Тёмный

Risk Management Framework (RMF) Overview 

CISO Global
Подписаться 18 тыс.
Просмотров 97 тыс.
50% 1

Опубликовано:

 

28 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 55   
@Q.Me601
@Q.Me601 5 лет назад
Great video! I'm new to RMF but your teaching-learning presentation style made this easy to comprehend. Thank you.
@justinbrown6743
@justinbrown6743 5 лет назад
Awesome job... Well spoken! I appreciate the information and details.
@nixonmuluh1
@nixonmuluh1 5 лет назад
Nice overview of RMF. Thanks was very helpful.
@MilitantTalker
@MilitantTalker 4 года назад
Just came by to fact check...very good video/explanation.
@kssaz3578
@kssaz3578 3 года назад
useful/informative - good intro to the big world of RMF and its associated topics
@jessicajurado9414
@jessicajurado9414 3 года назад
Thank you for the video. This was explained simply enough for me to understand :)
@subhajitbhuiya557
@subhajitbhuiya557 5 лет назад
Great Video !
@_peggiesue_
@_peggiesue_ 3 года назад
Best Video, very easy to understand
@kennyq45
@kennyq45 4 года назад
Thanks for the the overview. Very informative. Can you make another video that goes a little more in-depth?
@piiqmediarisk5241
@piiqmediarisk5241 4 года назад
Terrific Content
@EloySanchezmreloysanchez
@EloySanchezmreloysanchez 4 года назад
Nice overview. Thanks.
@rav8149
@rav8149 2 года назад
Are these relevant in usual enterprise IT situations ?
@josephsasu3608
@josephsasu3608 3 года назад
Just a quick question on step 3 and 4,why don't we assess the situation before we implement,if we implement before and find out the situation is on different level and now we can't asses it.just asking.
@ruel1072
@ruel1072 3 года назад
Risk assessments are done even prior to step 1, into step 1, and after step 1. Doing this sets things up prior to selection of security controls. Also, during step 3 (Implementation), the information system isn't "live" yet. It's still undergoing testing/evaluation. The system doesn't go live until after the Authorizing Official approves the system for operation. In any case for the sake of this discussion, the system stays relatively safe until it becomes operational.
@ruel1072
@ruel1072 3 года назад
There are also two types of assessments: security control assessments (what you're talking about) and risk assessments. They're both different but related to each other.
@randyg.7940
@randyg.7940 Год назад
Thx bro!!!
@eugineaugustinedsouza9307
@eugineaugustinedsouza9307 4 года назад
GREAT STUFF
@VsnsmnGndmd
@VsnsmnGndmd Месяц назад
Miller Sarah Clark Laura Taylor Kimberly
@donewithdemocrats
@donewithdemocrats 4 года назад
Nice job! I am thumbs up #178!
@cgao5599
@cgao5599 Год назад
Yes, latest RMF step is now -Prepare. Therefore, it should be 7 steps for RMF now.
@alexb1972
@alexb1972 5 лет назад
Excellent video - well explained - thanks!
@jsschool1681
@jsschool1681 5 лет назад
Great overview! The high level reminders, and newly learned details, are greatly appreciated!
@cisoglobalinc
@cisoglobalinc 5 лет назад
Thanks! We appreciate the feedback!
@tramelhines
@tramelhines 3 года назад
Its important to understand that the controls are recommended, not mandatory. But a contingency plan, or counter process or POAM is needed in its place.
@brad6440
@brad6440 5 лет назад
This doesn’t seem very high level. Just another overview with a few specific examples given. It is a good summary though. Just call it what it is.
@latoyaamb3r
@latoyaamb3r 4 года назад
Isn't an overview inherently high level?
@gatomas805
@gatomas805 3 года назад
You mentioned artifacts at 8:30 when going through an audit. Would you please list some examples of an artifact? Would an artifact include screenshots that controls have been met?
@setnaffa
@setnaffa 5 лет назад
Nice job!
@KennethBrown-o2w
@KennethBrown-o2w 8 дней назад
Walker Carol Thomas Steven Lewis Laura
@VsnsmnGndmd
@VsnsmnGndmd Месяц назад
Young Deborah Hernandez Susan White Lisa
@dasboot-yp7xv
@dasboot-yp7xv 4 года назад
Well done! This is a huge process within DoD.
@chrisharden7033
@chrisharden7033 3 года назад
Excellent video, Christian, thank you!
@AIRHAIRHAIRHAIRH
@AIRHAIRHAIRHAIRH Год назад
How do you obtain the RMF certification
@Passport2Passion
@Passport2Passion 4 года назад
Very useful! Thanks a lot
@theriskexperiencepodcast5047
@theriskexperiencepodcast5047 4 года назад
Excellent
@fok198
@fok198 4 года назад
Excellent Overview of RMF
@jessyc3988
@jessyc3988 Год назад
Nice
@akassebaum
@akassebaum 2 года назад
You're missing the new addition to 800-37 rev2, which is Prepare.
@kapil28300
@kapil28300 4 года назад
Great video. You made it look do easy. Any detailed version of this RMF video ?
@evettetepet8184
@evettetepet8184 4 года назад
Good job sir, am interested in the 4 days class. Can u sent me the link sir
@CarlosHernandez-jq3yk
@CarlosHernandez-jq3yk 2 года назад
Thank you for the explanation. Great video.
@jeromewortham3848
@jeromewortham3848 3 года назад
Good video. What statistics do you capture for RMF?
@MsLadelove
@MsLadelove 2 года назад
analyzed it perfectly thank you
@buhlaji
@buhlaji 3 года назад
This was very useful! Thank you!
@drolmuc
@drolmuc 2 года назад
i love risjk of rain 2 :))()
@magnus5316
@magnus5316 2 года назад
Very simple and detailed
@michaelschwartz8922
@michaelschwartz8922 2 года назад
Really well done!
@joyceyeboah5842
@joyceyeboah5842 2 года назад
Thanks Sir!
@ajithmurugesan4326
@ajithmurugesan4326 3 года назад
Great video 👍
@jezreelsantos733
@jezreelsantos733 2 года назад
Great video
@리마-x5s
@리마-x5s Год назад
감사합니다👏🏼
@credit8668
@credit8668 5 лет назад
Thanks for the video mate!
@fatherhood4629
@fatherhood4629 3 года назад
Good overview. I need that link for your RMF course. Please provide link
@ilikepiez8
@ilikepiez8 3 года назад
please did you get the link for the RMf course? if yes can you p[ease send it to me
Далее
Understanding Cybersecurity Risk Management
34:55
Просмотров 61 тыс.
What is Risk Management? | Risk Management process
10:55
RMF ISSO Interview Questions 1
32:42
Просмотров 40 тыс.
Building a Cybersecurity Framework
8:27
Просмотров 35 тыс.
Why Cybersecurity Training is a SCAM
10:37
Просмотров 178 тыс.