For business inquiries : (+971) 561803315

For special requests : (+971) 561803315

A propos de la formation NIST CyberSecurity Framework 2.0

The NIST Cybersecurity Framework (CSF) 2.0 is a set of guidelines and best practices for organizations to manage and enhance their cybersecurity defenses. It includes core functions such as Identify, Protect, Detect, Respond, and Recover. The framework helps organizations assess their cybersecurity posture, establish risk management processes, and create a tailored profile based on their specific needs. For the latest details, refer to the official NIST sources.

Détails
Objectifs pédagogiques de la formation NIST CyberSecurity Framework 2.0
  • Understand the challenges related to cyber risks and state-of-the-art responses
  • Grasp the key players in international cybersecurity
  • Assess their target maturity level
  • Conduct audits based on the NIST CSF framework
  • Describe alignment with NIST in relation to other frameworks.

Qui devrait suivre cette formation NIST CyberSecurity Framework 2.0 ?

Public visé par la formation NIST CyberSecurity Framework 2.0

CISOs or security correspondents, security architects, IT directors or managers, engineers, project managers (Technical and Functional), auditors required to integrate security requirements.

Prérequis de la formation NIST CyberSecurity Framework 2.0

Basic knowledge in cybersecurity or equivalent knowledge provided by BYR, SSI, or SRI courses.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation NIST CyberSecurity Framework 2.0


Module 1: Understanding Cybersecurity Challenges

Explore cyber risks and contemporary responses.

Recognize major international cybersecurity players.

Assess your organization's target maturity level.

Conduct audits based on the NIST CSF framework.

Describe alignment between NIST CSF and other frameworks.
 

Module 2: NIST – CSF Framework

Delve into cybersecurity challenges for vital US organizations.

Examine the legal framework, including the Cybersecurity Enhancement Act of 2014.

Understand the role of the National Institute of Standards and Technology (NIST).

Propose a comprehensive governance framework.

Explore key cybersecurity objectives of the NIST CSF.

Gain insights into digital risk management requirements and a risk governance approach.

Learn about NIST CSF certification and the involved stakeholders.
 

Module 3: Governance Approach to Cybersecurity

Build a robust cybersecurity strategy by analyzing cyber risks.

Effectively communicate cybersecurity aspects within your ecosystem.

Define clear cybersecurity postures and objectives.

Evaluate and audit the effectiveness of existing cybersecurity measures.

Identify and prioritize improvement opportunities in a continuous and reproducible process.

Appreciate improvements toward set security objectives, mastering residual risks.

Raise staff awareness and contribute to a cyber risk-aware culture.


Module 4: Framework Structure

Understand the core framework with its set of security activities and functions.

Explore framework implementation levels, grading security based on goals and activity criticality.

Integrate agility and responsiveness from Levels 1 to 4.

Define a framework profile expressing security needs and responses through practices and standards.

Implement metrics and self-assessment tools.

Explore available documentation structure in English and French, including sections and Annex A.


Module 5: The Five Core Functions of NIST CSF

Identify (Risk Approach to Governance):

Asset Management

Business Environment

Governance

Risk Assessment

Risk Management

Security Culture

Protect (Risk Mitigation by Preventive Measures):

Access Control

Awareness Training

Data Security

Information Protection

Maintenance

Protective Technology

Detect (Detection of Cyber Incidents and Flaws):

Anomalies and Events

Continuous Monitoring

Detection Processes

Respond (Residual Risk Treatment and Corrective Measures):

Response Planning

Communications

Analysis

Mitigation

Improvements

Recover (Resilience and Restoration of Altered Assets):

Recovery Planning

Improvements

Communications


Module 6: Maturity Rules of NIST CSF Implementation

Explore a maturity model similar to CMM.

Choose the target maturity level based on appetite, risk preference, and stakeholder expectations.

Progress from Level 1 (partial) to Level 2 (informed) and Level 3 (repeatable).

Achieve Level 4 (adaptive) with continuous improvement and strong interactions with the ecosystem.

Establish the relationship between core processes and the target maturity level through self-assessment and audit.

Implement the necessary organization, functions, and responsibilities to achieve set objectives.

Identify and coordinate decision-making levels (Senior Executive, Business/Process, Implementation/Operations).


Module 7: NIST CSF in the French/European Cyber Ecosystem

Implement the framework in ACPR controls, Bank of France, BCE.

Integrate NIST CSF for industrial SI risk management (NIST-800-82).

Develop Security Assurance Plans based on NIST questionnaires.

Evaluate suppliers and conduct audits based on the NIST CSF framework.

Explore the use of other NIST frameworks (800-53, …).


Module 8: Implementation and Deployment of NIST CSF

Assess the NIST maturity of your organization.

Create a criteria grid for easy NIST maturity evaluation.

Analyze existing security based on the NIST model.

Determine target maturity levels and the roadmap to achieve them.

Compare NIST CSF with ISO 27001, ISO 27002:2022, ISO 27110:2021, and SOC 2.

Evaluate the effectiveness of NIST CSF as the best security framework.

Conclude with a decision on NIST-CSF adoption.

Formations Similaires
CISA – Certified Information Systems Auditor Détails
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click