Get ahead.


Get the training and certification programs need to advance your career.

 

Attend in-person on-location, or via video-conference from the convenience and safety of your home or office.

To register one or more participants for a particular session, simply click the "Register" button for your desired event. Costing is automatically discounted by 20% for groups of 5 or more, and by 25% for groups of 10 or moreLearn more about attending a virtual classroom session here. All related practice exams, certification exams, and policy template tool-kits are likewise available online and on-demand at your convenience from your home or office.

Certified NIST Cybersecurity Framework LI Training PLUS NIST CSF Cyber Resilience Review Assessment Hands-On Workshop (REMOTE - EASTERN TIME)

SESSION 1: MONDAY - WEDNESDAY

NIST Cybersecurity Framework (CSF) Lead Implementer Training
CICRA socialCBCM social

Download Now

 

  • Course Overview

    NIST Cybersecurity Framework

    The NIST Cybersecurity Framework provides a policy framework of computer security guidance for how private sector organizations in the United States and around the world can assess and improve their ability to prevent, detect, and respond to cyber attacks. The framework has been translated to many languages, and is used by the governments of Japan and Israel, among others.

     

    An Accessible and Powerful Framework

    The NIST CSF is now the go-to playbook for countless organizations for building a robust data protection strategy. It’s structured along five core functions — Identify, Protect, Detect, Respond and Recover — each of which captures and curates the essential goals and actions that should be prioritized across the cybersecurity lifecycle.

     

    seperator

    What does NIST CSF deliver for an organization?

    The CSF helps make sense of what to do before, during, and after an incident: from shedding light on your data ecosystem and where the vulnerabilities lie; to locking down sensitive data and remediating known risks; to detecting malicious activity and meeting the threat with consistent and repeatable processes; to finally recovering through the quarantine of corrupted data, monitoring of ongoing threat activity, protocol adjustment and related steps. 

    The beauty is that all this guidance and wisdom comes in the form of a few strategic guidelines that are intuitive and accessible to a wide range of practitioners. Of course, not everything about NIST is voluntary for all organizations (U.S. government contractors, for example, must demonstrate security compliance under NIST 800-171 or risk losing their contracts), and regulations are always changing. That’s why the CSF is still the roadmap — not the engine — to drive your organization toward the most secure data and architectures possible.

    A short list of benefits and deliverables includes:

    • Superior and unbiased cyber security
    • Enables long-term cybersecurity and risk management
    • Ripple effects across supply chains and vendor lists
    • Bridges the gap between technical and business side stakeholders
    • Flexibility and adaptability of the Framework
    • Built for future regulation and compliance requirements

    seperator

    Become a NIST CSF Lead Implementer

    NIST CSF LI 250The Certified NIST CSF LI certification certifies your ability to implement the formal structure, governance, and policy of a robust cybersecurity framework following internationally recognized and respected NIST best practices and standards. Get trained and certified as an expert in developing, implementing, and managing a robust cybersecurity program according to internationally adopted NIST CSF governance and management best practices. 

    This 3-day NIST Cybersecurity Framework workshop provides thorough coverage of the CSF, as well as setting out advice on the implementation of cybersecurity initiative. The purpose of the course is to:

    • Describe the principles and processes of cybersecurity governance and management;
    • Provide thorough coverage of the requirements of the NIST Cybersecurity Framework;
    • Give practical guidance on designing a suitable framework for the organization, and how to leverage ISO 27110 to integrate NIST CSF recommendations into a comprehensive ISO 27001 ISMS;
    • Give practical advice on implementing cybersecurity management;
    • Prepare you for your NIST Cybersecurity Framework certification exam required for Certified NIST CSF Lead Implementer professional credentialing.

    Register for a class (in-person or virtual) and get started today!

    seperator

    Class details

    • Duration: 3 days, 8:30 - 4:30
    • CPE Credit: 24
    • Materials included with live instructor-led training:
      • Class manual (complete hard copy of class presentation)
      • 14 days of unlimited access to online practice exams for exam #CSF101
      • 1 attempt for the online certification exam #CSF101
      • Current-year membership in the CIS Body of Certified Professionals
    •  business continuity plan
    • Professional Certification: This course fulfills all prerequisite training requirements for certification exam #CSF101 for professional certification as Certified NIST CSF Lead Implementer.
    • Certificate included with class: Upon course completion, we will provide you with an achievement certificate for 24 continuing professional education (CPE) credits that can be used to fulfill requirements for maintaining a variety of professional credentials for fraud examination, accounting, auditing, and information security.
    • Recommended prerequisite training: None
    • Catering for in-person attendance:
      • Morning refreshments and snack
      • Lunch
      • Afternoon refreshments
    • Hotel and/or Travel: Not included

     

    * Access to a soft copy of the NIST CSF is provided in class. However, ISO Standards are NOT included in this risk management training, nor provided in class. ISO standards are available for purchase at www.iso.org.
  • Recommended participants

    The U.S. Department of Homeland Security recommends involving a cross-functional team representing business, operations, security, information technology, and maintenance areas, including those responsible for:

    • IT Policy and Governance (e.g., Chief Information Security Officer)
    • Business Operations (e.g., Operations Manager)
    • IT Security Planning and Management (e.g., Director of Information Technology)
    • Business Continuity and Disaster Recovery Planning (e.g., BC/DR Manager)
    • IT Infrastructure (e.g., Network/System Administrator)
    • Risk Management (e.g., Enterprise/Operations Risk Manager)
    • IT Operations (e.g., Configuration/Change Managers)
    • Procurement and Vendor Management (e.g., Contracts and Legal Support Managers)
  • Learning Objectives

    Certified CSF Lead Implementer Content Outline:

    • Framework Core Functions
      1. Identify
      2. Protect
      3. Detect
      4. Respond
      5. Recover
    • Framework Implementation Tiers (Cyber Security Risk Management)
    • Framework Profiles
    • Leveraging ISO 27110 to converge the CSF Framework into an ISO 27001 Information Security Management System

    Establish a firm program starting point by NIST's CSF 1.1 to build out the initial cybersecurity component of an overall Information Security Policy core policy. Throughout the class, our expert instructor will convert NIST CSF concepts and requirements into a real NIST CSF-conforming cybersecurity policy. 

  • Get Certified

    This program is required for the following professional certifications:

  • Guarantee

    Our simple guarantee to you.

    Preparing for Certified Information Security's professional certification exam

    #CSF101 is serious business. This is where we can help. If you first successfully complete:

    • All prerequisite course training; and
    • All CSF101 online practice exams

    Certified Information Security guarantees your success in passing CIS exam #CSF101.

    If you do not pass exam #CSF101 on your first attempt after completion of your required course and practice exams, Certified Information Security will allow you to re-test at no additional charge until you successfully pass your certification exam.

seperator

SESSION 2: THURSDAY - FRIDAY

NIST Cyber Security Review Assessment Hands-On Workshop

  • Overview

    The Cyber Resilience Review* is a lightweight assessment method that was created by the U.S. Department of Homeland Security (DHS) for the purpose of evaluating the cybersecurity and service continuity practices of critical infrastructure owners and operators. However, private sector organizations and foreign government bodies leverage the same CRR to evaluate enterprise programs and practices across a range of ten domains including risk management, incident management, service continuity, and others.  

    The CRR assessment strives to identify how an organization aligns its cybersecurity management activities to the performance or production of its critical services. The assessment consists of 299 questions, and is typically delivered in a 12 - 16 hour workshop led by a qualified facilitator over a period of two consecutive days. Our specially-trained facilitator elicits answers from the organization’s personnel in cybersecurity, operations, physical security, and business continuity. Throughout the assessment workshop, your organization's participating team members will work together to record answers to the assessment kit (available at no charge), which will then be used to generate a complete 176-page analysis and report. Learn more about assessment topics and structure in "Assessment approach" below. 

    Certified Information Security facilitates your Cyber Resilience Review hands-on assessment

    Performing a CRR against the NIST CSF is an ideal way to get started with establishing or improving enterprise-wide cyber security governance and best practices based on the NIST Cybersecurity Framework. Certified Information Security's Cyber qualified security assessors have been trained by official DHS Security assessors to facilitate private (not involving the DHS) Cyber Resilience Review question-based assessments for organizations otherwise not eligible for DHS facilitation. Small teams often choose to attend regularly-scheduled public group assessment workshops, while larger teams typically opt to reserve discounted private on-site/virtual assessments.

    separator

    Facilitated Assessment Workshop details:

    • Duration = 2 days, 8:30 - 4:30
    • CISA Cyber Resilience Review Assessment Package* 
    • Catering included when attending live on-location
      • Morning refreshments and snack
      • Lunch
      • Afternoon refreshments
    • Hotel and/or Travel: Not included

     

    * Self-assessment package is available at https://www.cisa.gov/sites/default/files/publications/1_CRR_v4.0_Self-Assessment-Reader_April_2020.pdf)

  • What you'll get
    1. The Cyber Resilience Review assessment measures your organizations' current organizational cyber resilience, and provides a custom gap analysis of its cybersecurity maturity, and provides recommendations for improvement based on recognized best practices. 

    2. A 176-page assessment report is generated upon assessment completion that summarizes the assessment findings and gaps, and provides general guidelines or activities as to how your organization can improve its cybersecurity posture and preparedness in each category as recommended in various cybersecurity practices such as the CERT® Resilience Management Model (CERT-RMM), National Institute of Standard and Technology (NIST 800-53), and other cybersecurity standards.

    3. The Cyber Resilience Review assessment allows an organization to compare its capabilities to the criteria of the NIST Cybersecurity Framework*. This comparison is provided in the report's "NIST Cybersecurity Framework Summary" and explains where improvements can be made.

    4. A NIST Cybersecurity Framework (NIST CSF) reference crosswalk mapping the relationship of the CRR goals and practices to the NIST CSF categories and subcategories is included in the CRR Assessment report as well.

    *The NIST Cybersecurity Framework was created through collaboration between industry and government, and consists of standards, guidelines, and practices to promote the protection of organizations and critical infrastructure. Learn more about the NIST Cybersecurity framework here. 

  • Assessment approach

    The CRR is an interview-based assessment of an organization’s cybersecurity management program. It seeks to understand the cybersecurity management of services, and their associated assets, that are critical for an organization’s mission success. The CRR focuses on protection and sustainment practices within key areas that typically contribute to the overall cyber resilience of an organization. The assessment measures essential cybersecurity capabilities and behaviors to provide meaningful indicators of an organization’s operational resilience during normal operations and during times of operational stress.

    The CRR is derived from the CERT® Resilience Management Model (CERT®-RMM), which was developed by the CERT Division at Carnegie Mellon University's Software Engineering Institute. The CERT-RMM is a capability-focused maturity model for process improvement, and it reflects best practices from industry and government for managing operational resilience across the disciplines of security management, business continuity management, and information technology operations management.

    1

    Asset Management

    Purpose: To identify, document, and manage assets during their lifecycle to ensure sustained productivity to support critical services.

    The Asset Management domain establishes a method for an organization to plan, identify, document, and manage its assets. Assets are the raw materials that services need to operate. The Asset Management domain comprises seven goals and 30 practices.

    2

    Controls Management

    Purpose: To identify, analyze, and manage controls in a critical service’s operating environment.

    Internal control is a governance process used by an organization to ensure effective and efficient achievement of organizational objectives and to provide reasonable assurance of success. The Controls Management domain outlined in the CRR presents a way for the organization to identify control objectives and establish controls to meet those objectives. The Controls Management domain also addresses the importance of analyzing and assessing those controls to ensure that the process is constantly being improved. The Controls Management domain comprises four goals and 16 practices.

    3

    Configuration and Change Management

    Purpose: To establish processes to ensure the integrity of assets, using change control and change control audits.

    An organization’s asset infrastructure is constantly evolving as technology changes, information is updated, and new personnel are hired. The Configuration and Change Management domain addresses how an organization can implement processes and procedures that manage assets and ensure that changes made to those assets are minimally disruptive to the organization. The Configuration and Change Management domain comprises three goals and 23 practices.

    4

    Vulnerability Management

    Purpose: To identify, analyze, and manage vulnerabilities in a critical service’s operating environment.

    Vulnerability is the susceptibility of an asset, and the associated critical service, to disruption. Vulnerabilities can result in operational risks and must be identified and managed to avoid disruptions to the critical service’s operating environment. A vulnerability management process identifies and analyzes vulnerabilities before they are exploited and informs the organization of threats that must be analyzed in the risk management process to determine whether they pose tangible risk to the organization based on the organization’s risk tolerance. The Vulnerability Management domain comprises four goals and 15 practice

    5

    Incident Management

    Purpose: To establish processes to identify and analyze events, detect incidents, and determine an organizational response.

    Disruptions to an organization’s operating environment regularly occur. The Incident Management domain examines an organization’s capability to recognize potential disruptions, analyze them, and determine how and when to respond. The Incident Management domain comprises five goals and 23 practices.

    6

    Service Continuity Management

    Purpose: To ensure the continuity of essential operations of services and their associated assets if a disruption occurs as a result of an incident, disaster, or other event.

    The process of assessing, prioritizing, planning and responding to, and improving plans to address disruptive events is known as service continuity. The goal of service continuity is to mitigate the impact of disruptive events by utilizing tested or exercised plans that facilitate predictable and consistent continuity of the critical services. The Service Continuity Management domain comprises four goals and 16 practices.

    7

    Risk Management

    Purpose: To identify, analyze, and mitigate risks to critical service assets that could adversely affect the operation and delivery of services.

    Risk management is a foundational activity for any organization and is practiced at all levels, from the executives down to individuals within business units. The CRR focuses on risks to cyber-dependent operations that have the potential to interrupt delivery of the critical service being examined. While the CRR focuses on operational risk, it is important to note that operational risk management requires a comprehensive approach to be effective. The Risk Management domain comprises five goals and 13 practices.

    8

    External Dependencies Management

    Purpose: To establish processes to manage an appropriate level of controls to ensure the sustainment and protection of services and assets that are dependent on the actions of external entities.

    The outsourcing of services, development, and production has become a normal and routine part of operations for many organizations because outsourcing can engage specialized skills and equipment at a cost savings over internal options. The External Dependencies Management domain of the CRR presents a method for an organization to identify and prioritize those external dependencies and then focuses on managing and maintaining those dependencies. The domain comprises five goals and 14 practices.

    9

    Training and Awareness

    Purpose: The purpose of Training and Awareness is to develop skills and promote awareness for people with roles that support the critical service.

    Training and awareness focuses on the processes by which an organization plans, identifies needs for, conducts, and improves training and awareness to ensure the organization’s operational cyber resilience requirements and goals are known and met. An organization plans for and conducts training and awareness activities that make staff members aware of their role in the organization’s cyber resilience concerns and policies. Staff members also receive specific training to enable them to perform their roles in managing organizational cyber resilience. The Training and Awareness domain comprises two goals and 11 practices.

    10

    Situational Awareness

    Purpose: To actively discover and analyze information related to immediate operational stability and security and to coordinate such information across the enterprise to ensure that all organizational units are performing under a common operating picture.

    Situational awareness activities are performed throughout the organization to provide timely and accurate information about the current state of operational processes. Activities must support communication with a variety of internal and external stakeholders to support the resilience requirements of the critical service. The Situational Awareness domain comprises three goals and eight practices.

    ®CERT is a registered mark owned by Carnegie Mellon University.

  • Recommended participants

    To conduct a CRR, the U.S Department of Homeland Security recommends involving a cross-functional team representing business, operations, security, information technology, and maintenance areas, including those responsible for:

    • IT Policy and Governance (e.g., Chief Information Security Officer)
    • Business Operations (e.g., Operations Manager)
    • IT Security Planning and Management (e.g., Director of Information Technology)
    • Business Continuity and Disaster Recovery Planning (e.g., BC/DR Manager)
    • IT Infrastructure (e.g., Network/System Administrator)
    • Risk Management (e.g., Enterprise/Operations Risk Manager)
    • IT Operations (e.g., Configuration/Change Managers)
    • Procurement and Vendor Management (e.g., Contracts and Legal Support Managers)

seperator

  

Group discounts up to 30% are available!
Discounts are automatically applied when placing booking reservation.

Event Properties

Event Date (MM-DD-YYYY) 08-08-2022 8:30 am
Event End Date 08-12-2022 4:30 pm
Cut off date 08-04-2022 5:00 pm
Cancel Registration Before Date 07-25-2022 11:59 pm
Individual Price USD $3,995.00
Location Remote attendance via ZOOM (Eastern Time)
Attachment NIST-CSF-LI.pdf

Group Rate

#Registrants Rate/Person (USD $)
5 3,196.00
10 2,996.25
20 2,796.50

Speakers

Allen Keele

Facilitator

Allen Keele is the founder and CEO of Certified Information Security. He is a recognized subject matter expert, author, consultant, and management systems architect for enterprise risk management (ERM), governance/risk/compliance (GRC), information security management, business continuity management (BCM), fraud control. A 7-time published author, including “Exam Cram 2: CISA”, Mr. Keele also achieved over twenty-five professional accreditations including CISA, CISM, CISSP, ISO 31000 CICRA, ISO 27001 LI/LA, ISO 22301 CBCM, CFE, ISO 37301 CCP, NIST CSF LI, and a Bachelor of Business Administration degree in risk management from the University of Georgia.

Mr. Keele routinely works and collaborates with board members to educate and achieve buy-in for business-critical development and improvement. He presents to, and collaborates with, CEO's, CFO's, COO's, CRO's, CTO's, Chief Privacy Officers, Chief Information Officers/Security Officers, Chief Compliance Officers, Business Continuity Managers, Auditors, Fraud Risk Officers, Quality Managers, Procurement Managers, and HSE Managers to establish and integrate comprehensive and ISO-certifiable standards-based management systems and policies across functions throughout the enterprise. Mr. Keele brings a rare combination of risk management and compliance competence, real-world business experience, and a rigorous depth of certified technical skill to help organizations understand existing and emerging business needs, map these needs to proven and workable solutions strategies, and implement effective solutions strategies to achieve meaningful and measurable success.

Registration is closed for this event.

0
Shares