2
Most read
7
Most read
8
Most read
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Improving Critical Infrastructure Cybersecurity
Why Cybersecurity Framework?
Types of Cybersecurity Framework
Cybersecurity Framework Components
Agenda
Steps to Implement Framework
Coordination of Framework Implementation
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Improving Critical Infrastructure Cybersecurity
Executive Order 13636
12 February 2013
“It is the policy of the United States to enhance the security and
resilience of the Nation’s critical infrastructure and to maintain a
cyber environment that encourages efficiency, innovation, and
economic prosperity while promoting safety, security, business
confidentiality, privacy, and civil liberties”
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
According to the Executive Order…
Align policy, business and
technological approaches to
address cyber risks
Prioritized, flexible, repeatable,
performance-based, and cost-
effective approach
Identify areas for improvement
to be addressed through future
collaboration
Be consistent with voluntary
international standards
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Why Cybersecurity Framework?
It Results in a shift from compliance to action and
specific outcomes
It has built-in maturity model and gap analysis so you
don't need additional maturity model on top of CSF
It gives you a measure of where you are and where you
need to go
It can be implemented in stages or degrees which makes
it more appealing to business
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
What Is Cybersecurity Framework?
The Framework is voluntary guidance,
based on existing guidelines, and
practices for organizations to better
manage and reduce cybersecurity risk.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Types of Frameworks
PCI-DSS
It is designed to
protect credit card,
debit card, and cash
card transactions
ISO 27001/27002
Best practice
recommendations for
information security
management and
information security
program elements.
CIS-Critical Security
Controls
cyber protection that
give noteworthy
approaches to stop the
present most
inescapable attacks
NIST Framework
Improving critical
infrastructure
Cybersecurity to improve
organization’s risks by
leveraging standard
methodologies and
processes
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
NIST: Most Popular among Frameworks
NIST framework was developed in Feb 2013 after US Presidential Executive order
To address national and
economic security challenges
Reduce cyber risks to critical
Infrastructure
To be voluntary
(for private sector)
Collaboratively developed with
stakeholders
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Objectives of the Framework
Adaptable,
flexible, and
scalable
Improve
Organization’s
readiness for
managing
cybersecurity risk
Flexible,
repeatable, and
performance
based
Cost-effective Leverage
standards,
methodologies
and processes
Promote
technology
innovation
Actionable across
the enterprise-
focus on outcomes
01 02 03 04 05 06 07
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Cybersecurity Framework Components
Framework
Profile
Framework
Implementation
Tiers
Framework
Core
Are an association’s novel
arrangement of their organizational
prerequisites and goals, and assets
against the coveted results of the
Framework Core.
Guides associations in overseeing and
decreasing their Cybersecurity
chances in a way that supplements an
association’s current Cybersecurity
and risk management processes.
Describes how cybersecurity
risk is managed by an organization
and degree the risk management
practices exhibit key characteristics
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Implementation Tiers
Tier 1
Partial
Tier 2
Risk Informed
Tier 3
Repeatable
Tier 4
Adaptive
The extent to which cybersecurity is considered in broader risk
management decisions
The degree to which the organization benefits my sharing or receiving
information from outside parties
The functionality and repeatability of cybersecurity risk managementRisk Management Process
Risk Management Program
External Participation
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Core
Respond
What processes and
assets need
protection?
What techniques
can restore
capabilities
What safeguards are
available?
What techniques
can identify
incidents?
What techniques
can contain impacts
on incidents?
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Core: Identify
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
This function helps with building up a
hierarchical comprehension in overseeing
cybersecurity to frameworks, individuals,
resources, information, and capacities
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profiles: Protect
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
This function develop and implement the
appropriate safeguards and controls to
ensure delivery of critical infrastructure
services
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profiles: Detect
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
This Function characterizes the fitting
exercises to recognize the event of a
Cybersecurity occasion. The Detect Function
empowers opportune revelation of
Cybersecurity occasions.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profiles: Respond
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
This Function develop and implement the
appropriate activities and controls to identify
occurrence of a cybersecurity event. It
bolsters the capacity to contain the effect of a
potential Cybersecurity occurrence.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profiles: Recover
Function Category ID
Identify
Asset Management ID.AM
Business Environment ID.BE
Governance ID.GV
Risk Assessment ID.RA
Risk Management Strategy ID.RM
Protect
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Detect
Anomalies and Events DE.AE
Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Respond
Response Planning RS.RP
Communications RS.CO
Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recover
Recovery Planning RC.RP
Improvements RC.IM
Communications RC.CO
The Recover Function distinguishes proper
exercises to keep up plans for versatility and
to re-establish any abilities or administrations
that were impeded because of a
Cybersecurity event.
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Framework Profile
Profiles can be used to identify opportunities for improving
Cybersecurity posture by comparing the current profile (“as is”
state with the target profile (“to be” state)
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Steps to Implement Framework
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Prioritize & scope
Create a Current Profile Create a Target Profile
Orient Conduct a Risk Assessment Determine, analyze &
prioritize gaps
Step 7
Implement Action Plan
CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
Coordination of Framework Implementation
Risk Management
Implementation
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Don’t just learn it, MASTER it with
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka

More Related Content

PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Cybersecurity Roadmap Development for Executives
PDF
Building an effective Information Security Roadmap
PDF
Introduction to Cybersecurity
PDF
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
PPTX
Cyber Security roadmap.pptx
PDF
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
PPTX
Introduction to Cybersecurity
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity Roadmap Development for Executives
Building an effective Information Security Roadmap
Introduction to Cybersecurity
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
Cyber Security roadmap.pptx
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Introduction to Cybersecurity

What's hot (20)

PPTX
An introduction to SOC (Security Operation Center)
PPTX
NIST CyberSecurity Framework: An Overview
PDF
How To Present Cyber Security To Senior Management Complete Deck
PPSX
Next-Gen security operation center
PDF
NIST Cybersecurity Framework 101
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Building Security Operation Center
PDF
NIST cybersecurity framework
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
Introduction to NIST Cybersecurity Framework
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PDF
Cyber Threat Intelligence
PDF
DTS Solution - Building a SOC (Security Operations Center)
PPTX
Cyber attacks and IT security management in 2025
PPTX
Cybersecurity
PDF
Enterprise Security Architecture for Cyber Security
PPTX
Optimizing Security Operations: 5 Keys to Success
An introduction to SOC (Security Operation Center)
NIST CyberSecurity Framework: An Overview
How To Present Cyber Security To Senior Management Complete Deck
Next-Gen security operation center
NIST Cybersecurity Framework 101
Effective Security Operation Center - present by Reza Adineh
Building Security Operation Center
NIST cybersecurity framework
From SIEM to SOC: Crossing the Cybersecurity Chasm
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Rothke rsa 2012 building a security operations center (soc)
Security operations center-SOC Presentation-مرکز عملیات امنیت
Introduction to NIST Cybersecurity Framework
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
Cyber Threat Intelligence
DTS Solution - Building a SOC (Security Operations Center)
Cyber attacks and IT security management in 2025
Cybersecurity
Enterprise Security Architecture for Cyber Security
Optimizing Security Operations: 5 Keys to Success
Ad

Similar to Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka (20)

PPTX
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
PDF
NIST critical_infrastructure_cybersecurity.pdf
PPTX
cybersecurity_framework_webinar_2017.pptx
PPTX
CYBER SECURITY
PPTX
Cybersecurity-Real World Approach FINAL 2-24-16
PPTX
framework-version-1.1-overview-20180427-for-web-002.pptx
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cervone uof t - nist framework (1)
PDF
A Major Revision of the CISRCP Program
PDF
Introduction to Cybersecurity.pdf
PDF
Nist cybersecurity framework isc2 quantico
PPTX
Cybersecurity Frameworks and You: The Perfect Match
DOCX
Framework for Improving Critical Infrastructure Cyber.docx
PPTX
CISO's first 100 days
PDF
Cybersecurity Skilling at a Tipping Point.pdf
PDF
Framework for Improving Critical Infrastructure Cybersecurity - Nist.cswp.041...
PDF
CyberSecurity Update Slides
PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
PPTX
Risk Management Approach to Cyber Security
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
NIST critical_infrastructure_cybersecurity.pdf
cybersecurity_framework_webinar_2017.pptx
CYBER SECURITY
Cybersecurity-Real World Approach FINAL 2-24-16
framework-version-1.1-overview-20180427-for-web-002.pptx
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Cervone uof t - nist framework (1)
A Major Revision of the CISRCP Program
Introduction to Cybersecurity.pdf
Nist cybersecurity framework isc2 quantico
Cybersecurity Frameworks and You: The Perfect Match
Framework for Improving Critical Infrastructure Cyber.docx
CISO's first 100 days
Cybersecurity Skilling at a Tipping Point.pdf
Framework for Improving Critical Infrastructure Cybersecurity - Nist.cswp.041...
CyberSecurity Update Slides
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Risk Management Approach to Cyber Security
Ad

More from Edureka! (20)

PDF
What to learn during the 21 days Lockdown | Edureka
PDF
Top 10 Dying Programming Languages in 2020 | Edureka
PDF
Top 5 Trending Business Intelligence Tools | Edureka
PDF
Tableau Tutorial for Data Science | Edureka
PDF
Python Programming Tutorial | Edureka
PDF
Top 5 PMP Certifications | Edureka
PDF
Top Maven Interview Questions in 2020 | Edureka
PDF
Linux Mint Tutorial | Edureka
PDF
How to Deploy Java Web App in AWS| Edureka
PDF
Importance of Digital Marketing | Edureka
PDF
RPA in 2020 | Edureka
PDF
Email Notifications in Jenkins | Edureka
PDF
EA Algorithm in Machine Learning | Edureka
PDF
Cognitive AI Tutorial | Edureka
PDF
AWS Cloud Practitioner Tutorial | Edureka
PDF
Blue Prism Top Interview Questions | Edureka
PDF
Big Data on AWS Tutorial | Edureka
PDF
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
PDF
Kubernetes Installation on Ubuntu | Edureka
PDF
Introduction to DevOps | Edureka
What to learn during the 21 days Lockdown | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Tableau Tutorial for Data Science | Edureka
Python Programming Tutorial | Edureka
Top 5 PMP Certifications | Edureka
Top Maven Interview Questions in 2020 | Edureka
Linux Mint Tutorial | Edureka
How to Deploy Java Web App in AWS| Edureka
Importance of Digital Marketing | Edureka
RPA in 2020 | Edureka
Email Notifications in Jenkins | Edureka
EA Algorithm in Machine Learning | Edureka
Cognitive AI Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Blue Prism Top Interview Questions | Edureka
Big Data on AWS Tutorial | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Kubernetes Installation on Ubuntu | Edureka
Introduction to DevOps | Edureka

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPTX
Configure Apache Mutual Authentication
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Comparative analysis of machine learning models for fake news detection in so...
sbt 2.0: go big (Scala Days 2025 edition)
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
MuleSoft-Compete-Deck for midddleware integrations
Build Your First AI Agent with UiPath.pptx
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
giants, standing on the shoulders of - by Daniel Stenberg
Early detection and classification of bone marrow changes in lumbar vertebrae...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Configure Apache Mutual Authentication
The influence of sentiment analysis in enhancing early warning system model f...
Rapid Prototyping: A lecture on prototyping techniques for interface design
future_of_ai_comprehensive_20250822032121.pptx
Training Program for knowledge in solar cell and solar industry
Module 1 Introduction to Web Programming .pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
Auditboard EB SOX Playbook 2023 edition.
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka

  • 1. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
  • 2. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Improving Critical Infrastructure Cybersecurity Why Cybersecurity Framework? Types of Cybersecurity Framework Cybersecurity Framework Components Agenda Steps to Implement Framework Coordination of Framework Implementation
  • 3. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Improving Critical Infrastructure Cybersecurity Executive Order 13636 12 February 2013 “It is the policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties”
  • 4. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training According to the Executive Order… Align policy, business and technological approaches to address cyber risks Prioritized, flexible, repeatable, performance-based, and cost- effective approach Identify areas for improvement to be addressed through future collaboration Be consistent with voluntary international standards
  • 5. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Why Cybersecurity Framework? It Results in a shift from compliance to action and specific outcomes It has built-in maturity model and gap analysis so you don't need additional maturity model on top of CSF It gives you a measure of where you are and where you need to go It can be implemented in stages or degrees which makes it more appealing to business
  • 6. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training What Is Cybersecurity Framework? The Framework is voluntary guidance, based on existing guidelines, and practices for organizations to better manage and reduce cybersecurity risk. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training
  • 7. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Types of Frameworks PCI-DSS It is designed to protect credit card, debit card, and cash card transactions ISO 27001/27002 Best practice recommendations for information security management and information security program elements. CIS-Critical Security Controls cyber protection that give noteworthy approaches to stop the present most inescapable attacks NIST Framework Improving critical infrastructure Cybersecurity to improve organization’s risks by leveraging standard methodologies and processes
  • 8. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training NIST: Most Popular among Frameworks NIST framework was developed in Feb 2013 after US Presidential Executive order To address national and economic security challenges Reduce cyber risks to critical Infrastructure To be voluntary (for private sector) Collaboratively developed with stakeholders
  • 9. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Objectives of the Framework Adaptable, flexible, and scalable Improve Organization’s readiness for managing cybersecurity risk Flexible, repeatable, and performance based Cost-effective Leverage standards, methodologies and processes Promote technology innovation Actionable across the enterprise- focus on outcomes 01 02 03 04 05 06 07
  • 10. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Cybersecurity Framework Components Framework Profile Framework Implementation Tiers Framework Core Are an association’s novel arrangement of their organizational prerequisites and goals, and assets against the coveted results of the Framework Core. Guides associations in overseeing and decreasing their Cybersecurity chances in a way that supplements an association’s current Cybersecurity and risk management processes. Describes how cybersecurity risk is managed by an organization and degree the risk management practices exhibit key characteristics
  • 11. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Implementation Tiers Tier 1 Partial Tier 2 Risk Informed Tier 3 Repeatable Tier 4 Adaptive The extent to which cybersecurity is considered in broader risk management decisions The degree to which the organization benefits my sharing or receiving information from outside parties The functionality and repeatability of cybersecurity risk managementRisk Management Process Risk Management Program External Participation
  • 12. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Core Respond What processes and assets need protection? What techniques can restore capabilities What safeguards are available? What techniques can identify incidents? What techniques can contain impacts on incidents?
  • 13. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Core: Identify Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO This function helps with building up a hierarchical comprehension in overseeing cybersecurity to frameworks, individuals, resources, information, and capacities
  • 14. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profiles: Protect Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO This function develop and implement the appropriate safeguards and controls to ensure delivery of critical infrastructure services
  • 15. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profiles: Detect Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO This Function characterizes the fitting exercises to recognize the event of a Cybersecurity occasion. The Detect Function empowers opportune revelation of Cybersecurity occasions.
  • 16. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profiles: Respond Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO This Function develop and implement the appropriate activities and controls to identify occurrence of a cybersecurity event. It bolsters the capacity to contain the effect of a potential Cybersecurity occurrence.
  • 17. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profiles: Recover Function Category ID Identify Asset Management ID.AM Business Environment ID.BE Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Information Protection Processes & Procedures PR.IP Maintenance PR.MA Protective Technology PR.PT Detect Anomalies and Events DE.AE Security Continuous Monitoring DE.CM Detection Processes DE.DP Respond Response Planning RS.RP Communications RS.CO Analysis RS.AN Mitigation RS.MI Improvements RS.IM Recover Recovery Planning RC.RP Improvements RC.IM Communications RC.CO The Recover Function distinguishes proper exercises to keep up plans for versatility and to re-establish any abilities or administrations that were impeded because of a Cybersecurity event.
  • 18. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Framework Profile Profiles can be used to identify opportunities for improving Cybersecurity posture by comparing the current profile (“as is” state with the target profile (“to be” state)
  • 19. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Steps to Implement Framework Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Prioritize & scope Create a Current Profile Create a Target Profile Orient Conduct a Risk Assessment Determine, analyze & prioritize gaps Step 7 Implement Action Plan
  • 20. CYBERSECURITY CERTIFICATION COURSE www.edureka.co/cybersecurity-certification-training Coordination of Framework Implementation Risk Management Implementation
  • 21. Copyright © 2018, edureka and/or its affiliates. All rights reserved. Don’t just learn it, MASTER it with