WEBVTT 00:00:05.490 --> 00:00:19.030 [Music]. 00:00:19.030 --> 00:00:21.359 1. Introduction to Cybersecurity 00:00:21.359 --> 00:00:25.140 Frameworks. In today's digital age, cybersecurity 00:00:25.140 --> 00:00:27.119 has become a top priority for 00:00:27.119 --> 00:00:29.880 individuals and organizations alike. With 00:00:29.880 --> 00:00:31.679 the increasing number of cyber threats 00:00:31.679 --> 00:00:33.719 and attacks, it is essential to have a 00:00:33.719 --> 00:00:35.520 comprehensive cybersecurity framework 00:00:35.520 --> 00:00:37.260 in place to protect sensitive 00:00:37.260 --> 00:00:39.420 information and data. Cybersecurity 00:00:39.420 --> 00:00:41.579 frameworks provide a structured approach 00:00:41.579 --> 00:00:43.860 to managing and mitigating cyber risks 00:00:43.860 --> 00:00:46.440 by outlining best practices, guidelines, 00:00:46.440 --> 00:00:48.960 and standards. In this article, we will 00:00:48.960 --> 00:00:51.059 explore three of the most widely used 00:00:51.059 --> 00:00:53.961 cybersecurity frameworks: the NIST Cybersecurity 00:00:53.961 --> 00:00:56.100 Framework, ISO 27,001 00:00:56.100 --> 00:00:58.079 Information Security Management System, 00:00:58.079 --> 00:01:00.360 and CIS Controls for effective cyber 00:01:00.360 --> 00:01:02.280 defense. By understanding these 00:01:02.280 --> 00:01:03.899 frameworks, you can better protect 00:01:03.899 --> 00:01:05.519 yourself and your organization from 00:01:05.519 --> 00:01:07.766 cyber threats and ensure that your cybersecurity 00:01:07.766 --> 00:01:09.299 measures are up to par with 00:01:09.299 --> 00:01:10.979 industry standards. 00:01:10.979 --> 00:01:15.420 2. NIST Cybersecurity Framework. 00:01:15.420 --> 00:01:17.580 The NIST Cybersecurity Framework is a 00:01:17.580 --> 00:01:19.320 set of guidelines and best practices 00:01:19.320 --> 00:01:21.420 designed to help organizations manage 00:01:21.420 --> 00:01:24.180 and reduce cybersecurity risks. It was 00:01:24.180 --> 00:01:26.040 developed by the National Institute of 00:01:26.040 --> 00:01:28.680 Standards and Technology (NIST) in 00:01:28.680 --> 00:01:30.979 response to Executive Order 00:01:30.979 --> 00:01:33.720 13,636, which called for the creation of a 00:01:33.720 --> 00:01:35.159 framework that would help critical 00:01:35.159 --> 00:01:37.259 infrastructure organizations improve 00:01:37.259 --> 00:01:40.020 their cybersecurity posture. The 00:01:40.020 --> 00:01:41.700 framework consists of five core 00:01:41.700 --> 00:01:44.280 functions: identify, protect, detect, 00:01:44.280 --> 00:01:47.280 respond, and recover. Each function is 00:01:47.280 --> 00:01:49.380 further broken down into categories and 00:01:49.380 --> 00:01:51.360 subcategories that provide more specific 00:01:51.360 --> 00:01:53.280 guidance on how to implement the 00:01:53.280 --> 00:01:54.540 framework. 00:01:54.540 --> 00:01:56.759 The Identify function focuses on 00:01:56.759 --> 00:01:59.280 understanding an organization's cybersecurity 00:01:59.280 --> 00:02:01.680 risks and vulnerabilities. This 00:02:01.680 --> 00:02:04.140 includes identifying all assets, systems, 00:02:04.140 --> 00:02:06.299 and data that need to be protected, as 00:02:06.299 --> 00:02:08.160 well as assessing the potential impact 00:02:08.160 --> 00:02:10.080 of a cyber attack. 00:02:10.080 --> 00:02:11.520 The Protect function involves 00:02:11.520 --> 00:02:13.379 implementing safeguards to protect 00:02:13.379 --> 00:02:15.660 against cyber threats. This includes 00:02:15.660 --> 00:02:17.580 measures such as access controls, 00:02:17.580 --> 00:02:19.800 encryption, and security awareness 00:02:19.800 --> 00:02:21.780 training for employees. 00:02:21.780 --> 00:02:24.060 The Detect function involves monitoring 00:02:24.060 --> 00:02:26.099 systems and networks for signs of a 00:02:26.099 --> 00:02:28.440 cyber attack. This includes implementing 00:02:28.440 --> 00:02:30.300 intrusion detection and prevention 00:02:30.300 --> 00:02:32.520 systems, as well as conducting regular 00:02:32.520 --> 00:02:34.680 vulnerability scans and penetration 00:02:34.680 --> 00:02:36.060 testing. 00:02:36.060 --> 00:02:38.160 The Respond function involves developing 00:02:38.160 --> 00:02:40.440 and implementing a plan to respond to a 00:02:40.440 --> 00:02:42.840 cyber attack. This includes establishing 00:02:42.840 --> 00:02:45.420 an incident response team, defining roles 00:02:45.420 --> 00:02:47.340 and responsibilities, and developing 00:02:47.340 --> 00:02:49.319 procedures for containing and mitigating 00:02:49.319 --> 00:02:51.480 the effects of an attack. 00:02:51.480 --> 00:02:53.700 Finally, the Recover function involves 00:02:53.700 --> 00:02:56.040 restoring normal operations after a 00:02:56.040 --> 00:02:58.620 cyber attack. This includes developing a 00:02:58.620 --> 00:03:00.720 business continuity plan, conducting 00:03:00.720 --> 00:03:03.000 backups of critical data, and ensuring 00:03:03.000 --> 00:03:05.040 that systems can be quickly restored in 00:03:05.040 --> 00:03:08.160 the event of an outage. Overall, the NIST 00:03:08.160 --> 00:03:10.140 Cybersecurity Framework provides a 00:03:10.140 --> 00:03:12.600 comprehensive approach to managing cybersecurity 00:03:12.600 --> 00:03:14.340 risks. By following its 00:03:14.340 --> 00:03:15.659 guidelines and best practices, 00:03:15.659 --> 00:03:17.640 organizations can better protect 00:03:17.640 --> 00:03:19.560 themselves against cyber threats and 00:03:19.560 --> 00:03:22.260 ensure the confidentiality, integrity, and 00:03:22.260 --> 00:03:25.080 availability of their sensitive data. 00:03:25.080 --> 00:03:28.560 3. ISO 27,001 Information Security 00:03:28.560 --> 00:03:32.459 Management System. The ISO 27,001 00:03:32.459 --> 00:03:34.500 Information Security Management System 00:03:34.500 --> 00:03:37.140 is a globally recognized framework that 00:03:37.140 --> 00:03:38.879 provides a systematic approach to 00:03:38.879 --> 00:03:41.340 managing sensitive information. It 00:03:41.340 --> 00:03:43.200 outlines a set of best practices for 00:03:43.200 --> 00:03:45.540 establishing, implementing, maintaining, 00:03:45.540 --> 00:03:47.400 and continually improving an 00:03:47.400 --> 00:03:49.140 organization's information security 00:03:49.140 --> 00:03:52.200 management system. The framework is 00:03:52.200 --> 00:03:54.120 designed to help organizations identify 00:03:54.120 --> 00:03:55.680 and manage risk to their information 00:03:55.680 --> 00:03:58.080 assets, including confidential data, 00:03:58.080 --> 00:04:00.060 intellectual property, and customer 00:04:00.060 --> 00:04:02.459 information. It also helps ensure 00:04:02.459 --> 00:04:05.280 compliance with legal, regulatory, and 00:04:05.280 --> 00:04:07.200 contractual requirements related to 00:04:07.200 --> 00:04:08.840 information security. 00:04:08.840 --> 00:04:12.299 ISO 27,001 consists of several key 00:04:12.299 --> 00:04:14.519 components, including risk assessment and 00:04:14.519 --> 00:04:16.560 treatment, security controls, and 00:04:16.560 --> 00:04:18.720 continuous improvement. The framework 00:04:18.720 --> 00:04:20.519 emphasizes the importance of a 00:04:20.519 --> 00:04:22.019 risk-based approach to information 00:04:22.019 --> 00:04:24.360 security, which involves identifying 00:04:24.360 --> 00:04:26.160 potential threats and vulnerabilities, 00:04:26.160 --> 00:04:28.500 assessing the likelihood and impact of 00:04:28.500 --> 00:04:30.540 those risks, and implementing appropriate 00:04:30.540 --> 00:04:33.300 controls to mitigate them. One of the 00:04:33.300 --> 00:04:36.180 strengths of ISO 27,001 is its 00:04:36.180 --> 00:04:38.580 flexibility. The framework can be adapted 00:04:38.580 --> 00:04:40.380 to suit the specific needs of different 00:04:40.380 --> 00:04:42.660 organizations, regardless of their size, 00:04:42.660 --> 00:04:45.660 industry, or location. It can also be 00:04:45.660 --> 00:04:47.580 integrated with other management systems, 00:04:47.580 --> 00:04:49.500 such as quality management or 00:04:49.500 --> 00:04:51.440 environmental management, to create a 00:04:51.440 --> 00:04:53.699 comprehensive approach to organizational 00:04:53.699 --> 00:04:55.139 governance. 00:04:55.139 --> 00:04:58.199 Overall, the ISO 27,001 Information 00:04:58.199 --> 00:05:00.600 Security Management System is a valuable 00:05:00.600 --> 00:05:02.520 tool for organizations looking to 00:05:02.520 --> 00:05:04.380 establish a robust and effective 00:05:04.380 --> 00:05:06.780 information security program. By 00:05:06.780 --> 00:05:08.340 following the framework's guidelines, 00:05:08.340 --> 00:05:10.500 organizations can better protect their 00:05:10.500 --> 00:05:12.720 sensitive information, reduce the risk of 00:05:12.720 --> 00:05:14.639 cyber attacks, and demonstrate their 00:05:14.639 --> 00:05:16.620 commitment to security to stakeholders 00:05:16.620 --> 00:05:18.620 and customers alike. 00:05:18.620 --> 00:05:21.720 4. CIS Controls for Effective Cyber 00:05:21.720 --> 00:05:24.600 Defense. The Center for Internet Security 00:05:24.600 --> 00:05:27.720 (CIS) Controls is a set of best practices 00:05:27.720 --> 00:05:29.880 designed to help organizations protect 00:05:29.880 --> 00:05:31.740 their systems and data from cyber 00:05:31.740 --> 00:05:34.020 threats. The controls are organized into 00:05:34.020 --> 00:05:36.960 three categories: basic, foundational, and 00:05:36.960 --> 00:05:38.460 organizational. 00:05:38.460 --> 00:05:40.740 The Basic controls include measures such 00:05:40.740 --> 00:05:42.720 as inventory and control of hardware 00:05:42.720 --> 00:05:45.660 assets, inventory and control of software 00:05:45.660 --> 00:05:47.759 assets, continuous vulnerability 00:05:47.759 --> 00:05:49.680 management, and control use of 00:05:49.680 --> 00:05:52.199 administrative privileges. These controls 00:05:52.199 --> 00:05:53.639 are considered essential for any 00:05:53.639 --> 00:05:55.800 organization that wants to establish a 00:05:55.800 --> 00:05:58.199 strong cybersecurity posture. 00:05:58.199 --> 00:06:00.240 The Foundational controls build upon the 00:06:00.240 --> 00:06:02.160 basic controls and include measures such 00:06:02.160 --> 00:06:04.500 as email and web browser protections, 00:06:04.500 --> 00:06:06.660 malware defenses, data recovery 00:06:06.660 --> 00:06:08.820 capabilities, and secure configurations 00:06:08.820 --> 00:06:11.699 for network devices. These controls are 00:06:11.699 --> 00:06:13.560 designed to provide additional layers of 00:06:13.560 --> 00:06:16.440 protection against common cyber threats. 00:06:16.440 --> 00:06:19.199 Finally, the Organizational controls focus on 00:06:19.199 --> 00:06:21.479 the policies, procedures, and training 00:06:21.479 --> 00:06:24.079 necessary to maintain an effective cybersecurity 00:06:24.079 --> 00:06:26.220 program. These controls include 00:06:26.220 --> 00:06:28.020 measures such as security awareness 00:06:28.020 --> 00:06:30.360 training, incident response planning, and 00:06:30.360 --> 00:06:33.300 penetration testing. By implementing the 00:06:33.300 --> 00:06:35.699 CIS controls, organizations can establish 00:06:35.699 --> 00:06:37.680 a comprehensive cybersecurity program 00:06:37.680 --> 00:06:40.080 that addresses both technical and 00:06:40.080 --> 00:06:42.780 organizational aspects of security. The 00:06:42.780 --> 00:06:44.759 controls are regularly updated based on 00:06:44.759 --> 00:06:47.039 new threats and vulnerabilities, ensuring 00:06:47.039 --> 00:06:49.259 that organizations stay up to date with 00:06:49.259 --> 00:06:52.000 the latest best practices in cybersecurity. 00:06:54.780 --> 00:07:10.470 [Music].