Companies Home Search Profile

Cyber Crisis Management with NIST Cybersecurity Framework (CSF) 2.0

Focused View

Kip Boyle

55:31

0 View
  • 01 - Cyber crisis management as a lifecycle.mp4
    00:39
  • 01 - Understanding your cyber environment.mp4
    03:25
  • 02 - Resource allocation and team building.mp4
    03:11
  • 01 - Conducting and utilizing risk assessments.mp4
    02:52
  • 02 - Risk assessment and scenario planning.mp4
    02:41
  • 01 - Access control and identity management.mp4
    02:56
  • 02 - Protecting data through encryption and other techniques.mp4
    02:54
  • 03 - Security awareness training.mp4
    02:33
  • 01 - Implementing continuous monitoring solutions.mp4
    02:51
  • 02 - Threat detection techniques.mp4
    02:58
  • 01 - Rapid assessment and triage.mp4
    02:55
  • 02 - Immediate response strategies.mp4
    02:59
  • 03 - Escalation procedures.mp4
    02:41
  • 01 - Recovery planning.mp4
    02:54
  • 02 - Internal communication strategies.mp4
    03:09
  • 03 - Media relations during cyber crises.mp4
    03:57
  • 04 - Learning from cyber incidents.mp4
    02:57
  • 01 - Tailoring the NIST CSF for your organization.mp4
    03:21
  • 02 - Building a culture of cyber resilience.mp4
    03:38
  • Description


    Effective cyber crisis management isn’t only focused on incident response. You also need to prepare in anticipation of a crisis. The course covers a broad spectrum of cyber crisis management activities, from preventive measures through to recovery, aligned with internationally recognized practices contained in the NIST Cybersecurity Framework v2. Instructor Kip Boyle focuses on the CSF's six core functions: govern, identify, protect, detect, respond, and recover. Kip explores each of these functions and its relevance to cyber crisis management, using real-life case studies so you can get hands-on experience.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    I’ve been working in cybersecurity since 1992. I started as an air force officer, leading information technology teams. My assignments had us handling very sensitive information related to air-to-air weapons testing, so we were expected to practice what I now call “good cyber hygiene”. My most challenging job during this time was director of wide area network security for the F-22 “Raptor”. At the time, we were getting ready for the first production jets to come down the assembly line. It was very exciting! After the USAF, as a project leader at Stanford Research (SRI), I helped many Fortune 100 firms grapple with cybersecurity on a large scale. The problems they were dealing with were often 5 years or more ahead of the mainstream. So, there were no “off-the-shelf” solutions and many of our customers didn’t even know where to start. With no one else to turn to, they would come to us. Fast forward a few years and I was selected to be Chief Information Security Officer (CISO) of an insurance company. They owned a few subsidiaries, so I was also providing cybersecurity leadership to senior decision-makers of a community bank, credit union, debit/credit card transaction processor, and an IT managed service provider. I learned a lot about the business value of cybersecurity during those years. Then, in June of 2015, I launched my own company, Cyber Risk Opportunities. These days, cyberattacks are hurting businesses, even bankrupting them. That's wrong! We help executives manage cyber as the business risk it has become. So they’ll be ready no matter what happens. Setting priorities is a big goal in our work. Today, we have a lot of customers. Right now, we’re helping both a professional basketball team and a biotech company optimize their cyber risk management programs. It’s great to be able to use the same approach to help organizations that are so different in just about every obvious way. But, just under the surface, they are both very similar in terms of the cyber risk practices they need to follow. My mission is to enable executives to become more proficient cyber risk managers. Our customers include the U.S. Federal Reserve Bank, Boeing, Visa, Intuit, Mitsubishi, DuPont, and many others. And, because so many organizations in the US need better cyber risk management at the executive level, we’ve launched a partnership program so other professionals in positions of trust, such as lawyers and technology service providers, can use our tools and methods to help their existing customers thrive as cyber risk managers. Ask me about it!
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 19
    • duration 55:31
    • English subtitles has
    • Release Date 2025/01/16