Building a Cybersecurity Framework

25,064
0
Published 2024-03-01
What is the NIST Cybersecurity Framework? → ibm.biz/BdvVAr

The NIST Cybersecurity Framework (NIST CSF) provides comprehensive guidance and best practices that private sector organizations can follow to improve information security and cybersecurity risk management. IBM Distinguished Engineer, Jeff Crume, walks us through this framework so you can plan on having a robust cybersecurity program.

Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now

All Comments (21)
  • @Jeff-S-Grimes
    Another engaging, relevant, and concise video from Jeff! I finished MIT's Cybersecurity program and passed the Sec + exam recently. I am pivoting from a non-IT profession and your video content played an instrumental part in developing my understanding of numerous concepts. Please know your work is very impactful. I will continue to follow you throughout my journey to Govern, Protect, Detect, Respond, and Recover!
  • @samsos7210
    Best simple video that explains Cybersecurity I have ever watched
  • Wow ! Thank you for covering all the aspects of the NIST framework in such a simple and clear way. I have subscribed to your channel to get more information about cybersecurity concepts.
  • @j4r3kk88
    Man, You are unbelievable teacher, I can see experience on You and passion what You do . No words .....LOL
  • @checkat5
    Great perspective on how you should start with NIST2.0 Risk tolerance and responsibilities before policies, standards, and procedures.
  • @AgustinB
    My bad the Google course at Coursera taught me it was Incident but I double checked and the video is right. I don't wanna be that guy, I mean I've just started studying cybersecurity last December but I'd say it's Security Incident Event Management tools, not Security Information. Great great video by the way I'm reading the new NIST CSF on the bus on my way to work when I got your video notification. Thank you for doing this. Appreciate it.
  • @amigazo3972
    Amazing condensation and clear explanation. Thank you Jeff 🥇
  • @ahmadelattar1
    I love how you made this very easy to digest! Looking forward to the next video
  • @DRSRPrime
    Nice! I was just going over the NIST 2.0 . I love your breakdowns. Thank you
  • The best I have seen, simple and easy to understand at a go. Thank you!
  • @BachirBenyammi
    Brilliant demonstration, well done 👍 What you are presenting is actually the core CSF functions not the categories
  • @hiadarsh
    Very well and concisely put. Thanks.
  • @dsoremi01
    Thank you very much for this. It's really insightful. Much love from Nigeria!
  • @user-sd3cc1gz5r
    I’m new at this, thank you for explaining so clearly. I wish you taught a class..
  • @rb-os4cm
    Thank you for another great video simplifying the seemingly complex world of cybersecurity! I find NIST framework approach simpler and more intuitive compared to the CISSP domains. Maybe you can make a video simplifying the the CISSP domains, and if we can somehow relate it with the NIST framework.
  • @danielchien7274
    I believe there are simple methods to solve most cybersecurity issues. 1. For ransomware/virus, just won't allow any unauthorized program to run. On the linux, just won't allow anyone including SU/sudo to add X attribute to any file. The only way to modify X is booting to safemode. This will prevent ransomware, old, new, from running. 2. For kackers, verify login device. If the authentication server and user device's clock are synched. We can generate the same token (based on the same clock) for verification. This is a passwordless auth method that does not need any addition hardware device. The hacker must steal the authorized device in order to break in. There is no password for the hacker to steal, guess. By implement these methods, we can greatly enhanced cybersecurity.