Tags
Language
Tags
March 2025
Su Mo Tu We Th Fr Sa
23 24 25 26 27 28 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Implement Version 2 Of Nist Cybersecurity Framework

Posted By: ELK1nG
Implement Version 2 Of Nist Cybersecurity Framework

Implement Version 2 Of Nist Cybersecurity Framework
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.79 GB | Duration: 2h 43m

Designed for hands-on practitioners who really want to know how the NIST Cybersecurity Framework works!

What you'll learn

Understand the foundations of the NIST Cybersecurity Framework

Be able to use the Framework Core

Be able to use the Framework Tiers

Be able to use the Framework Implementation Profile

Requirements

No special tools are required, just a willingness to learn about using the NIST Cybersecurity Framework

Description

The NIST Cybersecurity Framework isn't just another dusty document. It's a practical tool that can help protect your organization. But many people tell me they're confused about how to actually use it.We've been implementing the Framework with paying customers for over 8 years, so I've seen lots of confusion.In this course, I'm going to demystify the Framework, show you how to implement it, and give you a straight-forward method along with a free tool for automating the workflow and reporting.You'll start by learning the basics of the NIST Cybersecurity Framework, like who made it and who can use it.Then, you'll dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Implementation Profiles.You'll also review case studies from diverse organizations across the globe, including a critical infrastructure organization, a large global business, and others.Finally, we'll spend most of our time learning how to implement the framework within your own organization by making a Cyber Risk Management Action Plan (CR-MAP). This CR-MAP of your organization will discover your time five cyber risks and help you to create a mitigation plan to reduce your cyber risk and make your organization more cyber resilient.  You'll also get a free bonus digital workbook that helps you conduct a CR-MAP step-by-step.Remember: Cyber criminals don't care how big or small your organization is. They only care if you're an easy target.The Framework helps make you a harder target. Let's get going!

Overview

Section 1: Introduction to the NIST Cyber Security Framework

Lecture 1 Introduction

Lecture 2 Business Value of Framework

Lecture 3 Who Can Use The Framework?

Lecture 4 Understanding the Core

Lecture 5 Understanding the Tiers

Lecture 6 Understanding the Profiles

Lecture 7 Understanding the Online Resources

Section 2: Understanding the NIST Cybersecurity Framework

Lecture 8 Chapter Introduction

Lecture 9 Govern Function and Activities

Lecture 10 Identify Function and Activities

Lecture 11 Protect Function and Activities

Lecture 12 Detect Function and Activities

Lecture 13 Respond Function and Activities

Lecture 14 Recover Function and Activities

Lecture 15 Controls and Outcomes

Section 3: Real World Case Studies

Lecture 16 Chapter Introduction

Lecture 17 Cimpress (Promotional Products)

Lecture 18 University of Kansas Medical Center

Lecture 19 CRO Customer Case Study #1

Lecture 20 CRO Customer Case Study #2

Section 4: Implementing Phase One of the CR-MAP

Lecture 21 Chapter Introduction

Lecture 22 CR-MAP Overview

Lecture 23 Widen Your Scope

Lecture 24 Get Buy-In

Lecture 25 Select Interviewees

Lecture 26 Generate Questionnaire

Lecture 27 Choose Target Scores

Lecture 28 Conduct Interviews

Lecture 29 Compile and Analyze Scores

Lecture 30 Identify Top 5 Cyber Risks

Section 5: Implementing Phase Two of the CR-MAP

Lecture 31 Chapter Introduction

Lecture 32 Close Your Gaps

Lecture 33 Total Cost of Ownership

Lecture 34 Business Value Analysis

Lecture 35 Dashboard and Roadmap

Lecture 36 Internal Marketing

Lecture 37 External Marketing

Section 6: Implementing Phase Three of the CR-MAP

Lecture 38 Chapter Introduction

Lecture 39 Phase Three Overview

Lecture 40 Monthly Check-ins

Lecture 41 Quarterly Reviews

Lecture 42 Annual Cybersecurity Summit

Section 7: Conclusion

Lecture 43 BONUS: Conclusion

Cybersecurity Professionals,Information Technology Practitioners,Risk Management Practitioners,Business Leaders and Executives