The Institute’s publications provide the guidance necessary for organizations to build a digital value management system capable of delivering the secure and resilient outcomes expected by executives, government regulators, and operational stakeholders
The Fundamentals of Adopting the NIST Cybersecurity Framework is the first book from the Institute’s, Create, Protect, and Deliver (CPD) digital business value series. It takes business leaders and stakeholders on a journey into the world where the ever-changing cyber threat landscape intersects with digital business risk.
The publication also introduces the Create, Protect, and Deliver (CPD) Model – a dynamic model of systems – to explain how any business value that is created must be protected at a level that is proportionate to its value to the organization.The key takeaway is a paradigm shift in how business leaders and cybersecurity professionals think about cybersecurity and its relationship to digital business value.
The content of this book provides those responsible for protecting an organization’s digital business value with a new way to communicate to C-Level executives about the business value a NIST-based cybersecurity program brings to existing digital business applications and employee productivity programs.
Key concepts covered include:
A Practitioners Guide To Adapting the NIST Cybersecurity Framework, is the second book from the Institute’s, Create, Protect, and Deliver (CPD) digital business value series.
This publication provides practitioners with detailed guidance on creating a NIST Cybersecurity Framework risk management program using NIST Special Publication 800-53, the DVMS Institute’s CPD Model, and existing digital business systems. The outcome is a cyber risk management program and culture fit for use, auditable for purpose, and aligned with global cybersecurity frameworks, standards, and regulations.
The key takeaway from this book is that securing digital business value is something every employee is responsible for doing every day. Cybersecurity is an intrinsic aspect of securing that value and must be factored into an organization’s digital strategy and culture.
Key concepts covered include:
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |