Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka

Edureka!
Edureka!Edureka!
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Improving Critical Infrastructure Cybersecurity
Why Cybersecurity Framework?
Types of Cybersecurity Framework
Cybersecurity Framework Components
Agenda
Steps to Implement Framework
Coordination of Framework Implementation
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Improving Critical Infrastructure Cybersecurity
Executive Order 13636
12 February 2013
“It is the policy of the United States to enhance the security and
resilience of the Nation’s critical infrastructure and to maintain a
cyber environment that encourages efficiency, innovation, and
economic prosperity while promoting safety, security, business
confidentiality, privacy, and civil liberties”
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
According to the Executive Order…
Align policy, business and
technological approaches to
address cyber risks
Prioritized, flexible, repeatable,
performance-based, and cost-
effective approach
Identify areas for improvement
to be addressed through future
collaboration
Be consistent with voluntary
international standards
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Why Cybersecurity Framework?
It Results in a shift from compliance to action and
specific outcomes
It has built-in maturity model and gap analysis so you
don't need additional maturity model on top of CSF
It gives you a measure of where you are and where you
need to go
It can be implemented in stages or degrees which makes
it more appealing to business
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What Is Cybersecurity Framework?
The Framework is voluntary guidance,
based on existing guidelines, and
practices for organizations to better
manage and reduce cybersecurity risk.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Types of Frameworks
PCI-DSS
It is designed to
protect credit card,
debit card, and cash
card transactions
ISO 27001/27002
Best practice
recommendations for
information security
management and
information security
program elements.
CIS-Critical Security
Controls
cyber protection that
give noteworthy
approaches to stop the
present most
inescapable attacks
NIST Framework
Improving critical
infrastructure
Cybersecurity to improve
organization’s risks by
leveraging standard
methodologies and
processes
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
NIST: Most Popular among Frameworks
NIST framework was developed in Feb 2013 after US Presidential Executive order
To address national and
economic security challenges
Reduce cyber risks to critical
Infrastructure
To be voluntary
(for private sector)
Collaboratively developed with
stakeholders
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Objectives of the Framework
Adaptable,
flexible, and
scalable
Improve
Organization’s
readiness for
managing
cybersecurity risk
Flexible,
repeatable, and
performance
based
Cost-effective Leverage
standards,
methodologies
and processes
Promote
technology
innovation
Actionable across
the enterprise-
focus on outcomes
01 02 03 04 05 06 07
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Framework Components
Framework
Profile
Framework
Implementation
Tiers
Framework
Core
Are an association’s novel
arrangement of their organizational
prerequisites and goals, and assets
against the coveted results of the
Framework Core.
Guides associations in overseeing and
decreasing their Cybersecurity
chances in a way that supplements an
association’s current Cybersecurity
and risk management processes.
Describes how cybersecurity
risk is managed by an organization
and degree the risk management
practices exhibit key characteristics
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Implementation Tiers
Tier 1
Partial
Tier 2
Risk Informed
Tier 3
Repeatable
Tier 4
Adaptive
The extent to which cybersecurity is considered in broader risk
management decisions
The degree to which the organization benefits my sharing or receiving
information from outside parties
The functionality and repeatability of cybersecurity risk managementRisk Management Process
Risk Management Program
External Participation
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Core
Respond
What processes and
assets need
protection?
What techniques
can restore
capabilities
What safeguards are
available?
What techniques
can identify
incidents?
What techniques
can contain impacts
on incidents?
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Core: Identify
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
This function helps with building up a
hierarchical comprehension in overseeing
cybersecurity to frameworks, individuals,
resources, information, and capacities
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profiles: Protect
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
This function develop and implement the
appropriate safeguards and controls to
ensure delivery of critical infrastructure
services
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profiles: Detect
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
This Function characterizes the fitting
exercises to recognize the event of a
Cybersecurity occasion. The Detect Function
empowers opportune revelation of
Cybersecurity occasions.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profiles: Respond
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
This Function develop and implement the
appropriate activities and controls to identify
occurrence of a cybersecurity event. It
bolsters the capacity to contain the effect of a
potential Cybersecurity occurrence.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profiles: Recover
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
The Recover Function distinguishes proper
exercises to keep up plans for versatility and
to re-establish any abilities or administrations
that were impeded because of a
Cybersecurity event.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profile
Profiles can be used to identify opportunities for improving
Cybersecurity posture by comparing the current profile (“as is”
state with the target profile (“to be” state)
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Steps to Implement Framework
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Prioritize & scope
Create a Current Profile Create a Target Profile
Orient Conduct a Risk Assessment Determine, analyze &
prioritize gaps
Step 7
Implement Action Plan
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Coordination of Framework Implementation
Risk Management
Implementation
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Don’t just learn it, MASTER it with
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka
1 de 22

Recomendados

Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri... por
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
2.5K visualizações16 slides
Cybersecurity Roadmap Development for Executives por
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesKrist Davood - Principal - CIO
1.3K visualizações30 slides
Cybersecurity por
CybersecurityCybersecurity
CybersecurityANGIEPAEZ304
834 visualizações10 slides
An introduction to SOC (Security Operation Center) por
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
22.5K visualizações36 slides
Cybersecurity trends - What to expect in 2023 por
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
2.7K visualizações17 slides
Cyber Security PPT - 2023.pptx por
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxChandanChandu928137
3.1K visualizações14 slides

Mais conteúdo relacionado

Mais procurados

Soc por
SocSoc
SocMukesh Chaudhari
712 visualizações9 slides
Cybersecurity Risk Management Program and Your Organization por
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
723 visualizações58 slides
Cyber Security Incident Response por
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
11K visualizações85 slides
CyberSecurity por
CyberSecurityCyberSecurity
CyberSecuritydivyanshigarg4
557 visualizações20 slides
Security Operation Center Fundamental por
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
3.4K visualizações79 slides
Introduction to Risk Management via the NIST Cyber Security Framework por
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
5.5K visualizações20 slides

Mais procurados(20)

Cybersecurity Risk Management Program and Your Organization por McKonly & Asbury, LLP
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP723 visualizações
Cyber Security Incident Response por PECB
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB 11K visualizações
CyberSecurity por divyanshigarg4
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4557 visualizações
Security Operation Center Fundamental por Amir Hossein Zargaran
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran3.4K visualizações
Introduction to Risk Management via the NIST Cyber Security Framework por PECB
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB 5.5K visualizações
NIST CyberSecurity Framework: An Overview por Tandhy Simanjuntak
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak49.7K visualizações
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ... por Edureka!
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!3.1K visualizações
NIST cybersecurity framework por Shriya Rai
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
Shriya Rai990 visualizações
Security operation center (SOC) por Ahmed Ayman
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman1.3K visualizações
Cybersecurity por Sanjana Agarwal
CybersecurityCybersecurity
Cybersecurity
Sanjana Agarwal1.1K visualizações
Security architecture por Duncan Unwin
Security architectureSecurity architecture
Security architecture
Duncan Unwin8.9K visualizações
Threat Intelligence por Deepak Kumar (D3)
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3) 3.3K visualizações
What is a secure enterprise architecture roadmap? por Ulf Mattsson
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
Ulf Mattsson2.3K visualizações
Next-Gen security operation center por Muhammad Sahputra
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra1.3K visualizações
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra... por Edureka!
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!3.5K visualizações
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter por Tuan Phan
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Tuan Phan6K visualizações
Anatomy of a cyber attack por Mark Silver
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver7.3K visualizações

Similar a Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka

Isa Prog Need L por
Isa Prog Need LIsa Prog Need L
Isa Prog Need LR_Yanus
451 visualizações12 slides
Does Anyone Remember Enterprise Security Architecture? por
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
2.3K visualizações37 slides
From Cave Man to Business Man, the Evolution of the CISO to CIRO por
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
1.8K visualizações28 slides
Cloud Clinique Enterprise IT Certification Program - Module Matrix por
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module MatrixAdrian Hall
739 visualizações15 slides
Smart security solutions for SMBs por
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
953 visualizações15 slides
Enhance Your Skills With Cybersecurity certification por
Enhance Your Skills With Cybersecurity certificationEnhance Your Skills With Cybersecurity certification
Enhance Your Skills With Cybersecurity certificationgsdcouncil1
4 visualizações2 slides

Similar a Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka(20)

Isa Prog Need L por R_Yanus
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
R_Yanus451 visualizações
Does Anyone Remember Enterprise Security Architecture? por rbrockway
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
rbrockway2.3K visualizações
From Cave Man to Business Man, the Evolution of the CISO to CIRO por Priyanka Aash
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Priyanka Aash1.8K visualizações
Cloud Clinique Enterprise IT Certification Program - Module Matrix por Adrian Hall
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
Adrian Hall739 visualizações
Smart security solutions for SMBs por Jyothi Satyanathan
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan953 visualizações
Enhance Your Skills With Cybersecurity certification por gsdcouncil1
Enhance Your Skills With Cybersecurity certificationEnhance Your Skills With Cybersecurity certification
Enhance Your Skills With Cybersecurity certification
gsdcouncil14 visualizações
Information Security Framework por ssuser65fa31
Information Security FrameworkInformation Security Framework
Information Security Framework
ssuser65fa3110 visualizações
Why ISO 27001 for an Organisation por Syed Azher
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
Syed Azher243 visualizações
CCA study group por IIBA UK Chapter
CCA study groupCCA study group
CCA study group
IIBA UK Chapter269 visualizações
Cyber crime with privention por Manish Dixit Ceh
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
Manish Dixit Ceh587 visualizações
G3 04 bawi 2020 the iiba cybersecurity perspective maurizio garofalo por IIBA-IT
G3 04 bawi 2020 the iiba cybersecurity perspective maurizio garofaloG3 04 bawi 2020 the iiba cybersecurity perspective maurizio garofalo
G3 04 bawi 2020 the iiba cybersecurity perspective maurizio garofalo
IIBA-IT118 visualizações
Enterprise%20 security%20architecture%20 %20business%20driven%20security por wardell henley
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20security
wardell henley70 visualizações
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf por JustinBrown267905
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown26790579 visualizações
II Security At Microsoft por Mark J. Feldman
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
Mark J. Feldman846 visualizações
Saikiran_CV_Operational Risk_updated por konchada
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
konchada56 visualizações
Saikiran_CV_Operational Risk_updated por konchada
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
konchada35 visualizações
Implementing a Security Management Framework por Joseph Wynn
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
Joseph Wynn282 visualizações
Key metrics and process in cyber security case scenario por Bim Akinfenwa
Key metrics and process in cyber security case scenarioKey metrics and process in cyber security case scenario
Key metrics and process in cyber security case scenario
Bim Akinfenwa214 visualizações

Mais de Edureka!

What to learn during the 21 days Lockdown | Edureka por
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaEdureka!
46K visualizações42 slides
Top 10 Dying Programming Languages in 2020 | Edureka por
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaEdureka!
7.3K visualizações37 slides
Top 5 Trending Business Intelligence Tools | Edureka por
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaEdureka!
4.8K visualizações27 slides
Tableau Tutorial for Data Science | Edureka por
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaEdureka!
3.9K visualizações18 slides
Python Programming Tutorial | Edureka por
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaEdureka!
5.3K visualizações40 slides
Top 5 PMP Certifications | Edureka por
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaEdureka!
1.9K visualizações60 slides

Mais de Edureka!(20)

What to learn during the 21 days Lockdown | Edureka por Edureka!
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
Edureka!46K visualizações
Top 10 Dying Programming Languages in 2020 | Edureka por Edureka!
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Edureka!7.3K visualizações
Top 5 Trending Business Intelligence Tools | Edureka por Edureka!
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Edureka!4.8K visualizações
Tableau Tutorial for Data Science | Edureka por Edureka!
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
Edureka!3.9K visualizações
Python Programming Tutorial | Edureka por Edureka!
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
Edureka!5.3K visualizações
Top 5 PMP Certifications | Edureka por Edureka!
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
Edureka!1.9K visualizações
Top Maven Interview Questions in 2020 | Edureka por Edureka!
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
Edureka!1.3K visualizações
Linux Mint Tutorial | Edureka por Edureka!
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
Edureka!1.1K visualizações
How to Deploy Java Web App in AWS| Edureka por Edureka!
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
Edureka!1.1K visualizações
Importance of Digital Marketing | Edureka por Edureka!
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
Edureka!1.1K visualizações
RPA in 2020 | Edureka por Edureka!
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
Edureka!987 visualizações
Email Notifications in Jenkins | Edureka por Edureka!
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
Edureka!867 visualizações
EA Algorithm in Machine Learning | Edureka por Edureka!
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
Edureka!985 visualizações
Cognitive AI Tutorial | Edureka por Edureka!
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
Edureka!1.1K visualizações
AWS Cloud Practitioner Tutorial | Edureka por Edureka!
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Edureka!3.5K visualizações
Blue Prism Top Interview Questions | Edureka por Edureka!
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
Edureka!530 visualizações
Big Data on AWS Tutorial | Edureka por Edureka!
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
Edureka!483 visualizações
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka por Edureka!
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Edureka!1.1K visualizações
Kubernetes Installation on Ubuntu | Edureka por Edureka!
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
Edureka!592 visualizações
Introduction to DevOps | Edureka por Edureka!
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
Edureka!1.5K visualizações

Último

PharoJS - Zürich Smalltalk Group Meetup November 2023 por
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
126 visualizações17 slides
Lilypad @ Labweek, Istanbul, 2023.pdf por
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdfAlly339821
9 visualizações45 slides
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
30 visualizações35 slides
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
33 visualizações69 slides
The Research Portal of Catalonia: Growing more (information) & more (services) por
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
79 visualizações25 slides
Unit 1_Lecture 2_Physical Design of IoT.pdf por
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfStephenTec
12 visualizações36 slides

Último(20)

PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi126 visualizações
Lilypad @ Labweek, Istanbul, 2023.pdf por Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum30 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker33 visualizações
Unit 1_Lecture 2_Physical Design of IoT.pdf por StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 visualizações
Java Platform Approach 1.0 - Picnic Meetup por Rick Ossendrijver
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver27 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman30 visualizações
Empathic Computing: Delivering the Potential of the Metaverse por Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 visualizações
6g - REPORT.pdf por Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 visualizações
Voice Logger - Telephony Integration Solution at Aegis por Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 visualizações
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 visualizações
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 visualizações
Perth MeetUp November 2023 por Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price19 visualizações
1st parposal presentation.pptx por i238212
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptx
i2382129 visualizações
AMAZON PRODUCT RESEARCH.pdf por JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta19 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.55 visualizações
Attacking IoT Devices from a Web Perspective - Linux Day por Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 visualizações
DALI Basics Course 2023 por Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg16 visualizações

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka

  • 1. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
  • 2. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Improving Critical Infrastructure Cybersecurity Why Cybersecurity Framework? Types of Cybersecurity Framework Cybersecurity Framework Components Agenda Steps to Implement Framework Coordination of Framework Implementation
  • 3. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Improving Critical Infrastructure Cybersecurity Executive Order 13636 12 February 2013 “It is the policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties”
  • 4. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training According to the Executive Order… Align policy, business and technological approaches to address cyber risks Prioritized, flexible, repeatable, performance-based, and cost- effective approach Identify areas for improvement to be addressed through future collaboration Be consistent with voluntary international standards
  • 5. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Why Cybersecurity Framework? It Results in a shift from compliance to action and specific outcomes It has built-in maturity model and gap analysis so you don't need additional maturity model on top of CSF It gives you a measure of where you are and where you need to go It can be implemented in stages or degrees which makes it more appealing to business
  • 6. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training What Is Cybersecurity Framework? The Framework is voluntary guidance, based on existing guidelines, and practices for organizations to better manage and reduce cybersecurity risk. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
  • 7. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Types of Frameworks PCI-DSS It is designed to protect credit card, debit card, and cash card transactions ISO 27001/27002 Best practice recommendations for information security management and information security program elements. CIS-Critical Security Controls cyber protection that give noteworthy approaches to stop the present most inescapable attacks NIST Framework Improving critical infrastructure Cybersecurity to improve organization’s risks by leveraging standard methodologies and processes
  • 8. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training NIST: Most Popular among Frameworks NIST framework was developed in Feb 2013 after US Presidential Executive order To address national and economic security challenges Reduce cyber risks to critical Infrastructure To be voluntary (for private sector) Collaboratively developed with stakeholders
  • 9. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Objectives of the Framework Adaptable, flexible, and scalable Improve Organization’s readiness for managing cybersecurity risk Flexible, repeatable, and performance based Cost-effective Leverage standards, methodologies and processes Promote technology innovation Actionable across the enterprise- focus on outcomes 01 02 03 04 05 06 07
  • 10. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Framework Components Framework Profile Framework Implementation Tiers Framework Core Are an association’s novel arrangement of their organizational prerequisites and goals, and assets against the coveted results of the Framework Core. Guides associations in overseeing and decreasing their Cybersecurity chances in a way that supplements an association’s current Cybersecurity and risk management processes. Describes how cybersecurity risk is managed by an organization and degree the risk management practices exhibit key characteristics
  • 11. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Implementation Tiers Tier 1 Partial Tier 2 Risk Informed Tier 3 Repeatable Tier 4 Adaptive The extent to which cybersecurity is considered in broader risk management decisions The degree to which the organization benefits my sharing or receiving information from outside parties The functionality and repeatability of cybersecurity risk managementRisk Management Process Risk Management Program External Participation
  • 12. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Core Respond What processes and assets need protection? What techniques can restore capabilities What safeguards are available? What techniques can identify incidents? What techniques can contain impacts on incidents?
  • 13. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Core: Identify Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO This function helps with building up a hierarchical comprehension in overseeing cybersecurity to frameworks, individuals, resources, information, and capacities
  • 14. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profiles: Protect Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO This function develop and implement the appropriate safeguards and controls to ensure delivery of critical infrastructure services
  • 15. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profiles: Detect Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO This Function characterizes the fitting exercises to recognize the event of a Cybersecurity occasion. The Detect Function empowers opportune revelation of Cybersecurity occasions.
  • 16. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profiles: Respond Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO This Function develop and implement the appropriate activities and controls to identify occurrence of a cybersecurity event. It bolsters the capacity to contain the effect of a potential Cybersecurity occurrence.
  • 17. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profiles: Recover Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO The Recover Function distinguishes proper exercises to keep up plans for versatility and to re-establish any abilities or administrations that were impeded because of a Cybersecurity event.
  • 18. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profile Profiles can be used to identify opportunities for improving Cybersecurity posture by comparing the current profile (“as is” state with the target profile (“to be” state)
  • 19. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Steps to Implement Framework Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Prioritize & scope Create a Current Profile Create a Target Profile Orient Conduct a Risk Assessment Determine, analyze & prioritize gaps Step 7 Implement Action Plan
  • 20. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Coordination of Framework Implementation Risk Management Implementation
  • 21. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Don’t just learn it, MASTER it with