SlideShare a Scribd company logo
1 of 19
Conducting a NIST
Cybersecurity
Framework (CSF)
Assessment
Nicholas Davis
CISSP, CISA, CRISC, CCSP, HCISPP
March 6, 2024
Nicholas Davis
CISSP, CISA, CRISC, CCSP, HCISPP
 25 years of cybersecurity experience developing
and implementing comprehensive information
security programs
 Providing strategic guidance and consultation:
Advising leadership on security issues, threats, and
mitigation strategies.
 Assessment and audit background in NIST, ISO, PCI,
HIPAA, GDPR
Strengthen Your Cybersecurity Posture with
NIST CSF Assessment
Identify and manage cybersecurity risks: The framework helps you
systematically identify vulnerabilities and prioritize your efforts to
address them.
Improved compliance: By aligning your security practices with the
framework, you can demonstrate compliance with relevant
regulations and industry standards.
Enhanced communication: The framework provides a common
language for discussing cybersecurity across different departments
and stakeholders.
NIST CSF Assessment Process Overview
Five Core Functions: The framework is organized around five
core functions: Identify, Protect, Detect, Respond, and Recover.
Categories and Subcategories: Each function is further divided
into categories and subcategories, providing a detailed
framework for assessing your security posture.
Benefits of Conducting a NIST CSF
Assessment
Enhanced decision-making: Gain insights to make informed
decisions about your cybersecurity investments.
Improved resilience: Strengthen your ability to respond to and
recover from cyberattacks.
Increased stakeholder confidence: Demonstrate your
commitment to cybersecurity best practices.
Let's Get Started!
I am an experienced cybersecurity professional with extensive
knowledge of the NIST CSF framework.
I can guide you through the assessment process and help you
achieve your security goals.
What is the NIST CSF?
 The NIST CSF is a voluntary framework developed by the National Institute of
Standards and Technology.
 It provides a flexible, risk-based approach to help organizations manage their
cybersecurity risks.
 The framework consists of five core functions:
 Identify: Identify critical assets and their dependencies.
 Protect: Implement safeguards to protect those assets.
 Detect: Detect security events.
 Respond: Respond to security incidents.
 Recover: Recover critical capabilities after an incident.
Preparing for the Assessment
Define the scope: Specify the systems, assets, data, and
functions to be assessed.
Gather information: Collect relevant documentation, policies,
procedures, and risk assessments.
Assemble the assessment team: Include individuals with
expertise in security, business processes, and risk management.
Identify Function
 Identify critical assets and their dependencies.
 Document risk management processes.
 Analyze business environment and supply chain.
Protect Function
 Review security controls for access control, data security, and information
protection.
 Evaluate awareness and training programs.
 Assess protective technology implementation.
Detect Function
 Evaluate security continuous monitoring and detection processes.
 Test anomaly and event detection capabilities.
Respond Function
 Review incident response plan and procedures.
 Assess communication protocols and recovery procedures.
Recover Function
 Evaluate data recovery and restoration plans.
 Assess business continuity and disaster recovery capabilities.
Documenting and Reporting
 Document the findings of the assessment for each function.
 Identify areas of strength and areas for improvement.
 Develop a remediation plan to address identified gaps.
 Report the assessment findings to relevant stakeholders.
Controls Assessment
Risk Ranking
Reporting to Senior Leadership
 A NIST CSF report to senior leadership should be concise, informative, and
actionable. It should highlight the key findings of the assessment and
provide recommendations for improvement, all in a language
understandable to a non-technical audience.
Discussion
Questions
Comments
Next Steps
End of Presentation

More Related Content

Similar to Conducting a NIST Cybersecurity Framework (CSF) Assessment

Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security programabdulkhalid murady
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramTammy Clark
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)April Mardock CISSP
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security programWilliam Godwin
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfpriyanshamadhwal2
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkWilliam McBorrough
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management FrameworkJoseph Wynn
 

Similar to Conducting a NIST Cybersecurity Framework (CSF) Assessment (20)

Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security program
 
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security Program
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Cyber-Risk-Management-Assessment (1)
Cyber-Risk-Management-Assessment (1)Cyber-Risk-Management-Assessment (1)
Cyber-Risk-Management-Assessment (1)
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 

More from Nicholas Davis

Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 

More from Nicholas Davis (20)

Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 

Recently uploaded

India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Recently uploaded (20)

India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 

Conducting a NIST Cybersecurity Framework (CSF) Assessment

  • 1. Conducting a NIST Cybersecurity Framework (CSF) Assessment Nicholas Davis CISSP, CISA, CRISC, CCSP, HCISPP March 6, 2024
  • 2. Nicholas Davis CISSP, CISA, CRISC, CCSP, HCISPP  25 years of cybersecurity experience developing and implementing comprehensive information security programs  Providing strategic guidance and consultation: Advising leadership on security issues, threats, and mitigation strategies.  Assessment and audit background in NIST, ISO, PCI, HIPAA, GDPR
  • 3. Strengthen Your Cybersecurity Posture with NIST CSF Assessment Identify and manage cybersecurity risks: The framework helps you systematically identify vulnerabilities and prioritize your efforts to address them. Improved compliance: By aligning your security practices with the framework, you can demonstrate compliance with relevant regulations and industry standards. Enhanced communication: The framework provides a common language for discussing cybersecurity across different departments and stakeholders.
  • 4. NIST CSF Assessment Process Overview Five Core Functions: The framework is organized around five core functions: Identify, Protect, Detect, Respond, and Recover. Categories and Subcategories: Each function is further divided into categories and subcategories, providing a detailed framework for assessing your security posture.
  • 5. Benefits of Conducting a NIST CSF Assessment Enhanced decision-making: Gain insights to make informed decisions about your cybersecurity investments. Improved resilience: Strengthen your ability to respond to and recover from cyberattacks. Increased stakeholder confidence: Demonstrate your commitment to cybersecurity best practices.
  • 6. Let's Get Started! I am an experienced cybersecurity professional with extensive knowledge of the NIST CSF framework. I can guide you through the assessment process and help you achieve your security goals.
  • 7. What is the NIST CSF?  The NIST CSF is a voluntary framework developed by the National Institute of Standards and Technology.  It provides a flexible, risk-based approach to help organizations manage their cybersecurity risks.  The framework consists of five core functions:  Identify: Identify critical assets and their dependencies.  Protect: Implement safeguards to protect those assets.  Detect: Detect security events.  Respond: Respond to security incidents.  Recover: Recover critical capabilities after an incident.
  • 8. Preparing for the Assessment Define the scope: Specify the systems, assets, data, and functions to be assessed. Gather information: Collect relevant documentation, policies, procedures, and risk assessments. Assemble the assessment team: Include individuals with expertise in security, business processes, and risk management.
  • 9. Identify Function  Identify critical assets and their dependencies.  Document risk management processes.  Analyze business environment and supply chain.
  • 10. Protect Function  Review security controls for access control, data security, and information protection.  Evaluate awareness and training programs.  Assess protective technology implementation.
  • 11. Detect Function  Evaluate security continuous monitoring and detection processes.  Test anomaly and event detection capabilities.
  • 12. Respond Function  Review incident response plan and procedures.  Assess communication protocols and recovery procedures.
  • 13. Recover Function  Evaluate data recovery and restoration plans.  Assess business continuity and disaster recovery capabilities.
  • 14. Documenting and Reporting  Document the findings of the assessment for each function.  Identify areas of strength and areas for improvement.  Develop a remediation plan to address identified gaps.  Report the assessment findings to relevant stakeholders.
  • 17. Reporting to Senior Leadership  A NIST CSF report to senior leadership should be concise, informative, and actionable. It should highlight the key findings of the assessment and provide recommendations for improvement, all in a language understandable to a non-technical audience.

Editor's Notes

  1. n today's ever-evolving cybersecurity landscape, organizations face an increasing number of threats. Conducting a NIST Cybersecurity Framework (CSF) assessment can be a valuable tool to identify, manage, and mitigate these risks. Let's explore how it can benefit your organization. A NIST CSF assessment is not just about compliance; it's about proactively managing your cybersecurity posture. By identifying and addressing your vulnerabilities, you can reduce the likelihood and impact of cyberattacks. Additionally, the framework can help you communicate your security efforts effectively to internal and external stakeholders.
  2. The NIST CSF is a flexible framework that can be adapted to any organization's size and industry. The five core functions provide a comprehensive roadmap for assessing your cybersecurity posture, and the categories and subcategories offer a granular level of detail to guide your evaluation.
  3. Bullet 1: Enhanced decision-making: Speaker Notes By conducting a NIST CSF assessment, you gain valuable insights into your organization's cybersecurity posture. This information allows you to make informed decisions about where to invest your resources to improve your security effectiveness. For example, the assessment might reveal that your current awareness training program is not effective, prompting you to invest in a more robust program. Bullet 2: Improved resilience: Speaker Notes The NIST CSF assessment helps you identify and address weaknesses in your cybersecurity program. This process strengthens your ability to respond to and recover from cyberattacks. By having a clear understanding of your risks and vulnerabilities, you can develop a more effective incident response plan and implement stronger recovery capabilities. Bullet 3: Increased stakeholder confidence: Speaker Notes Conducting a NIST CSF assessment demonstrates your organization's commitment to cybersecurity best practices. This can increase confidence among stakeholders, such as investors, customers, and partners, that their data and assets are protected. A successful assessment can also serve as a competitive differentiator, showcasing your commitment to security in an increasingly cyber-threatened landscape.
  4. By conducting a NIST CSF assessment, you can gain valuable insights into your organization's cybersecurity posture. This information can be used to make informed decisions about where to allocate resources and improve your overall security posture. Additionally, a successful assessment can boost stakeholder confidence in your organization's commitment to cybersecurity. Conducting a NIST CSF assessment can be a complex process, but it doesn't have to be done alone. I can guide you through each step of the process, from planning and preparation to implementation and reporting. Together, we can help your organization achieve a more secure future. I hope these slides provide a clear and concise overview of the value and process of a NIST CSF assessment. Feel free to tailor the content and speaker notes to your specific audience and expertise.
  5. The NIST CSF is a valuable tool that can help organizations of all sizes improve their cybersecurity posture. It provides a structured approach for identifying, protecting, detecting, responding to, and recovering from cyber threats.
  6. Before we begin the assessment, it's crucial to clearly define the scope. This helps ensure we focus on the most critical areas and avoid wasting time and resources. Next, we need to gather information about our current security posture. This information will be essential for evaluating our strengths and weaknesses. Finally, we need to assemble a qualified assessment team. This team should have the necessary expertise to effectively assess all aspects of our cybersecurity program.
  7. Bullet 1: Identify critical assets and their dependencies. Speaker Notes The first step in managing risk is understanding what you need to protect. This involves identifying your critical assets, which could be anything from physical equipment and data to intellectual property and reputation. We also need to understand the dependencies between these assets. How do they rely on each other to function? Identifying these dependencies helps us understand the potential impact of a security incident on different parts of our organization. Bullet 2: Document risk management processes. Speaker Notes A strong risk management process is essential for identifying, assessing, and mitigating cybersecurity risks. During the assessment, we'll document our existing risk management processes to understand their effectiveness. This includes analyzing how we identify risks, assess their likelihood and impact, and implement controls to mitigate them. Bullet 3: Analyze business environment and supply chain. Speaker Notes Cybersecurity threats don't exist in a vacuum. It's crucial to analyze the broader business environment and supply chain to identify potential vulnerabilities. This includes: Understanding the industry-specific threats we face. Assessing the security posture of our vendors and partners. Identifying any external factors that could impact our cybersecurity. By considering these factors, we can gain a more complete understanding of our overall risk landscape.
  8. Speaker Notes The Protect function of the NIST CSF focuses on ensuring we have appropriate safeguards in place to protect our critical assets. This involves evaluating various security controls and mechanisms to identify strengths and weaknesses. 1. Reviewing Security Controls: Access Control: Multi-factor authentication (MFA): Implemented and enforced? Least privilege principle: Enforced through access control policies? Strong password policies: Established and enforced complexity requirements and regular changes? Regular access reviews: Conducted periodically to ensure appropriate user permissions? Data Security: Data encryption: Employed for sensitive data at rest and in transit? Data classification: Implemented to prioritize protection based on sensitivity? Data loss prevention (DLP): In place to prevent unauthorized data exfiltration? Regular backups: Conducted regularly and stored securely to facilitate recovery? Information Protection: Information security policies: Clearly defined and communicated to all employees? Incident response plan: Documented and understood by relevant personnel? Business continuity and disaster recovery (BCDR) plan: Developed and tested to ensure operational continuity during disruptions? Security awareness and training: Provided to employees to educate them about cybersecurity risks and best practices? 2. Evaluating Awareness and Training Programs: Assess the effectiveness: Does the program raise awareness of cybersecurity threats? Can employees identify and report suspicious activity? Do employees follow established security policies and procedures? 3. Assessing Protective Technology Implementation: Evaluate the deployment and configuration of: Firewalls: Effectively filtering incoming and outgoing network traffic? Intrusion detection and prevention systems (IDS/IPS): Detecting and blocking malicious network activity? Anti-malware software: Protecting devices from malware infections? Vulnerability scanners: Identifying vulnerabilities in systems and software?
  9. Slide Notes: Slide Title: Evaluating Detection Capabilities (Detect Function) Speaker Notes The Detect function of the NIST CSF focuses on our ability to identify potential security threats in a timely manner. This slide will explore how to evaluate our continuous monitoring and detection processes, with a specific emphasis on testing anomaly and event detection capabilities. 1. Evaluate Security Continuous Monitoring and Detection Processes: Assess the scope and coverage of monitoring activities: Are all critical systems and assets monitored? Are key security events logged and analyzed? Is there sufficient coverage for different attack vectors (e.g., network, endpoint, application)? Evaluate the effectiveness of monitoring tools and processes: Are the tools capable of detecting relevant security events? Are alerts generated in a timely and actionable manner? Are there established procedures for investigating and responding to alerts? Evaluate the capabilities of security personnel: Do they have the skills and knowledge to analyze security logs and identify suspicious activity? Are they able to effectively utilize the monitoring tools and procedures? 2. Test Anomaly and Event Detection Capabilities: Simulate real-world security scenarios: Utilize simulated attacks or test data to see if the detection system identifies them effectively. Focus on scenarios relevant to your organization's specific threats and vulnerabilities. Review false positives and negatives: Analyze the number of alerts that were incorrectly identified as threats (false positives) and missed threats (false negatives). Aim to minimize both by refining detection rules and tuning monitoring tools. Regularly test and update detection capabilities: As threats and attacker techniques evolve, it's crucial to regularly test and update detection capabilities to maintain effectiveness. Speaker Notes Effective detection is crucial for identifying and responding to cyber threats before they can cause significant damage. T
  10. Speaker Notes The Respond and Recover functions of the NIST CSF focus on our ability to effectively respond to and recover from security incidents. This slide will discuss how to assess our incident response plan and procedures as well as our communication protocols and recovery procedures. 1. Reviewing Incident Response Plan and Procedures: Assess the comprehensiveness of the plan: Does the plan address different types of security incidents (e.g., data breaches, ransomware attacks)? Are roles and responsibilities clearly defined for each stage of the incident response process? Are escalation procedures established for notifying relevant stakeholders? Evaluate the effectiveness of response procedures: Are the procedures clear, concise, and easy to follow? Are they regularly tested and practiced through simulations and exercises? Are there procedures for collecting and preserving evidence? Assess the capabilities of the response team: Does the team have the necessary skills and training to effectively respond to incidents? Are there procedures for documenting the incident response process? 2. Assessing Communication Protocols and Recovery Procedures: Evaluate the communication plan: Are clear protocols established for internal and external communication during an incident? Are there designated spokespersons who are responsible for communicating with different audiences (e.g., employees, media, law enforcement)? Are procedures in place to maintain transparency and manage public relations during an incident? Evaluate the effectiveness of recovery procedures: Are data recovery and restoration procedures documented and tested? Are backups readily available and regularly tested for integrity? Are there procedures for restoring critical systems and services to functionality? Are business continuity plans in place to ensure minimal disruption to operations? Speaker Notes Having a well-defined and tested incident response plan is crucial for minimizing the impact of security incidents and facilitating a swift and effective recovery. These notes provide a framework for evaluating your organization's readiness to address and recover from cyber threats
  11. Slide Notes: Slide Title: Evaluating Recovery Capabilities (Recover Function) Speaker Notes The Recover function of the NIST CSF focuses on our ability to restore critical capabilities after a security incident. This slide will discuss how to evaluate our data recovery and restoration plans as well as our business continuity and disaster recovery (BCDR) capabilities. 1. Evaluate Data Recovery and Restoration Plans: Assess the scope and coverage of the plans: Do the plans cover all critical data types and systems? Are procedures defined for different data loss scenarios (e.g., accidental deletion, ransomware attack)? Evaluate the effectiveness of data recovery methods: Are backup and recovery procedures documented, tested, and understood by personnel? Are backups regularly performed and stored securely in an accessible location (offsite or in the cloud)? Are the backups tested periodically to ensure their integrity and successful restoration? Evaluate the speed and efficiency of recovery: Are recovery time objectives (RTOs) and recovery point objectives (RPOs) defined for critical systems and data? Are there procedures for prioritizing data recovery based on business criticality? Can recovery be achieved within acceptable RTOs and RPOs? 2. Assess Business Continuity and Disaster Recovery Capabilities: Evaluate the scope and comprehensiveness of BCDR plans: Do the plans address various disruptive events beyond cyberattacks (e.g., natural disasters, power outages)? Are essential business functions identified and prioritized for recovery? Are alternative locations or resources available to maintain critical operations during disruptions? Evaluate the effectiveness of BCDR procedures: Are the plans regularly tested and updated through simulations and exercises? Are roles and responsibilities clearly defined for BCDR activities? Are communication protocols established for coordinating recovery efforts with different stakeholders? Evaluate the capabilities of the recovery team: Does the team have the necessary skills and training to execute BCDR procedures effectively? Are resources and equipment readily available to support recovery efforts? Speaker Notes Effective data recovery and restoration capabilities are crucial for minimizing downtime and ensuring business continuity in the event of a disruption. BCDR plans play a vital role in mitigating the impact of various incidents and ensuring operational resilience
  12. Once the assessment is complete, we need to document our findings and identify areas for improvement. Based on these findings, we'll develop a remediation plan to address the identified gaps and improve our overall security posture. Finally, we'll report the assessment results to relevant stakeholders, such as management and key decision-makers. Speaker Notes The NIST CSF assessment process doesn't end with the evaluation phase. It's crucial to utilize the gathered information to take action and continuously improve your cybersecurity posture. This slide will outline the next steps following the assessment: 1. Documenting the Findings: Prepare a comprehensive report summarizing the findings for each function (Identify, Protect, Detect, Respond, and Recover). Include details on: Evaluation methods used (e.g., interviews, document reviews, testing) Identified strengths and weaknesses in your cybersecurity practices Specific observations and supporting evidence 2. Identifying Areas for Improvement: Based on the findings, identify areas where your organization can strengthen its cybersecurity posture. Prioritize the identified gaps based on their severity, exploitability, and potential impact. 3. Developing a Remediation Plan: Develop a remediation plan to address the identified gaps and weaknesses. The plan should include: Specific actions to be taken for each area of improvement Timelines for implementing the actions Assigned resources responsible for implementing the plan Metrics to track progress and measure the effectiveness of remediation efforts 4. Reporting the Assessment Findings: Communicate the assessment findings and remediation plan to relevant stakeholders. This might include senior management, IT personnel, department heads, and other individuals responsible for cybersecurity. The report should be tailored to the audience, focusing on key findings, high-level risks, and proposed improvements. Speaker Notes By following these steps, you can effectively utilize the insights gained from the NIST CSF assessment to prioritize your cybersecurity efforts and enhance your organization's overall cyber resilience.
  13. The tool can be used to: Identify an organization's critical assets and their dependencies. Assess the organization's security controls for access control, data security, and information protection. Evaluate the organization's awareness and training programs. Assess the organization's protective technology implementation. Evaluate the organization's security continuous monitoring and detection processes. Test anomaly and event detection capabilities. Review incident response plan and procedures. Assess communication protocols and recovery procedures. Evaluate data recovery and restoration plans. Assess business continuity and disaster recovery capabilities.
  14. Semi-Quantitative Risk Assessment: Follow the steps outlined in the qualitative approach above. Assign numerical values (e.g., 1-5) instead of descriptive terms to severity and likelihood levels. Calculate a risk score for each risk by multiplying the severity and likelihood values. Prioritize risks based on their calculated scores, with higher scores indicating higher priority. Incorporate expert judgment: Involve subject matter experts from different departments (e.g., IT, security, business units) to gain diverse perspectives and insights for risk assessment. Consider qualitative factors: Even in quantitative approaches, consider qualitative factors like reputational damage or regulatory compliance when prioritizing risks. Regularly review and update: Regularly revisit your risk rankings as your cybersecurity posture evolves, threats change, and new information becomes available. Remember, choosing the appropriate risk ranking approach depends on your organization's specific needs, resources, and risk tolerance.
  15. 1. Executive Summary: Briefly introduce the purpose and scope of the NIST CSF assessment. Summarize the overall findings, including both strengths and weaknesses. Highlight the most critical areas for improvement and potential risks associated with them. 2. Assessment Methodology: Briefly describe the methodology used for the assessment, including the functions evaluated and the tools and techniques employed. This section can be concise and doesn't need to go into technical details. 3. Key Findings by Function: Provide a brief overview of the findings for each NIST CSF function (Identify, Protect, Detect, Respond, and Recover). Use layman's terms and avoid technical jargon. Use visual aids like charts or graphs to present complex information in a clear and concise manner. 4. Recommendations and Action Plan: Based on the findings, prioritize and clearly articulate actionable recommendations for improvement in each function. For each recommendation, provide a brief justification and estimated timeline for implementation. Consider including a high-level resource allocation plan, outlining which departments or teams will be responsible for implementing the recommendations. 5. Conclusion: Briefly summarize the key takeaways from the report. Reiterate the importance of ongoing cybersecurity efforts and continuous improvement. Express commitment to implementing the recommended actions and improving the organization's cybersecurity posture. Additional Considerations: Tailor the report to the specific audience: Adapt the language and level of detail to ensure senior leadership can easily understand the information. Maintain confidentiality: Avoid including sensitive information that could compromise the organization's security posture. Offer to answer questions: Be prepared to address any questions or concerns senior leadership might have regarding the report's findings and recommendations. By following this structure and focusing on clarity, conciseness, and actionability, your NIST CSF report can effectively communicate the assessment results to senior leadership and help them understand the organization's cybersecurity posture and prioritize future security investments.