CMDBID: 60348 | Course Code: NIST | Duration: 2 Days
This theory based course provides a foundation awareness of the five functional pillars (Identify, Protect, Detect, Response and Recover) of the National Institute of Standards and Technology (NIST) security framework.
Attendees will gain a recognised course certificate.
Module 1 - Asset Management
The data personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistent with their relative importance to business objectives and the organisation's risk strategy.
Module 2 - Business Environment
The organisation's mission, objectives, stakeholders, and activities are understood and prioritised; this information is used to inform cybersecurity roles, responsibilities, and risk management decisions.
Module 3 – Governance
The policies, procedures, and processes to manage and monitor the organisation's regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk.
Module 4 – Risk Assessment
The organisation understands the cybersecurity risk to organisational operations (including mission, functions, image, or reputation), organisational assets, and individuals.
Module 5 - Risk Management Strategy
The organisation's priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions.
Module 6 – Access Control
Access to assets and associated facilities is limited to authorised users, processes, or devices, and to authorised activities and transactions.
Module 7 – Awareness and Training
The organisation's personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements.
Module 8 - Data Security
Information and records (data) are managed consistent with the organisation's risk strategy to protect the confidentiality, integrity, and availability of information.
Module 9 - Information Protection Processes and Procedures
Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organisational entities), processes, and procedures are maintained and used to manage protection of information systems and assets.
Module 10 - Maintenance
Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures.
Module 11 - Protective Technology
Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements.
Module 12 - Anomalies and Events
Anomalous activity is detected in a timely manner and the potential impact of events is understood.
Module 13 - Security Continuous Monitoring
The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures.
Module 14 - Detection Processes
Detection processes and procedures are maintained and tested to ensure timely and adequate awareness of anomalous events.
Module 15 - Response Planning
Response processes and procedures are executed and maintained, to ensure timely response to detected cybersecurity events.
Module 16 - Communications
Response activities are coordinated with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.
Module 17 - Analysis
Analysis is conducted to ensure adequate response and support recovery activities.
Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well
as public sector institutions such as the Department of Defence and the Department of Health.