NIST Cybersecurity Framework v1.1 Implementation Steps

  Рет қаралды 26,818

Optic Cyber

Optic Cyber

Күн бұрын

Пікірлер: 21
@justkimmiann
@justkimmiann 6 ай бұрын
These videos are great! Thank you for sharing!
@lenimecias2081
@lenimecias2081 2 жыл бұрын
thank you this is reallly helpful for me as a beginner and studying cybersecurity.
@TechViking
@TechViking 2 жыл бұрын
I wish more people would put information out on how to remember this information. Good Video Though!!!!!
@romiocp732
@romiocp732 2 жыл бұрын
How do these 7 implementation steps relate to the Framework Core (The functions ID, PR, DE, RS and RC) that you presented in the other video? If forexample you're working on step one (Prioritize and Scope), it seems reasonable to assume that you are touching the function Identify, as this is about identifying the assets, business environmet etc. What I am missing is an arrow or explanation that clarifies what you're working at each step in the 7 implementation steps against the functions in the Framework core. Thanks in advance
@OpticCyber
@OpticCyber 2 жыл бұрын
The closest relationship to the Core is in steps 3 (Create a Current State Profile) & 5 (Create a Target State Profile). In these steps, we create a Profile organized by the Functions, Categories, or Subcategories to understand our current or target state relating to each. Step 1, Prioritize and Scope is more focused on evaluating what is being evaluated rather than beginning the evaluation itself. Hope this helps!
@romiocp732
@romiocp732 2 жыл бұрын
@@OpticCyber Thanks a lot, I appriciate the respons. So the 7 implementation steps are used basically independent of Core? You explained very well in the first video that the Core are outcome based, and only tells you what to do, and not how to do it. But would it be reasonable to presume that the 7 steps are used without having the Core, or would you say that you must first have/look at the Core, then use the 7 steps? I'm just trying to understand if the Core and the 7 steps were created in conjunction to each other, or if one would use the other without even having to know that the other exists (which of cours is possible, but I'm not sure if that was the intent)?
@OpticCyber
@OpticCyber 2 жыл бұрын
@@romiocp732 You're right, the Implementation Steps can be used independently of the Core and the Core used independently of the Implementation Steps. However, they work very well together to use the Core as the criteria for evaluating a cybersecurity program leveraging the Implementation Steps as the process to follow.
@herteert299
@herteert299 Жыл бұрын
The links on your website are not working
@OpticCyber
@OpticCyber Жыл бұрын
Thanks for reaching out. Can you let me know what link you are looking for and I will send directly!
@jzubrinich
@jzubrinich Жыл бұрын
A great high level overview. Thanks for the video Kelly!
@shonshamuratov7308
@shonshamuratov7308 3 жыл бұрын
Thank you for the video. That would be awesome if you could insert links to the NIST framework steps that you explained so I could read up a little more
@OpticCyber
@OpticCyber 3 жыл бұрын
Hi Shon! NIST has some additional information in the Cybersecurity Framework itself describing "Establishing or Improving a Cybersecurity Program" in Section 3.2 (www.nist.gov/cyberframework/framework). Additionally, we have a more in depth video that walks through implementing the Cybersecurity Framework along with NIST's Privacy Framework that you might find helpful (kzbin.info/www/bejne/bnnYkHZnn6Zqjrs).
@nikklasnachton5865
@nikklasnachton5865 4 жыл бұрын
Good work
@alejandrodcb
@alejandrodcb 3 жыл бұрын
Congratulations!
@zmartinelli
@zmartinelli 2 жыл бұрын
awesome job.
@deborahe1621
@deborahe1621 3 жыл бұрын
So helpful, thank you!
@IsSheRG710
@IsSheRG710 3 жыл бұрын
Super resourceful and clear! Thank you!
@michaeljearfed5913
@michaeljearfed5913 4 жыл бұрын
Wow😱
@KisemboMOSESISAAC
@KisemboMOSESISAAC 3 жыл бұрын
Awesome
@kishorpatil215
@kishorpatil215 2 жыл бұрын
Didnt understood single word but i feel good listning u r voice
Bringing Cybersecurity & Privacy Together through NIST Frameworks
50:19
NIST Cybersecurity Framework v1.1 Overview
9:32
Optic Cyber
Рет қаралды 26 М.
黑天使被操控了#short #angel #clown
00:40
Super Beauty team
Рет қаралды 61 МЛН
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН
Try this prank with your friends 😂 @karina-kola
00:18
Andrey Grechka
Рет қаралды 9 МЛН
What Changed? - NIST Cybersecurity Framework 2.0
14:28
Optic Cyber
Рет қаралды 27 М.
NIST CSF 2.0 Framework Training - IT/Cybersecurity Audit and Compliance Training
1:11:05
Use the NIST Cybersecurity Framework for your Business!
10:55
Jonathan Edwards
Рет қаралды 22 М.
NIST CSF 2.0 : Real-World Implementation Strategies and Tips
17:39
Do I Measure Up? - NIST Cybersecurity Framework 2.0
10:00
Optic Cyber
Рет қаралды 4,1 М.
Building a Cybersecurity Framework
8:27
IBM Technology
Рет қаралды 49 М.
The NIST Cybersecurity Framework  4 Step Guide
26:48
Kyber Security
Рет қаралды 22 М.
Cybersecurity Frameworks 101: What You Need to Know About NIST and CIS
47:44
CCSI Contemporary Computer Services Inc
Рет қаралды 25 М.
How to Perform Effective OT Cyber Security Risk Assessments
30:36
SANS ICS Security
Рет қаралды 12 М.
NIST CSF - Identify Function ((Asset Management)) Implementation
27:30
黑天使被操控了#short #angel #clown
00:40
Super Beauty team
Рет қаралды 61 МЛН