Тёмный

Risk Assessment as per NIST SP 800-30 

Ingram Micro Cyber Security
Подписаться 3,7 тыс.
Просмотров 25 тыс.
50% 1

Опубликовано:

 

10 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 16   
@olalkn
@olalkn 3 года назад
This training is bang on and excellently delivered. I thoroughly enjoyed it and learned a lot. Thank you guys
@elvislam4649
@elvislam4649 2 года назад
Explanation is clear and direct, good job.
@ho96
@ho96 Год назад
Thanks for an excellent lectures and so smooth and made me imagine how long it's going to be before i can speak smoothly like you do😀. Great job and thank you!
@ijeomaugwo7067
@ijeomaugwo7067 3 года назад
This is a fantastic training. I learnt alot , thank you.
@estarr28
@estarr28 11 месяцев назад
Great information! Thank you 👍
@jameslee4568
@jameslee4568 2 года назад
Very informative, thanks!
@merazhussain6022
@merazhussain6022 8 месяцев назад
Brilliant presentation
@techiegz
@techiegz 4 года назад
Around the 26th minute mark, where you mention that NIST SP 800-30 does not identify assets prior to conducting a risk assessment. While this is technically true of the SP, I have to point out that assets are identified in NIST SP 800-37 prior to assessing risk; asset identification is covered/handled in Phase 1 of the NIST Risk Management Framework (RMF) prior to assessing risks on the identified assets using the 800-30. If assets aren't first identified, how do we know what threat sources are relevant, if for example the asset is a computer network vs the world's most comfortable bed? In NIST SP 800-37 Revision 2, Task P-10 is Asset Identification while subsequent Task P-14 is Risk Assessment on the earlier identified assets using NIST SP 800-30. And in a prior Task P-3, there's also a risk assessment for the organization itself, which of course is already identified if it's seeking to assess risks on itself. I suggest not to use any NIST SP in isolation because their contents are intertwined so as to avoid misunderstanding them. Better yet, use the 800--37 as a reference point because it ties together relevant NIST SPs as they apply in their respective RMF process.
@felicitasamana586
@felicitasamana586 3 года назад
I saw your comment before listening. However, asset was mentioned. He said it numerous times..you can listen again.
@ikey1119
@ikey1119 2 года назад
I listened to this entire video while I went for a run and came back to the comments. This comment really tied it all together for me. Coming from an RMF perspective your right, NIST 800-37 ties them all together from a wholistic point of view. Which make this video much more palatable. Thanks
@bggees
@bggees Год назад
These Frameworks are not holy grails and are guidance for the most part. For example, some well seasoned Risk professionals would only apply what makes sense to their organization only. Some even prefer FAIR framework/approach, which NIST has also been recommending.
@techiegz
@techiegz Год назад
@@bggees You mean the Frameworks can be "tailored" to your org's needs? Yes, but that's a different argument. If it provides guidance to identify assets prior to assessments and you tailor out that step, it's on you. And tailoring out critical steps is where org's get into trouble that result in flaws and gaps in their security program/processes. Bottom line is that you have to identify the asset(s) in scope before you do whatever you need to do.
@bggees
@bggees Год назад
@@techiegz I agree with you 💯. Assets identification must come first, before any other steps such as, threat community, threat types, effects, etc.
@tauqeerahmed394
@tauqeerahmed394 2 года назад
fantastic
@tohkengleng9034
@tohkengleng9034 2 года назад
Money
Далее
PCI DSS   Foundational Training
1:40:36
Просмотров 75 тыс.
Conducting a cybersecurity risk assessment
52:42
Просмотров 87 тыс.
NIST SP 800 30
17:04
Просмотров 14 тыс.