Assess and Manage Risk with the NIST Cybersecurity Framework
Level: Intermediate
Course #: 2051
Risk Assessment & Management Training for the U.S. Government
This NIST Cybersecurity Framework training course will teach US Government cybersecurity staff to protect their organization from unacceptable losses by effectively assessing and managing risk. They will learn how to employ the NIST Cybersecurity Framework defined by The National Institute of Standards and Technology (NIST), and ensure their organization meets the cyber security laws and regulations imposed on all U.S. Government agencies.
Key Features of this NIST Training:
After-course instructor coaching benefit
Learning Tree end-of-course exam included
You Will Learn How To:
Implement the NIST Risk Management Framework for assessing and managing the risks to your organization’s information infrastructure
Select and implement security controls that satisfy FISMA, OMB, and Department/Agency requirements
Maintain an acceptable security posture over the system life cycle
Apply FedRAMP-compliant cloud-based solutions
Goals Live, Instructor-Led – Live, Online Training
In Class & Live, Online Training
Important NIST Cybersecurity Framework Course Information
Course Materials
Attendees receive a complete set of course notes and a workbook containing all of the course workshops
Every source document used in developing the course may be downloaded from the NIST Website free of charge
NIST Cybersecurity Framework Course Outline
Introduction to Risk Assessment and Management
Ensuring compliance with applicable laws, regulations, policies and directives
Protecting the organization from unacceptable losses
Describing the NIST Risk Management Framework (RMF)
Applying NIST risk management processes
Characterizing System Security Requirements
Defining the system
Prescribing the system security boundary
Pinpointing system interconnections
Incorporating characteristics of Industrial Control Systems (ICS) and FedRAMP-compliant cloud-based systems
Identifying security risk components
Estimating the impact of compromises to confidentiality, integrity and availability
Adopting the appropriate model for categorizing system risk
Specialized considerations for U.S. Government classified information
Setting the stage for successful risk management
Documenting critical risk assessment and management decisions in the System Security Plan (SSP) Appointing qualified individuals to risk governance roles
Selecting Appropriate Security Controls
Assigning a security control baseline
Investigating security control families
Determining the baseline from system security impact
Specialized considerations for National Security Systems (NSS)
Tailoring the baseline to fit the system
Examining the structure of security controls, enhancements and parameters
Binding control overlays to the selected baseline
Gauging the need for enhanced assurance
Distinguishing system-specific, compensating and non-applicable controls
Reducing Risk through Effective Control Implementation
Specifying the implementation approach
Maximizing security effectiveness by “building in” security
Reducing residual risk in legacy systems via “bolt-on” security elements
Applying NIST controls
Enhancing system robustness through selection of evaluated and validated components
Coordinating implementation approaches to administrative, operational and technical controls
Providing evidence of compliance through supporting artifacts
Implementing CNSSI-1253 for national security systems
Assessing Compliance Scope and Depth
Developing an assessment plan
Prioritizing depth of control assessment
Optimizing validation through sequencing and consolidation
Verifying compliance through tests, interviews and examinations
Formulating an authorization recommendation
Evaluating overall system security risk
Mitigating residual risks
Publishing the Plan of Action and Milestones (POA&M), the risk assessment and recommendation
Authorizing System Operation
Aligning authority and responsibility
Quantifying organizational risk tolerance
Elevating authorization decisions in high-risk scenarios
Forming a risk-based decision
Appraising system operational impact
Weighing residual risk against operational utility
Issuing Authority to Operate (ATO)
Maintaining Continued Compliance
Justifying continuous reauthorization
Preserving an acceptable security posture
NIST Training FAQs
What is cybersecurity risk assessment?
Going through the process of identifying, analysing and evaluating risk. It helps to guarantee that the cybersecurity controls you are choosing are suitable for the risks your organization may face.
What is the NIST Cybersecurity Framework?
NIST is only used in the United States, and provides a policy framework for computer security guidance on how private sector organizations can assess and then improve their ability to prevent, detect, and respond to cyber attacks.
Can non US Government employees take this course?
Yes, any one who is interested in NIST training may register to take this course.
Can I learn about the NIST Cybersecurity Framework online?
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.