Cyber-Recon
Cyber-Recon
  • 420
  • 344 388
Risk Management Framework (RMF) Purpose and Applicability - CGRC preparation course
Explore the essentials of the Risk Management Framework (RMF) in our latest video, designed to align security and privacy risk management with organizational goals. The RMF isn't just a set of guidelines; it's a strategic tool vital for integrating security measures into any organization's operations. This video shows how the RMF aligns with strategic directions, improves decision-making in security and privacy risks, and ensures compliance with federal mandates such as the Federal Information Security Modernization Act (FISMA) and the Privacy Act.
Learn how to implement effective risk response strategies, anticipate and neutralize threats proactively, and integrate the NIST Cybersecurity Framework into your organization's risk management processes. Whether you're looking to safeguard critical infrastructure, secure national security systems, or enhance your organization's security and privacy posture, this video provides a comprehensive overview of the RMF's benefits, versatility, and application across different sectors.
Key takeaways include:
Understanding the RMF's role in aligning risk management with organizational objectives.
Strategies for developing and implementing effective risk response plans.
RMF compliance with federal mandates for robust security and privacy practices is essential.
How the RMF supports transparency, traceability, and informed authorization decisions in security and privacy practices.
The framework's adaptability for managing risks in diverse operational environments, including critical infrastructure and national security systems.
Perfect for IT professionals, security managers, and anyone involved in risk management, this video demystifies the RMF and provides actionable insights to enhance your organization's resilience against threats.
Understanding Risk Management Framework (RMF) and its Importance
This video explores the importance of the Risk Management Framework (RMF) in aligning security and privacy risk management with organizational objectives. It emphasizes the strategic importance of RMF, offering insights into how it aids in the development and implementation of effective risk response strategies. The video also discusses how RMF integrates with organizational processes, complies with federal mandates, and extends its scope beyond federal systems. Moreover, it explores the role of RMF in supporting transparency, fostering trust and confidence among users, integrating the NIST cybersecurity framework, complying with legal mandates, and providing a holistic strategy for risk management in diverse IT environments.
00:00 Introduction to Risk Management Framework (RMF)
00:00 The Strategic Role of RMF in Organizations
00:43 RMF's Approach to Risk Management
01:35 Integration of RMF with Organizational Processes
02:17 RMF's Compliance with Federal Mandates
03:37 RMF's Role in Decision-Making and Transparency
04:46 RMF's Integration with NIST Cybersecurity Framework
05:27 RMF's Applicability to National Security Systems
06:17 RMF's Compliance with Legal and Policy Requirements
06:44 RMF's Broad Applicability to Information Systems
07:23 RMF's Guidelines for National Security Systems
07:57 Encouragement for Broader Adoption of RMF
#riskmanagementframework #Cybersecurity #PrivacyProtection #OrganizationalSecurity #FISMA #NISTCybersecurityFramework"
zhlédnutí: 143

Video

Background of the Risk Management Framework (RMF)
zhlédnutí 175Před 6 měsíci
Background of the Risk Management Framework (RMF)
Introduction to the RMF and CGRC
zhlédnutí 100Před 6 měsíci
Introduction to the RMF and CGRC
RMF2160 System Disposal
zhlédnutí 102Před 3 lety
RMF2160 System Disposal
RMF2159 Ongoing Authorization
zhlédnutí 201Před 3 lety
RMF2159 Ongoing Authorization
RMF2158 Security and privacy reporting
zhlédnutí 146Před 3 lety
RMF2158 Security and privacy reporting
RMF 2 0 & CAP Online Training
zhlédnutí 438Před 3 lety
RMF 2 0 & CAP Online Training
RMF 2 0 Course
zhlédnutí 2,8KPřed 3 lety
RMF 2 0 Course
RMF2157 Authorizing Package Updates
zhlédnutí 164Před 3 lety
RMF2157 Authorizing Package Updates
RMF2156 Ongoing Risk Response
zhlédnutí 98Před 3 lety
RMF2156 Ongoing Risk Response
RMF2155 Ongoing Assessment
zhlédnutí 122Před 3 lety
RMF2155 Ongoing Assessment
RMF2154 System environment changes
zhlédnutí 107Před 3 lety
RMF2154 System environment changes
RMF2153 Authorization Reporting
zhlédnutí 93Před 3 lety
RMF2153 Authorization Reporting
RMF2152 Authorization Decision
zhlédnutí 253Před 3 lety
RMF2152 Authorization Decision
RMF2151 Risk Response
zhlédnutí 128Před 3 lety
RMF2151 Risk Response
RMF2150 Risk analysis and determination
zhlédnutí 130Před 3 lety
RMF2150 Risk analysis and determination
RMF2149 Authorization Package
zhlédnutí 667Před 3 lety
RMF2149 Authorization Package
RMF2148 plan of action and milestones
zhlédnutí 542Před 3 lety
RMF2148 plan of action and milestones
RMF2147 Remediation Actions
zhlédnutí 393Před 3 lety
RMF2147 Remediation Actions
RMF2146 Assessment Reports
zhlédnutí 203Před 3 lety
RMF2146 Assessment Reports
RMF2145 Control Assessments
zhlédnutí 259Před 3 lety
RMF2145 Control Assessments
RMF2144 Assessment Plan
zhlédnutí 248Před 3 lety
RMF2144 Assessment Plan
RMF2143 Assessor Selection
zhlédnutí 237Před 3 lety
RMF2143 Assessor Selection
RMF2142 Update Control Implmentation
zhlédnutí 191Před 3 lety
RMF2142 Update Control Implmentation
RMF2141 Control Implementation
zhlédnutí 619Před 3 lety
RMF2141 Control Implementation
RMF2140 Plan review and approval
zhlédnutí 137Před 3 lety
RMF2140 Plan review and approval
RMF2139 CM Strategy intro
zhlédnutí 187Před 3 lety
RMF2139 CM Strategy intro
RMF2138 Documentation of planned control implementation
zhlédnutí 310Před 3 lety
RMF2138 Documentation of planned control implementation
RMF2137 Control Allocation
zhlédnutí 324Před 3 lety
RMF2137 Control Allocation
RMF2136 Control Tailoring
zhlédnutí 663Před 3 lety
RMF2136 Control Tailoring

Komentáře

  • @ECHEZONAIbeh
    @ECHEZONAIbeh Před 7 dny

    Wonderful

  • @fastrobreetus
    @fastrobreetus Před 2 měsíci

    Great explanation!

  • @Bruh-rx3Cz
    @Bruh-rx3Cz Před 2 měsíci

    Bro thats deep😮

  • @nateneyasamuelslaw4620
    @nateneyasamuelslaw4620 Před 3 měsíci

    Amazing breakdown of the RMF process 👏🏽

  • @dnatech4477
    @dnatech4477 Před 3 měsíci

    Got my CSIS in March! Hit the books guys/gals!!!!

  • @ambersmith9648
    @ambersmith9648 Před 4 měsíci

    I got a text message telling nectovtext a number with a code...

  • @AmmaLuv
    @AmmaLuv Před 4 měsíci

    Very thorough explanation. Thank you

  • @torchedwings5469
    @torchedwings5469 Před 4 měsíci

    0wing

  • @DesireeRondeau
    @DesireeRondeau Před 4 měsíci

    He said that his mnt was scamming money from his fans. And he has a whole team doing this

  • @DesireeRondeau
    @DesireeRondeau Před 4 měsíci

    Over all I gave $500.00,: because of the first scam he was supposed to send me money and a fan card

  • @DesireeRondeau
    @DesireeRondeau Před 4 měsíci

    I just won a Raptor truck and I am still waiting on it.but he didn't give me any information on the tracking number, I gave him $50 gift card and he said it only accounted for $10 , so then I gave him the very last of my money and gave him $40

  • @DEMIntern
    @DEMIntern Před 5 měsíci

    Thank you for explaining this simply. I've got a better grasp of what makes WEP such a security risk now.

  • @jorgeartur6006
    @jorgeartur6006 Před 5 měsíci

    The best explanation ever. Thank you very much for this valuable content.

  • @user-wo8ok7ub2v
    @user-wo8ok7ub2v Před 5 měsíci

    thank you for your useful explanation .. it really helps

  • @christophercrooks4310
    @christophercrooks4310 Před 5 měsíci

    4:50 is the start

  • @AboodSpiN
    @AboodSpiN Před 6 měsíci

    Amazing explanation! thank you so much

  • @donrobertson4940
    @donrobertson4940 Před 6 měsíci

    More reliable than Windows 98? But... but how would that be possible?

  • @axax7668
    @axax7668 Před 6 měsíci

    No Badge or Tesla!😂

  • @Cyber-recon
    @Cyber-recon Před 6 měsíci

    Tesla was a genius. After the government sized trunks of his industrial property after his death - several went “missing”

    • @bubbs1881
      @bubbs1881 Před 6 měsíci

      Edison was just a douche canoe and even though he had others come up with ideas he was actually a really bad person. He never really did anything with his family always spending time in his work shop. At one point Edison wasn't performing his "manly duties" and I believe he and his wife almost got divorced. Not only that but I believe GE was a big competitor to Edison even though there factory was blown up once killing an engineer they still rain more powerful than Edison. Though I am an antique collector of Christmas light I have several Edison pieces from the 1920s but GE was the main producer of lighting for the time period. GE called there bulbs c-6 whereas Edison's was called Mazda. Which is weird but yes even though Edison took credit from others it is true that Edison was one of the biggest douche canoes of the late 19th century and early 20th century.

  • @doniciovelasquez9904
    @doniciovelasquez9904 Před 6 měsíci

    Not only did he stope everything Tesla invented but the powers that be disnt want Tesla because he was finding a way to give away free electricity i think it was referred to as Aetheric Energy or something like that? Amd would later continue until his death and was only given respect after he (Tesla) died. Some stuff im forgetting but powers that be wanted to is to pay to live instead of we should have that for free

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      I would have loved to see Tesla's ideas on free electricity to have come to life. That would have been great for the population of the planet.

  • @qdoba999
    @qdoba999 Před 6 měsíci

    He is nothing but a fraud and a thief Also an animal curliest lol

  • @dickg3523
    @dickg3523 Před 6 měsíci

    He stole much of what he was credited with - so try to get factual.

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      While he did not directly invent much of what he got credit for it was his labs and his money that paid for the inventions coming out of Edison’s labs. Hard to fully cover someone like Edison and others in 60 seconds

  • @u_n_c_l_e_m_i_s_o
    @u_n_c_l_e_m_i_s_o Před 6 měsíci

    Edison was a horrible person, a theif, a pervert, and an evil human being.

  • @yaboyslyhere
    @yaboyslyhere Před 6 měsíci

    Im pretty sure he stole the patints for them but correct me if im wrong

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      If I recall correctly (from the Tesla movie), Edison did not really create much. Instead he hired some great minds to create things for him. Since he paid the bills he got credit (for better or worse - I think worse). Most inventions came from “Edison’s shop”

    • @yaboyslyhere
      @yaboyslyhere Před 6 měsíci

      @@Cyber-recon oh mb

  • @bubbs1881
    @bubbs1881 Před 6 měsíci

    Edison's friend created the light bulb, he was African American but since black individuals back then couldn't market items he sold the patent to Edison but took all the credit.

  • @brianaoyama5044
    @brianaoyama5044 Před 6 měsíci

    Thomas Edison with the stock exchange and politicians robbed actual smart people of their ideas, inventions and patents.

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      Agree that he robbed some and paid off others - I am waiting for teh day I can mention it is Tesla's birthday!

  • @VIKTORSCHAUBERGERscammersONyt

    Garbage

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      Tell me more? What would you change!?

  • @Duck_side
    @Duck_side Před 6 měsíci

    Nice ai voice, pretty convincing

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      lol - thank you - but it is my real voice. check out the youtube channel that is all me. I always think I sound too robotic!

  • @whelan4545
    @whelan4545 Před 6 měsíci

    Thanks for not even remotely covering what he actually presented

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      I am not sure that I follow your comment. Gestalt programing changed the way that we look at programming, aligning it with human thinking. This presentation focused programmers on looking at this bigger picture of how different parts of a program come together for the final product. I would love to hear from you how this does not align with the title. Thank you for your feedback.

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      In haste in replying I thought you were saying that I was not presenting what the description stated. You are right Ross covered so much in his presentation - however CZcams limits these shorts to less than 60 seconds - so I tried to cover the essence - if you feel you have the time, I would love to get your feelings on Dog's presentation here in the comments.

  • @Richard-vl2vz
    @Richard-vl2vz Před 6 měsíci

    He went in on a Sunday and had the whole place to him self. He was screwing around and got lucky..Real lucky😅

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      That is awesome - sometimes things are found in the most non scientific way

  • @elizabethgrant3410
    @elizabethgrant3410 Před 6 měsíci

    To send 500 reezer card to get money

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      It seems that this one will never go away

  • @nketiah-sakyiakomeah5414
    @nketiah-sakyiakomeah5414 Před 7 měsíci

    U made simple

  • @KhrystalBurn
    @KhrystalBurn Před 7 měsíci

    Hi there, is there any entry level certifications by ISACA??

  • @tinomacias9151
    @tinomacias9151 Před 7 měsíci

    I private message the Mr. Beast. People and I told them to send me a picture of you. Flicking off the camera so I know You're a the Mr. Beast. This is what I message. 2 people I'm not sure of. Send me a picture of you flicking off the camera with your middle finger up in the air point at the camera. Make sure you're a real person, not a scammer Then they say I don't have time my camera don't work. I don't have a camera on my computer. Yeah, Stop wasting my time.

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      Giving away money and they dont have a camera! lol

  • @user-nv3yw4zh2c
    @user-nv3yw4zh2c Před 9 měsíci

    Great Content. Thank You!

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      Thank you for your comment - I really appriciate it.

  • @bryanvm28
    @bryanvm28 Před 9 měsíci

    Thanks a lot, best explanation I got all clear now!

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      Thank you for your comment, it means a lot to me!

  • @yuup3185
    @yuup3185 Před 9 měsíci

    I think the value added isn't really on the technician side of the house, but an HR/management talent acquisition "benefit" if you can call it that. While This does cut down on the resume bullets but I found that I still have to break down what all is in the "package cert" so that my resume would be flagged by hiring entities. Its just something to add at the end of the day for those of us who will work the IT field and its a way for those hiring us to just require a specific certification for the role. I think of it as a merge pdf function for certs, instead of asking for 3 certifications, they'll require CSIE and so on... End of the day no real benefit, all marketing for CompTIA/3rd parties

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      Hey there, thanks for sharing your thoughts on the stackable certifications from CompTIA. You bring up a really interesting point about their value, especially from the perspective of someone working in IT. You're right in saying that these certifications seem to offer more of a benefit to HR and management teams during the talent acquisition process. It does simplify things by consolidating multiple certifications into a single, more comprehensive one, like the CSIE you mentioned. This can certainly help streamline the hiring process and set clear standards for specific roles. However, I completely understand your point about the need to still break down what each certification entails on your resume. It's crucial that potential employers understand the full scope of your skills and knowledge, even if it's all bundled into one 'package cert'. And yes, while these certifications might be a way for CompTIA and other third parties to market themselves, they do hold a certain value in the job market. They can help set a standard for skills and knowledge that are expected in various IT roles. But as you mentioned, it's important for IT professionals to critically assess the real-world benefits of these certifications, beyond just fulfilling a job requirement. Thanks again for your insightful comment. It's discussions like these that really help shed light on different aspects of the IT and tech certification world. If anyone else has thoughts on this, feel free to join the conversation!

  • @norwegianzound
    @norwegianzound Před 9 měsíci

    I got the CISM. No one seems interested. A lot of effort for little uptick.

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      Hey there, thanks for sharing your experience with the CISM certification. It sounds like you've put in a lot of hard work and effort to achieve this certification, which is no small feat, so first off, congratulations on that accomplishment! I'm sorry to hear that you haven't seen the interest or uptick you were expecting. The world of IT and cybersecurity certifications can be quite challenging to navigate, and sometimes the market's demand for certain certifications can fluctuate. It's important to remember that the value of certifications like CISM can vary depending on the specific industry, company, or even the region you're in. However, don't get discouraged. The knowledge and skills you've gained through the CISM are valuable and can set you apart in the long run. It's also worth considering how you're marketing these skills on your resume or in interviews. Sometimes, it's all about how you frame your qualifications and experiences to potential employers. Also, networking within the cybersecurity community and staying updated on industry trends can open new doors. The right opportunity that values your CISM certification could be just around the corner. Thanks again for your comment. It's really important for others considering certifications to hear honest experiences like yours. If anyone else has had similar experiences or tips, feel free to share!

  • @ghostreck
    @ghostreck Před 10 měsíci

    i love how you break the controls down. so so helpful. you did not touch on all 20 control families as planned. do you intend to get back on this or no?

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      Hey there, thanks so much for your kind words and for following our control breakdown series! I'm thrilled to hear that you find the way we break down the controls helpful. You're spot-on about us not covering all 20 control families as initially planned. I appreciate you bringing this up. The good news is that we definitely intend to get back to this series in 2024. We're planning to not only cover the remaining control families but also to delve deeper into each one, providing more insights and practical examples. Our goal is to make these topics accessible and useful for everyone, whether you're a seasoned professional or just getting started in the field. So, stay tuned for more detailed and informative content coming your way next year! In the meantime, if there are specific controls or topics within those families you're particularly interested in, feel free to drop a comment. Your input helps us tailor our content to what's most useful for our audience. Thanks again for your support and engagement. It's comments like yours that keep us motivated and excited to produce more content. See you in 2024!

  • @techguy2696
    @techguy2696 Před 10 měsíci

    prepare, categorize, select, implement, assess, authorize, monitor

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      Thanks for your comment summarizing the key steps of the Risk Management Framework (RMF)! It's clear and concise, and it's great to see engagement with such an important process in cybersecurity. Prepare: This initial step involves understanding the system and organizational context, establishing risk management roles, and preparing for the RMF process. Categorize: Here, you define the system and categorize the information processed, stored, and transmitted based on impact levels. Select: This step involves selecting appropriate security controls to protect the system based on the categorization from the previous step. Implement: This is where the selected security controls are put into action within the system. Assess: In this step, the effectiveness of the implemented controls is evaluated to ensure they are functioning correctly and meeting security requirements. Authorize: Based on the assessment results, an authorization decision is made on whether the risk to organizational operations and assets is acceptable. Monitor: The final step is a continuous process of monitoring the security controls and the state of the system to identify and respond to any changes in risk. Your breakdown is a fantastic starting point for anyone looking to understand the RMF process. It’s essential for managing cybersecurity risk in a structured way. If anyone has specific questions or wants to dive deeper into any of these steps, feel free to ask in the comments. Sharing knowledge and experiences helps us all grow in this ever-evolving field!

  • @techguy2696
    @techguy2696 Před 10 měsíci

    A LOT OF INFO PHEWWWWWWWWWWWWWW

  • @techguy2696
    @techguy2696 Před 10 měsíci

    Is there a pdf file? Thanks!

    • @Cyber-recon
      @Cyber-recon Před 6 měsíci

      A pdf file of what? I hope I can help you

  • @user-xt3ge3fj6m
    @user-xt3ge3fj6m Před 10 měsíci

    you don't have to be a "hacker" to do these attacks just gotta understand python and coding

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      True - I was just using the term hacker to show the "bad guy" that would be exploiting this technical issue in a DoS attack.

  • @bass_guy8074
    @bass_guy8074 Před 11 měsíci

    Miss you guys

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      thank you for the comment! we will be back in 2024!

  • @abrahamcain9647
    @abrahamcain9647 Před 11 měsíci

    Another tip I’d add is check to make sure that your cloud storage is set up properly as either public-facing or internal-only. In AWS, this would mean make sure that your S3 buckets aren’t accessible to anyone, anywhere without authentication

  • @TheBriDiva
    @TheBriDiva Před 11 měsíci

    Is the channel back on?

    • @Cyber-recon
      @Cyber-recon Před 11 měsíci

      Yes I am working on new content and will be back this week!!

  • @pompersuf5214
    @pompersuf5214 Před rokem

    i had some kid tell me he was gonna hashattack me and i just reported and blocked him after he texted me on insta but can there be any real damage be done and i do have windows 10?

    • @Cyber-recon
      @Cyber-recon Před 8 měsíci

      Hello, and thanks for sharing your experience. It's definitely unsettling to receive threats like that, especially when they involve technical terms like 'hash attack'. First off, you did the right thing by reporting and blocking the individual. That's always the first step in safeguarding your online security. To address your concern: can a hash attack cause real damage? In theory, hash attacks are a form of cyber attack where an intruder tries to crack passwords or other encrypted data. However, for someone to successfully execute such an attack, they'd need access to your system or data, which isn't typically easy to achieve, especially if you're careful with your digital security. Since you're using Windows 10, there are several built-in security features that help protect you. Make sure your system is always updated with the latest security patches from Microsoft. Also, consider using a reputable antivirus and enable the firewall to add an extra layer of protection. Remember, good digital habits are key. This includes using strong, unique passwords for all your accounts, being wary of suspicious emails or messages, and not clicking on unknown links. Lastly, if you're ever in doubt or feel like your security has been compromised, it’s wise to consult with a professional or reach out to support services for help. Stay safe out there, and if anyone else has advice or experiences they want to share, feel free to jump into the conversation!

  • @CanCaner163
    @CanCaner163 Před rokem

    is the crc32 also xor ed with the keystream ? or is it conducted after XOR operation ? Thank you in advance

  • @user-qp4wq6gi8d
    @user-qp4wq6gi8d Před rokem

    The best 👏🏻👏🏻👏🏻👏🏻 thank you