My Account Log in

1 option

A Practitioner's Guide to Adapting the NIST Cybersecurity Framework.

EBSCOhost Academic eBook Collection (North America) Available online

View online
Format:
Book
Author/Creator:
Moskowitz, David.
DVMS Institute, author.
Contributor:
Nichols, David M.
Language:
English
Subjects (All):
National Institute of Standards and Technology (U.S.).
NIST Cybersecurity Framework.
Computer security.
Cyberterrorism--Prevention.
Cyberterrorism.
Physical Description:
1 online resource (188 pages)
Place of Publication:
London : The Stationery Office Ltd, 2022.
Summary:
The second publication in the Create, Protect, and Deliver Digital Business value series provides practitioners with detailed guidance on creating a NIST Cybersecurity Framework risk management program using NIST Special Publication 800-53, the DVMS Institute's CPD Model, and existing digital business systems.
Contents:
Intro
Copyright Page
Contents
Foreword
Preface
About the authors
Acknowledgments
1 The journey
1.1 Using the book
1.2 For NIST Cybersecurity Professional students
1.3 The rest of the story
2 Be the menace within - a proactive approach
2.1 Identify and prioritize business systems
2.2 Being the menace
2.3 Understanding strategy-risk
3 Systems: simple, complex, complicated, and resilient
3.1 Speaking in systems
3.2 Leverage, change, and adaptive resilience
3.3 Knowledge management and systems
3.4 Working at the edge of chaos
4 Cybersecurity and the Digital Value Management System™
4.1 Exploring the DVMS
4.2 A systems view of the CPD Model
5 Adapting the way we work
5.1 An adaptive way of working
5.2 A principled approach to creating, protecting, and delivering digital business value
5.3 Organizing to create, protect, and deliver (CPD) digital business value
5.4 The DVMS FastTrack approach
5.5 Agility and resilience (the CPD Model and cybersecurity)
6 Cybersecurity within a system
6.1 A systems approach to cybersecurity
6.2 Overview of the practice relationships within the DVMS
6.3 Applying the DVMS FastTrack approach
7 Digital business risk management
7.1 Mental models and perspectives
7.2 Z-X Model capabilities, practice areas, and practices
7.3 Cybersecurity and Z-X Model capabilities
7.4 Applied GQM and QO-QM: The role of performance measurement
8 The DVMS as a scalable overlay
8.1 Scalability? How?
8.2 Continual innovation
8.3 Digital business risk and resilience
Notes
Glossary
References.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
0-11-709396-3
OCLC:
1348490110

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account