• Post category:StudyBullet-6
  • Reading time:8 mins read


Implementing NIST SP 800-37R2 Risk Management Framework (RMF) and NIST SP 800-53R5 Security and Privacy Controls

What you will learn

Take a risk-based approach developing such as a Risk Mangment program

Understand the key components of a NIST RMF

Develop required security policies, standards, and guidelines

Understand the key NIST security controls and countermeasures, how and when to apply them, and under which state condition

Understand information risk management and compliance

Apply appropriate risk-management techniques and models including risk scenarios.

Align cyber security and enterprise risk management with NIST RMF

Manage and monitor the status of risk-management strategies and plans

Design and use effective techniques to communicate Cybersecurity risks to stakeholders in a clear manner.

Select and tailor NIST secuirty and privacy controls

Description

If your job requires you to manage cyber security risks in the high-stakes world of enterprise IT, this course is for you. You’ll examine risks, threats, opportunities, and vulnerabilities at the strategic and operational levels. This includes Cybersecurity IT value generation for the business, and the IT NIST Risk Management Framework (RMF).

You’ll also explore risk appetite, risk tolerance, and mitigation strategies, selecting, implementing, tailoring, assessing, and monitoring NIST security controls. The course case study will highlight issues related to legal and regulatory compliance and stakeholder communication.


Get Instant Notification of New Courses on our Telegram channel.


By the end of this course, you will be able to:

  • Understand the seven-step NIST Risk management and compliance
  • Apply appropriate risk-management techniques and models including risk scenarios.
  • Conduct risk analysis and assessment
  • Align cyber security and enterprise risk management.
  • Manage and monitor the status of NIST risk-management strategies and plans.
  • Provide oversight of related legal and regulatory compliance such as HIPPA and credit card regulation PCI DSS
  • Design and use effective techniques to communicate Cybersecurity risks to stakeholders in a clear manner
  • Select and tailor the proper NIST security and privacy controls
  • Understand the difference between IT audit and assessment.
  • Track risks and create cyber security performance indicators

The course will provide you with a foundational understanding of risk and how to identify, assess, and mitigate risk. You will become familiar with the concepts, tools, and techniques used to develop a risk management process. You will also learn how to use these tools and techniques to effectively manage risk using the NIST seven-step approach along with security and privacy controls.

English
language

Content

Introduction

What You will learn in this course?
Introduction
Integrating Cybersecurity and ERM

The Course case study

Target Cloud Inc. Case Study

IT Cyber Security Risk

What is Risk ?
Assets, threats, and vulnerabilities
Organization’s crown jewels
The Risk-Based Security Approach
The Need For Risk Assessment
Conducting an IT Risk Assessment
Business Impact Analysis (BIA)
A Risk Cost-Benefit Analysis
Enterprise Risk Management Strategy
Risk Analysis Methods

NIST 800-37 R2 Risk Management Framework

NIST Risk Management Framework for Information Systems and Organization

RMF Preparation Step 1

NIST Risk Management Preparation Strategy

RMF Categorize Information Systems Step 2

Define System Categorization, Scope, and Authorization Boundaries

RMF Select Security Controls Step 3

Introduction to NIST Security Controls
High Water Mark Concept and the Security Control Baseline
Selecting NIST Security Controls

RMF Implement NIST Security Controls step 4

NIST Security Controls Implementation
Tailoring NIST Control Baselines

RMF Assess Security Controls step 5

Assigning NIST RMF Assessment Objectives
NIST Security Controls Assessment
Penetration Testing
NIST RMF Assessment Results

RMF Authorize Information System step 6

RMF Authorization

RMF Monitor Security Controls step 7

NIST RMF Monitoring
Monitoring is an Ongoing Process

NIST RMF Knowledge Resources and Best Practices

Tips For Streamlining RMF Implementation
NIST RMF Best practices and Knowledge Resources

CMMI maturity model and NIST RMF

NIST CMMI Maturity Model

Cyber Security Risk Metrics Indicators

Cyber Security Risk Metrics and Performance indicators

NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)

NIST RMF Quick Start Guide, Frequently Asked Questions (FAQs)

Conclusions

Conclusions