Professional Documents
Culture Documents
Introduction
The Problem . .
Profile of an Attack
Threats
Vulnerabilities
Cyber Risk
Controls
Risk
Risk Assessments
Introduction
NIST-CSF Overview
Evolution of NIST-CSF
NIST-CSF Tier
Introduction
Lesson: Identify
Lesson: Protect
Lesson: Detect
Lesson: Respond
Core Function Respond - Purpose, Goals & Objectives
Lesson: Recover
Implementation Tiers
Tier 1: Partial
Tier 3: Repeatable
Tier 4: Adaptive
Profiles
Framework Profiles
Profile – An Example
Introduction
Principles of Adaptation
Simplify Everything
CIIS Approach
Step 2: Orient