Implement Version 2 Of Nist Cybersecurity Framework
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.79 GB | Duration: 2h 43m
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.79 GB | Duration: 2h 43m
Designed for hands-on practitioners who really want to know how the NIST Cybersecurity Framework works!
What you'll learn
Understand the foundations of the NIST Cybersecurity Framework
Be able to use the Framework Core
Be able to use the Framework Tiers
Be able to use the Framework Implementation Profile
Requirements
No special tools are required, just a willingness to learn about using the NIST Cybersecurity Framework
Description
The NIST Cybersecurity Framework isn't just another dusty document. It's a practical tool that can help protect your organization. But many people tell me they're confused about how to actually use it.We've been implementing the Framework with paying customers for over 8 years, so I've seen lots of confusion.In this course, I'm going to demystify the Framework, show you how to implement it, and give you a straight-forward method along with a free tool for automating the workflow and reporting.You'll start by learning the basics of the NIST Cybersecurity Framework, like who made it and who can use it.Then, you'll dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Implementation Profiles.You'll also review case studies from diverse organizations across the globe, including a critical infrastructure organization, a large global business, and others.Finally, we'll spend most of our time learning how to implement the framework within your own organization by making a Cyber Risk Management Action Plan (CR-MAP). This CR-MAP of your organization will discover your time five cyber risks and help you to create a mitigation plan to reduce your cyber risk and make your organization more cyber resilient. You'll also get a free bonus digital workbook that helps you conduct a CR-MAP step-by-step.Remember: Cyber criminals don't care how big or small your organization is. They only care if you're an easy target.The Framework helps make you a harder target. Let's get going!
Overview
Section 1: Introduction to the NIST Cyber Security Framework
Lecture 1 Introduction
Lecture 2 Business Value of Framework
Lecture 3 Who Can Use The Framework?
Lecture 4 Understanding the Core
Lecture 5 Understanding the Tiers
Lecture 6 Understanding the Profiles
Lecture 7 Understanding the Online Resources
Section 2: Understanding the NIST Cybersecurity Framework
Lecture 8 Chapter Introduction
Lecture 9 Govern Function and Activities
Lecture 10 Identify Function and Activities
Lecture 11 Protect Function and Activities
Lecture 12 Detect Function and Activities
Lecture 13 Respond Function and Activities
Lecture 14 Recover Function and Activities
Lecture 15 Controls and Outcomes
Section 3: Real World Case Studies
Lecture 16 Chapter Introduction
Lecture 17 Cimpress (Promotional Products)
Lecture 18 University of Kansas Medical Center
Lecture 19 CRO Customer Case Study #1
Lecture 20 CRO Customer Case Study #2
Section 4: Implementing Phase One of the CR-MAP
Lecture 21 Chapter Introduction
Lecture 22 CR-MAP Overview
Lecture 23 Widen Your Scope
Lecture 24 Get Buy-In
Lecture 25 Select Interviewees
Lecture 26 Generate Questionnaire
Lecture 27 Choose Target Scores
Lecture 28 Conduct Interviews
Lecture 29 Compile and Analyze Scores
Lecture 30 Identify Top 5 Cyber Risks
Section 5: Implementing Phase Two of the CR-MAP
Lecture 31 Chapter Introduction
Lecture 32 Close Your Gaps
Lecture 33 Total Cost of Ownership
Lecture 34 Business Value Analysis
Lecture 35 Dashboard and Roadmap
Lecture 36 Internal Marketing
Lecture 37 External Marketing
Section 6: Implementing Phase Three of the CR-MAP
Lecture 38 Chapter Introduction
Lecture 39 Phase Three Overview
Lecture 40 Monthly Check-ins
Lecture 41 Quarterly Reviews
Lecture 42 Annual Cybersecurity Summit
Section 7: Conclusion
Lecture 43 BONUS: Conclusion
Cybersecurity Professionals,Information Technology Practitioners,Risk Management Practitioners,Business Leaders and Executives