Beat the rise! Delivery fees are going up soon.

Close Notification

Your cart does not contain any items

The NIST 2.0 Cybersecurity Framework

Practical Risk Management using Real-World Incidents

Cynthia Brumfield (DCT Associates)

$163.95

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
John Wiley & Sons Inc
21 April 2026
Learn to identify, protect, defend, and recover from cyber incidents

The NIST 2.0 Cybersecurity Framework delivers clear guidance on applying the gold standard NIST framework in complex, real-world situations. Drawing on her extensive cybersecurity research and reporting, author Cynthia Brumfield explains how to identify risks, defend against threats, and recover from incidents using compelling case studies.

The book examines high-profile incidents, including Microsoft’s Midnight Blizzard attack, the Ticketmaster data breach, and the Columbus ransomware incident, to illustrate NIST functions, and inform readers on how to create asset inventories, implement protective measures, detect suspicious activity, respond to incidents, and establish governance policies. Each chapter provides implementation examples, references, and demystification of NIST framework controls for securing assets and managing risks.

The book includes:

Real-world case studies from Microsoft, Ticketmaster, MGM Resorts and Caeser’s Entertainment, and other organizations that illustrate practical applications of the NIST framework Implementation guidance covering all six NIST functions: Identify, Protect, Detect, Respond, Recover, and Govern Chapter summaries and quizzes that reinforce learning objectives and help readers assess their understanding Clear and concise explanations of how to achieve the outcomes articulated across the NIST categories and subcategories

Whether you’re a student, organizational decision-maker, IT professional, public or private cybersecurity worker, or government contractor, this book provides the practical knowledge needed to implement the NIST 2.0 Framework effectively. You’ll learn from real-world failures and successes to build a robust cybersecurity program.
By:  
Imprint:   John Wiley & Sons Inc
Country of Publication:   United States
ISBN:   9781394352180
ISBN 10:   1394352182
Pages:   208
Publication Date:  
Audience:   College/higher education ,  Professional and scholarly ,  Primary ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active
Foreword xvii Acknowledgements xix 1 Overview of Risk Management and the NIST Cybersecurity Framework 1 1.1 Brief Overview of Risk Management Principles 1 1.2 Background on the NIST Cybersecurity Framework 3 2 NIST Function Identify 11 2.1 IDENTIFY (ID): The Organization's Current Cybersecurity Risks Are Understood 12 3 NIST Function Protect 43 3.1 Protect: Safeguards to Manage the Organization's Cybersecurity Risks Are Used 44 4 NIST Function Detect 81 4.1 DETECT: Possible Cybersecurity Attacks and Compromises Are Found and Analyzed 82 5 NIST Function Respond 99 5.1 RESPOND (RS): Actions Regarding a Detected Cybersecurity Incident Are Taken 100 6 NIST Function Recover 117 6.1 RECOVER (RC): Assets and Operations Affected by a Cybersecurity Incident Are Restored 118 7 NIST Function Govern 129 7.1 GOVERN (GV): The Organization's Cybersecurity Risk Management Strategy, Expectations, and Policy Are Established, Communicated, and Monitored 130 Appendix–Quiz Answer Key 171 Index 175

CYNTHIA BRUMFIELD is a veteran technology and communications industry writer, analyst, and publisher who now focuses exclusively on cybersecurity. She publishes a leading cybersecurity news destination, Metacurity.com, and is the author of Cybersecurity Risk Management. She has also written extensively for cybersecurity publications including CSO Online and Cyberscoop. Her work has won numerous AZBEE awards from the American Society of Business Publication Editors and The Folio: Eddie & Ozzie Awards.

See Also