Specialist - Data Security

Data Security Training

Our Data security workshops and courses help your organisation to protect digital data from the malicious actions of unauthorized users, such as a cyberattack or a data breach.

Please select the course that you’re interested in

Implementing the NIST Cybersecurity (Framework using COBIT 2019)

Course Overview

Audience:

The course is for individuals who have a basic understanding of both COBIT 2019 and security concepts, and who are involved in improving and/or building the cybersecurity program for their enterprises.

The Cybersecurity Framework (CSF) was developed through an international partnership of small and large organizations, including owners and operators of the nation’s critical infrastructure, with leadership by the National Institute of Standards and Technology (NIST). ISACA participated in the CSF’s development and helped embed key principles from the COBIT framework into the industry-led effort. As part of the knowledge, tools, and guidance provided through our Cybersecurity Nexus (CSX)™ program, ISACA has developed the Implementing NIST Cybersecurity Framework Using COBIT 2019 Course.

Prerequisite:

While there are no formal prerequisites, all attendees are expected to have a basic understanding of Information and Cyber Security management.

Duration:

This is a two-day Implementing the NIST Cybersecurity course. The course starts at 09:30 and runs until 16:30.

Alternate timings can be arranged upon request. The course can be held on a date that suits you.

Location:

Our Implementing the NIST Cybersecurity course will be delivered Online Remotely using online training platforms. It can also be run at our training venue near Liverpool Street (London) or any preferred location in the UK or Europe.

Implementing the NIST Cybersecurity Course Outline

INTRODUCTION TO NIST

General introduction to the course

COBIT 2019 REVIEW

Refresher on the basic concepts of COBIT 2019 Foundation

OVERVIEW OF THE NIST CYBERSECURITY FRAMEWORK

Introduction to the concepts in the NIST Cybersecurity Framework

UNDERSTAND THE SEVEN CSF IMPLEMENTATION MEASURES

Prioritize and Scope

Orient

Create a Current Profile

Conduct a Risk Assessment

Create a Target Profile

Determine, Analyze and Prioritize Gaps

Implement Action Plan

APPLY AND EVALUATE THE IMPLEMENTATION PROCESS USING COBIT 19

Describes the use of ISACA methodologies to implement CSF, “How to Use the Framework.”

Phase 1 – What are the drivers?

Phase 2 – Where are they now?

Phase 3 – Where do we want to be?

Phase 4 – What needs to be done?

Phase 5 – How do we get there?

Phases 6 – Did we get there?

Phase 7 – How do we keep the momentum going?

 

 

Show more
One to One

(which includes a tailor-made training programme for the individual where they can mix and match the topics from various levels to get the most cost-effective training

Group for up to 8 learners
The Course outlines on our website are standard, however, we would be happy to tailor them to your specific requirements. Please call us on 020 3696 2796 or send us a message to discuss further.

What Our Clients Say

Extras

This is a sample of some of the Short training videos. Please note that you can get access to many more, once you have done a course with us and are registered as one of our delegates.