Risk Assessment as per NIST SP 800-30

Sdílet
Vložit

Komentáře • 16

  • @elvislam4649
    @elvislam4649 Před 2 lety +1

    Explanation is clear and direct, good job.

  • @ijeomaugwo7067
    @ijeomaugwo7067 Před 3 lety +3

    This is a fantastic training. I learnt alot , thank you.

  • @olalkn
    @olalkn Před 3 lety +4

    This training is bang on and excellently delivered. I thoroughly enjoyed it and learned a lot. Thank you guys

  • @ho96
    @ho96 Před rokem

    Thanks for an excellent lectures and so smooth and made me imagine how long it's going to be before i can speak smoothly like you do😀. Great job and thank you!

  • @estarr28
    @estarr28 Před 9 měsíci

    Great information! Thank you 👍

  • @merazhussain6022
    @merazhussain6022 Před 6 měsíci

    Brilliant presentation

  • @jameslee4568
    @jameslee4568 Před 2 lety

    Very informative, thanks!

  • @tauqeerahmed394
    @tauqeerahmed394 Před 2 lety

    fantastic

  • @techiegz
    @techiegz Před 3 lety +3

    Around the 26th minute mark, where you mention that NIST SP 800-30 does not identify assets prior to conducting a risk assessment. While this is technically true of the SP, I have to point out that assets are identified in NIST SP 800-37 prior to assessing risk; asset identification is covered/handled in Phase 1 of the NIST Risk Management Framework (RMF) prior to assessing risks on the identified assets using the 800-30. If assets aren't first identified, how do we know what threat sources are relevant, if for example the asset is a computer network vs the world's most comfortable bed? In NIST SP 800-37 Revision 2, Task P-10 is Asset Identification while subsequent Task P-14 is Risk Assessment on the earlier identified assets using NIST SP 800-30. And in a prior Task P-3, there's also a risk assessment for the organization itself, which of course is already identified if it's seeking to assess risks on itself. I suggest not to use any NIST SP in isolation because their contents are intertwined so as to avoid misunderstanding them. Better yet, use the 800--37 as a reference point because it ties together relevant NIST SPs as they apply in their respective RMF process.

    • @felicitasamana586
      @felicitasamana586 Před 3 lety

      I saw your comment before listening. However, asset was mentioned. He said it numerous times..you can listen again.

    • @ikey1119
      @ikey1119 Před 2 lety +1

      I listened to this entire video while I went for a run and came back to the comments. This comment really tied it all together for me. Coming from an RMF perspective your right, NIST 800-37 ties them all together from a wholistic point of view. Which make this video much more palatable. Thanks

    • @bggees
      @bggees Před rokem

      These Frameworks are not holy grails and are guidance for the most part. For example, some well seasoned Risk professionals would only apply what makes sense to their organization only. Some even prefer FAIR framework/approach, which NIST has also been recommending.

    • @techiegz
      @techiegz Před rokem +1

      @@bggees You mean the Frameworks can be "tailored" to your org's needs? Yes, but that's a different argument.
      If it provides guidance to identify assets prior to assessments and you tailor out that step, it's on you. And tailoring out critical steps is where org's get into trouble that result in flaws and gaps in their security program/processes.
      Bottom line is that you have to identify the asset(s) in scope before you do whatever you need to do.

    • @bggees
      @bggees Před rokem +1

      @@techiegz I agree with you 💯. Assets identification must come first, before any other steps such as, threat community, threat types, effects, etc.

  • @tohkengleng9034
    @tohkengleng9034 Před 2 lety

    Money