiency through RMF compliance -- Business continuity and risk reduction -- Risk reduction with the NIST RMF -- Business continuity and disaster recovery -- Business continuity as part of the RMF -- Summary -- Part 2: Implementing the NIST RMF in Your Organization -- Chapter 4: Preparing for RMF Implementation -- Building a security team -- Detailed roles and skills -- Forming and managing the team -- Enhancing team dynamics -- Continuous education and training -- Setting organizational goals -- Assessing organizational context for goal setting -- Crafting and aligning RMF goals with business objectives -- Developing, documenting, and communicating goals -- Reviewing and adapting goals -- Creating a risk management strategy -- Risk assessment foundations -- Risk response strategies -- Documentation and communication -- Implementing the framework -- Preparation phase -- Categorize phase -- Select phase -- Implement phase -- Assess phase -- Authorize phase -- Summary -- Chapter 5: The NIST RMF Life Cycle -- Step-by-step breakdown of the RMF stages -- Tailoring the RMF to your organization -- Understanding organizational context -- Customizing based on size and complexity -- Regular reviews and adaptation -- Stakeholder engagement and training -- Documentation and communication -- Case studies and examples -- Background and context -- Summary -- Chapter 6: Security Controls and Documentation -- Identifying and selecting security controls -- Understanding the types of security controls -- Categorization and its impact on control selection -- Selecting baseline controls -- Risk assessment in control selection -- Supplementing baseline controls -- Documenting control selection -- Case study - Applying control selection in a real-world scenario Developing documentation for compliance -- Identifying regulatory requirements -- Structuring compliance documentation -- Best practices in developing compliance documentation -- Automating control assessment -- Benefits of automating control assessments -- Starting with a clear strategy -- Choosing the right tools and technologies -- Integration with existing systems -- Developing automated assessment processes -- Training and skills development -- Testing and validation -- Continuous improvement and adaptation -- Documenting the automation process -- Addressing challenges and risks -- Case studies and examples -- Summary -- Chapter 7: Assessment and Authorization -- Conducting security assessments -- Understanding the scope of security assessments -- Selecting assessment methods -- Developing an assessment plan -- Reporting and analysis -- Recommending improvements -- Follow-up and review -- The risk assessment and authorization process -- Understanding the risk assessment in the RMF context -- Conducting the risk assessment -- Documenting and reporting risk assessment findings -- Risk mitigation strategy development -- System authorization process -- Continuous monitoring and authorization maintenance -- Preparing for security audits -- Understanding the purpose and importance of security audits -- Types of security audits -- Overview of common audit frameworks and standards -- Audit preparation strategies -- Conducting a pre-audit self-assessment -- Updating policies and procedures -- Enhancing security controls -- Data management and protection -- Stakeholder engagement and communication -- Logistics and operational readiness -- Post-audit activities -- Summary -- Part 3: Advanced Topics and Best Practices -- Chapter 8: Continuous Monitoring and Incident Response -- Implementing continuous monitoring -- Understanding continuous monitoring Establishing a continuous monitoring strategy -- Developing an IRP -- The purpose of an IRP -- Key elements of an IRP -- The value of an IRP -- Getting started -- Understanding the IR life cycle -- Forming your IRT -- IR communication plan -- Testing and updating the IRP -- Legal considerations and compliance -- Analyzing security incidents -- Assessment and decision-making processes -- Containment, eradication, and recovery strategies -- Post-incident analysis and review -- Utilizing forensic analysis -- Developing IoCs -- Summary -- Chapter 9: Cloud Security and the NIST RMF -- Adapting RMF for cloud environments -- Understanding cloud service models -- The shared responsibility model -- Integrating RMF steps in cloud environments -- Addressing cloud-specific risks -- Ensuring cloud compliance -- Understanding regulatory requirements -- The shared responsibility model and compliance -- Compliance in different cloud service models -- Data sovereignty and compliance -- Compliance audits and certifications -- Continuous compliance monitoring -- Managing compliance in multi-cloud environments -- Challenges and solutions -- Data security and privacy -- IAM -- Misconfiguration and insecure instances -- Compliance and legal issues -- Insider threats and advanced persistent threats -- Vendor lock-in and cloud service dependency -- Disaster recovery and business continuity -- Strengthening cloud security posture -- Summary -- Chapter 10: NIST RMF Case Studies and Future Trends -- Real-world case studies of successful RMF implementations -- Case study 1 - healthcare -- Case study 2 - industrial control systems/operational technology -- Case study 3 - financial sector -- Case study 4 - educational institution -- Emerging trends in cybersecurity and RMF -- The AI RMF - a response to emerging threats -- Preparing for the future of security operations Summary -- Chapter 11: A Look Ahead -- Key takeaways -- The ongoing importance of cybersecurity -- Encouragement for ongoing learning and improvement -- The NIST RMF as a lifelong tool -- The role of security leaders in cybersecurity excellence -- Summary -- Index -- Other Books You May Enjoy |
ctrlnum | (ZDB-30-PQE)EBC31255744 (ZDB-30-PAD)EBC31255744 (ZDB-89-EBL)EBL31255744 (ZDB-221-PCR)9781805126126 (OCoLC)1432598162 (DE-599)BVBBV049876557 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 1st edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049876557</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250214</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240919s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781805126126</subfield><subfield code="9">978-1-80512-612-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC31255744</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC31255744</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL31255744</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PCR)9781805126126</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1432598162</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049876557</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Marsland, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Unveiling the NIST Risk Management Framework (RMF)</subfield><subfield code="b">a practical guide to implementing RMF and managing risks in your organization</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing, Limited</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (240 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology-Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scott, Jaclyn</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Marsland, Thomas</subfield><subfield code="t">Unveiling the NIST Risk Management Framework (RMF)</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2024</subfield><subfield code="z">9781835089842</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0007153.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCR</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035216007</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0007153.html</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31255744</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0007153.html</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="q">TUM_Paketkauf_2025</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0007153.html</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049876557 |
illustrated | Not Illustrated |
indexdate | 2025-02-14T11:01:15Z |
institution | BVB |
isbn | 9781805126126 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035216007 |
oclc_num | 1432598162 |
open_access_boolean | |
owner | DE-2070s DE-706 DE-91 DE-BY-TUM DE-573 |
owner_facet | DE-2070s DE-706 DE-91 DE-BY-TUM DE-573 |
physical | 1 Online-Ressource (240 Seiten) |
psigel | ZDB-30-PQE ZDB-221-PCR ZDB-30-PQE HWR_PDA_PQE ZDB-221-PCR TUM_Paketkauf_2025 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing, Limited |
record_format | marc |
spellingShingle | Marsland, Thomas Scott, Jaclyn Unveiling the NIST Risk Management Framework (RMF) a practical guide to implementing RMF and managing risks in your organization Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to the NIST Risk Management Framework -- Chapter 1: Understanding Cybersecurity and Risk Management -- Introduction to cybersecurity fundamentals -- The digital revolution -- Defining cybersecurity -- The cybersecurity imperative -- The journey begins -- Overview of risk management concepts -- The nature of risk -- The risk management process -- Risk management in cybersecurity -- NIST and risk management -- Identifying common cyber threats -- Types of cyber threats -- Recognizing the signs -- Recognizing vulnerabilities -- Common vulnerabilities -- Vulnerability scanning tools -- NIST frameworks - compare and contrast -- NIST CSF -- NIST RMF -- Comparison and contrast -- Summary -- Chapter 2: NIST Risk Management Framework Overview -- The history and evolution of the NIST RMF -- Precursors to the RMF -- The emergence of the NIST RMF -- Why it matters -- The key components and stages of the RMF -- The core components of the NIST RMF -- The stages of the NIST RMF -- Roles and responsibilities in the RMF -- Authorizing Official -- Chief Information Officer -- Chief Information Security Officer -- Information System Owner -- Security Control Assessor -- Security Officer -- Summary -- Chapter 3: Benefits of Implementing the NIST Risk Management Framework -- Advantages of adopting NIST RMF -- Structured approach to risk management -- Alignment with industry standards -- A holistic approach to risk management -- Efficiency through standardization -- Enhanced security posture -- Compliance and regulatory alignment -- Risk reduction and resilience -- Cost efficiency -- Informed decision-making -- Flexibility and adaptability -- Compliance and regulatory considerations -- A common compliance challenge -- The role of the NIST RMF. Holistic compliance alignment -- Specific regulatory considerations -- Compliance and the RMF life cycle -- Efficiency through RMF compliance -- Business continuity and risk reduction -- Risk reduction with the NIST RMF -- Business continuity and disaster recovery -- Business continuity as part of the RMF -- Summary -- Part 2: Implementing the NIST RMF in Your Organization -- Chapter 4: Preparing for RMF Implementation -- Building a security team -- Detailed roles and skills -- Forming and managing the team -- Enhancing team dynamics -- Continuous education and training -- Setting organizational goals -- Assessing organizational context for goal setting -- Crafting and aligning RMF goals with business objectives -- Developing, documenting, and communicating goals -- Reviewing and adapting goals -- Creating a risk management strategy -- Risk assessment foundations -- Risk response strategies -- Documentation and communication -- Implementing the framework -- Preparation phase -- Categorize phase -- Select phase -- Implement phase -- Assess phase -- Authorize phase -- Summary -- Chapter 5: The NIST RMF Life Cycle -- Step-by-step breakdown of the RMF stages -- Tailoring the RMF to your organization -- Understanding organizational context -- Customizing based on size and complexity -- Regular reviews and adaptation -- Stakeholder engagement and training -- Documentation and communication -- Case studies and examples -- Background and context -- Summary -- Chapter 6: Security Controls and Documentation -- Identifying and selecting security controls -- Understanding the types of security controls -- Categorization and its impact on control selection -- Selecting baseline controls -- Risk assessment in control selection -- Supplementing baseline controls -- Documenting control selection -- Case study - Applying control selection in a real-world scenario Developing documentation for compliance -- Identifying regulatory requirements -- Structuring compliance documentation -- Best practices in developing compliance documentation -- Automating control assessment -- Benefits of automating control assessments -- Starting with a clear strategy -- Choosing the right tools and technologies -- Integration with existing systems -- Developing automated assessment processes -- Training and skills development -- Testing and validation -- Continuous improvement and adaptation -- Documenting the automation process -- Addressing challenges and risks -- Case studies and examples -- Summary -- Chapter 7: Assessment and Authorization -- Conducting security assessments -- Understanding the scope of security assessments -- Selecting assessment methods -- Developing an assessment plan -- Reporting and analysis -- Recommending improvements -- Follow-up and review -- The risk assessment and authorization process -- Understanding the risk assessment in the RMF context -- Conducting the risk assessment -- Documenting and reporting risk assessment findings -- Risk mitigation strategy development -- System authorization process -- Continuous monitoring and authorization maintenance -- Preparing for security audits -- Understanding the purpose and importance of security audits -- Types of security audits -- Overview of common audit frameworks and standards -- Audit preparation strategies -- Conducting a pre-audit self-assessment -- Updating policies and procedures -- Enhancing security controls -- Data management and protection -- Stakeholder engagement and communication -- Logistics and operational readiness -- Post-audit activities -- Summary -- Part 3: Advanced Topics and Best Practices -- Chapter 8: Continuous Monitoring and Incident Response -- Implementing continuous monitoring -- Understanding continuous monitoring Establishing a continuous monitoring strategy -- Developing an IRP -- The purpose of an IRP -- Key elements of an IRP -- The value of an IRP -- Getting started -- Understanding the IR life cycle -- Forming your IRT -- IR communication plan -- Testing and updating the IRP -- Legal considerations and compliance -- Analyzing security incidents -- Assessment and decision-making processes -- Containment, eradication, and recovery strategies -- Post-incident analysis and review -- Utilizing forensic analysis -- Developing IoCs -- Summary -- Chapter 9: Cloud Security and the NIST RMF -- Adapting RMF for cloud environments -- Understanding cloud service models -- The shared responsibility model -- Integrating RMF steps in cloud environments -- Addressing cloud-specific risks -- Ensuring cloud compliance -- Understanding regulatory requirements -- The shared responsibility model and compliance -- Compliance in different cloud service models -- Data sovereignty and compliance -- Compliance audits and certifications -- Continuous compliance monitoring -- Managing compliance in multi-cloud environments -- Challenges and solutions -- Data security and privacy -- IAM -- Misconfiguration and insecure instances -- Compliance and legal issues -- Insider threats and advanced persistent threats -- Vendor lock-in and cloud service dependency -- Disaster recovery and business continuity -- Strengthening cloud security posture -- Summary -- Chapter 10: NIST RMF Case Studies and Future Trends -- Real-world case studies of successful RMF implementations -- Case study 1 - healthcare -- Case study 2 - industrial control systems/operational technology -- Case study 3 - financial sector -- Case study 4 - educational institution -- Emerging trends in cybersecurity and RMF -- The AI RMF - a response to emerging threats -- Preparing for the future of security operations Summary -- Chapter 11: A Look Ahead -- Key takeaways -- The ongoing importance of cybersecurity -- Encouragement for ongoing learning and improvement -- The NIST RMF as a lifelong tool -- The role of security leaders in cybersecurity excellence -- Summary -- Index -- Other Books You May Enjoy Information technology-Security measures |
title | Unveiling the NIST Risk Management Framework (RMF) a practical guide to implementing RMF and managing risks in your organization |
title_auth | Unveiling the NIST Risk Management Framework (RMF) a practical guide to implementing RMF and managing risks in your organization |
title_exact_search | Unveiling the NIST Risk Management Framework (RMF) a practical guide to implementing RMF and managing risks in your organization |
title_full | Unveiling the NIST Risk Management Framework (RMF) a practical guide to implementing RMF and managing risks in your organization |
title_fullStr | Unveiling the NIST Risk Management Framework (RMF) a practical guide to implementing RMF and managing risks in your organization |
title_full_unstemmed | Unveiling the NIST Risk Management Framework (RMF) a practical guide to implementing RMF and managing risks in your organization |
title_short | Unveiling the NIST Risk Management Framework (RMF) |
title_sort | unveiling the nist risk management framework rmf a practical guide to implementing rmf and managing risks in your organization |
title_sub | a practical guide to implementing RMF and managing risks in your organization |
topic | Information technology-Security measures |
topic_facet | Information technology-Security measures |
url | https://portal.igpublish.com/iglibrary/search/PACKT0007153.html |
work_keys_str_mv | AT marslandthomas unveilingthenistriskmanagementframeworkrmfapracticalguidetoimplementingrmfandmanagingrisksinyourorganization AT scottjaclyn unveilingthenistriskmanagementframeworkrmfapracticalguidetoimplementingrmfandmanagingrisksinyourorganization |