Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Implement Version 2 Of Nist Cybersecurity Framework

    Posted By: ELK1nG
    Implement Version 2 Of Nist Cybersecurity Framework

    Implement Version 2 Of Nist Cybersecurity Framework
    Published 3/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.79 GB | Duration: 2h 43m

    Designed for hands-on practitioners who really want to know how the NIST Cybersecurity Framework works!

    What you'll learn

    Understand the foundations of the NIST Cybersecurity Framework

    Be able to use the Framework Core

    Be able to use the Framework Tiers

    Be able to use the Framework Implementation Profile

    Requirements

    No special tools are required, just a willingness to learn about using the NIST Cybersecurity Framework

    Description

    The NIST Cybersecurity Framework isn't just another dusty document. It's a practical tool that can help protect your organization. But many people tell me they're confused about how to actually use it.We've been implementing the Framework with paying customers for over 8 years, so I've seen lots of confusion.In this course, I'm going to demystify the Framework, show you how to implement it, and give you a straight-forward method along with a free tool for automating the workflow and reporting.You'll start by learning the basics of the NIST Cybersecurity Framework, like who made it and who can use it.Then, you'll dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Implementation Profiles.You'll also review case studies from diverse organizations across the globe, including a critical infrastructure organization, a large global business, and others.Finally, we'll spend most of our time learning how to implement the framework within your own organization by making a Cyber Risk Management Action Plan (CR-MAP). This CR-MAP of your organization will discover your time five cyber risks and help you to create a mitigation plan to reduce your cyber risk and make your organization more cyber resilient.  You'll also get a free bonus digital workbook that helps you conduct a CR-MAP step-by-step.Remember: Cyber criminals don't care how big or small your organization is. They only care if you're an easy target.The Framework helps make you a harder target. Let's get going!

    Overview

    Section 1: Introduction to the NIST Cyber Security Framework

    Lecture 1 Introduction

    Lecture 2 Business Value of Framework

    Lecture 3 Who Can Use The Framework?

    Lecture 4 Understanding the Core

    Lecture 5 Understanding the Tiers

    Lecture 6 Understanding the Profiles

    Lecture 7 Understanding the Online Resources

    Section 2: Understanding the NIST Cybersecurity Framework

    Lecture 8 Chapter Introduction

    Lecture 9 Govern Function and Activities

    Lecture 10 Identify Function and Activities

    Lecture 11 Protect Function and Activities

    Lecture 12 Detect Function and Activities

    Lecture 13 Respond Function and Activities

    Lecture 14 Recover Function and Activities

    Lecture 15 Controls and Outcomes

    Section 3: Real World Case Studies

    Lecture 16 Chapter Introduction

    Lecture 17 Cimpress (Promotional Products)

    Lecture 18 University of Kansas Medical Center

    Lecture 19 CRO Customer Case Study #1

    Lecture 20 CRO Customer Case Study #2

    Section 4: Implementing Phase One of the CR-MAP

    Lecture 21 Chapter Introduction

    Lecture 22 CR-MAP Overview

    Lecture 23 Widen Your Scope

    Lecture 24 Get Buy-In

    Lecture 25 Select Interviewees

    Lecture 26 Generate Questionnaire

    Lecture 27 Choose Target Scores

    Lecture 28 Conduct Interviews

    Lecture 29 Compile and Analyze Scores

    Lecture 30 Identify Top 5 Cyber Risks

    Section 5: Implementing Phase Two of the CR-MAP

    Lecture 31 Chapter Introduction

    Lecture 32 Close Your Gaps

    Lecture 33 Total Cost of Ownership

    Lecture 34 Business Value Analysis

    Lecture 35 Dashboard and Roadmap

    Lecture 36 Internal Marketing

    Lecture 37 External Marketing

    Section 6: Implementing Phase Three of the CR-MAP

    Lecture 38 Chapter Introduction

    Lecture 39 Phase Three Overview

    Lecture 40 Monthly Check-ins

    Lecture 41 Quarterly Reviews

    Lecture 42 Annual Cybersecurity Summit

    Section 7: Conclusion

    Lecture 43 BONUS: Conclusion

    Cybersecurity Professionals,Information Technology Practitioners,Risk Management Practitioners,Business Leaders and Executives