Assess and Manage Risk with the NIST Cybersecurity Framework

Learning Tree International AB, i Stockholm (+5 orter)
Längd
4 dagar
Pris
27 950 SEK exkl. moms
Längd
4 dagar
Pris
27 950 SEK exkl. moms
Få mer information om utbildningen, arrangörerna svarar oftast inom 48h 👍

Beskrivning av: Assess and Manage Risk with the NIST Cybersecurity Framework

Risk Assessment & Management Training for the US Government

This NIST Cybersecurity Framework training course will teach US Government cybersecurity staff to protect their organisation from unacceptable losses by effectively assessing and managing risk. In addition, they will learn how to employ the NIST Cybersecurity Framework defined by The National Institute of Standards and Technology (NIST) and ensure their organisation meets the cyber security laws and regulations imposed on all US Government agencies.

  • Attendees receive a complete set of course notes and a workbook containing all of the course workshops
  • Every source document used in developing the course may be downloaded from the NIST Website free of charge

Assess and Manage Risk with the NIST Cybersecurity Framework Delivery Methods

  • In-Person

  • Online

NIST Cybersecurity Framework Course Information

  • In this Assess and Manage Risk with the NIST Cybersecurity Framework course, you will learn how to:

    • Implement the NIST Risk Management Framework for assessing and managing your organisation's information infrastructure risks.
    • Select and implement security controls that satisfy FISMA, OMB, and Department/Agency requirements.
    • Maintain an acceptable security posture over the system life cycle.
    • Apply FedRAMP-compliant cloud-based solutions.

NIST Cybersecurity Framework Course Outline

Module 1: Introduction to Risk Assessment and Management

  • Ensuring compliance with applicable laws, regulations, policies and directives
  • Protecting the organisation from unacceptable losses
  • Describing the NIST Risk Management Framework (RMF)
  • Applying NIST risk management processes

Module 2: Characterising System Security Requirements

Defining the system

  • Prescribing the system security boundary
  • Pinpointing system interconnections
  • Incorporating characteristics of Industrial Control Systems (ICS) and FedRAMP-compliant cloud-based systems

Identifying security risk components

  • Estimating the impact of compromises to confidentiality, integrity and availability
  • Adopting the appropriate model for categorising system risk
  • Specialised considerations for U.S. Government classified information

Setting the stage for successful risk management

  • Documenting critical risk assessment and management decisions in the System Security Plan (SSP)
  • Appointing qualified individuals to risk governance roles

Module 3: Selecting Appropriate Security Controls

Assigning a security control baseline

  • Investigating security control families
  • Determining the baseline from system security impact
  • Specialised considerations for National Security Systems (NSS)

Tailoring the baseline to fit the system

  • Examining the structure of security controls, enhancements and parameters
  • Binding control overlays to the selected baseline
  • Gauging the need for enhanced assurance
  • Distinguishing system-specific, compensating and non-applicable controls

Module 4: Reducing Risk through Effective Control Implementation

Specifying the implementation approach

  • Maximising security effectiveness by "building in" security
  • Reducing residual risk in legacy systems via "bolt-on" security elements

Applying NIST controls

  • Enhancing system robustness through selection of evaluated and validated components
  • Coordinating implementation approaches to administrative, operational and technical controls
  • Providing evidence of compliance through supporting artefacts
  • Implementing CNSSI-1253 for national security systems

Module 5: Assessing Compliance Scope and Depth

Developing an assessment plan

  • Prioritising depth of control assessment
  • Optimising validation through sequencing and consolidation
  • Verifying compliance through tests, interviews and examinations

Formulating an authorisation recommendation

  • Evaluating overall system security risk
  • Mitigating residual risks
  • Publishing the Plan of Action and Milestones (POA&M), the risk assessment and recommendation

Module 6: Authorising System Operation

Aligning authority and responsibility

  • Quantifying organisational risk tolerance
  • Elevating authorisation decisions in high-risk scenarios

Forming a risk-based decision

  • Appraising system operational impact
  • Weighing residual risk against operational utility
  • Issuing Authority to Operate (ATO)

Module 7: Maintaining Continued Compliance

  • Justifying continuous reauthorisation
  • Preserving an acceptable security posture

Intresseanmälan

Beställ information

Fyll i formuläret för att få mer information om Assess and Manage Risk with the NIST Cybersecurity Framework, direkt från arrangören. Det är gratis och inte bindande!

reCAPTCHA logo Den här hemsidan är skyddad av reCAPTCHA och Googles Integritetspolicy och Användarvillkor tillämapas.
Learning Tree International AB
Fleminggatan 7
112 26 Stockholm

Learning Tree International

Learning Tree är ett internationellt utbildningsföretag med över 40 års erfarenhet av att leverera utbildning till yrkesverksamma IT-proffs, projektledare, verksamhetsutvecklare och chefer. Vi erbjuder allt från enstaka kurser till globala utbildningsprogram, och vi hjälper våra kunder att införa hållbara processer som fungerar idag och förbereder...

Läs mer om Learning Tree International AB och visa alla utbildningar.

Highlights