EP 62: The NIST Cybersecurity Framework

EP 62: The NIST Cybersecurity Framework

Author: Kip Boyle January 21, 2022 Duration: 31:34

https://www.yourcyberpath.com/62

In this episode, we cover the importance of the NIST Cybersecurity Framework (NIST CSF) and its use in managing risk as a business process within your organizations. The NIST Cybersecurity Framework was developed by the National Institute of Standards and Technology in collaboration with cybersecurity experts across the world.

The framework is divided into three parts: the Framework Core, the Framework Implementation Tiers, and the Framework Profile. The Framework Core contains the five concurrent and continuous functions performed by a cybersecurity organization: identify, protect, detect, respond, and recover. The Framework Implementation Tiers provides 4 levels of achievement for cybersecurity risk management. The Framework Profiles contains 23 activities and 108 outcomes that can be used to create a profile for your organization to manage its cybersecurity risk.

Kip Boyle and Jason Dion spend this episode providing a great overview of the NIST Cybersecurity Framework and its benefits. The team has recently filmed a long-form course that dives into each and every part of the Framework and teaches you how to use it in your own consulting and risk management efforts. You can find the course on the Your Cyber Path website or at our distribution partner’s website, Udemy.

What You’ll Learn

●       What the NIST Cybersecurity Framework is

●       The benefits of using the NIST Cybersecurity Framework

●       The three parts of the NIST Cybersecurity Framework

●       How to integrate other control methods (ISACA, ISO, RMF) into the NIST Cybersecurity Framework

Relevant Websites For This Episode

●       NIST Cybersecurity Framework course (https://www.yourcyberpath.com/udemy)

●       NIST Cybersecurity Framework (https://www.nist.gov/cyberframework)

●       Your Cyber Path (https://www.yourcyberpath.com)

Tags: NIST CSF, Courses

Other Relevant Episodes

●       Episode 50 – What does it take to lead a cybersecurity program

●       Episode 53 – How to buy cyber insurance for your law practice


Navigating a career in cybersecurity can feel like a maze without a clear map. Your Cyber Path: How to Get Your Dream Cybersecurity Job, hosted by Kip Boyle, cuts through the noise by focusing on the perspective of the people who actually make hiring decisions. This isn't just generic advice; it's a direct line to understanding what employers are truly looking for in candidates, from entry-level roles to advanced positions. Each episode delves into the practical, often unspoken, steps needed to build your skills, craft your resume, and ace interviews in this competitive field. You'll hear concrete strategies for bridging the gap between where you are now and that ideal job, all framed within the broader contexts of business, technology, and personal growth. Tune into this podcast for honest conversations that translate complex career pathways into actionable plans, helping you move forward with confidence. Whether you're considering a pivot or aiming to advance, the guidance here is rooted in real-world hiring dynamics, making it a valuable resource for anyone serious about building a future in cybersecurity.
Author: Language: English Episodes: 100

Your Cyber Path: How to Get Your Dream Cybersecurity Job
Podcast Episodes
EP 96: SDP 1 (Least Privilege) [not-audio_url] [/not-audio_url]

Duration: 31:01
https://www.yourcyberpath.com/96/ In this episode, we unpack the first of the Security Design Principles, Least Privilege. If you have never heard of it before, Least Privilege is the act of giving a person the most mini…
EP 95: The Cybersecurity Student Perspective with Sam Bodine [not-audio_url] [/not-audio_url]

Duration: 44:49
https://www.yourcyberpath.com/95/ In the beginning, our hosts Jason Dion and Kip Boyle talk a little bit about their new company Akylade, which is going to provide affordable cybersecurity training. They discuss their in…
EP 94: Ten Security Design Principles (SDP) [not-audio_url] [/not-audio_url]

Duration: 33:10
https://www.yourcyberpath.com/94/ To start off this episode, our hosts go on a short chat about ChatGPT and how it can be useful for cybersecurity professionals and job hunters. They also highlight the difference between…
EP 93: CyberWIDE Panel - LevelUp - InfoSec Certifications Soup [not-audio_url] [/not-audio_url]

Duration: 1:27:52
https://www.yourcyberpath.com/93/ In this special episode, we are going to share with you a live webinar hosted by the North Texas Information Systems Security Association. They invited our own Jason Dion and Kip Boyle f…
EP 92:  Password Managers [not-audio_url] [/not-audio_url]

Duration: 34:11
https://www.yourcyberpath.com/92/ In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers. In the beginning, Jason quickly describes password managers, their…
EP 91: Mobile Device Security  with Haseeb Awan [not-audio_url] [/not-audio_url]

Duration: 38:09
https://www.yourcyberpath.com/91/ Haseeb Awan is the Founder & CEO at EFANI Secure Mobile. In this episode, we'll hear about Haseeb's cyber path, and we'll explore some of the biggest mobile phone risks and what you can…
EP 90: How to Get Your First Job as a Pentester with Chris Horner [not-audio_url] [/not-audio_url]

Duration: 36:09
https://www.yourcyberpath.com/90/ In this episode our host Jason Dion goes over the very exciting topic of how to get your first job as a Pentester with Chris Horner, banking expert turned Security engineer and Penetrati…
EP 89: Getting My First Job in Cybersecurity with Ayub Yusuf [not-audio_url] [/not-audio_url]

Duration: 30:01
https://www.yourcyberpath.com/89/ In this episode our host, Jason, interviews Ayub (@WhiteCyberDuck) about how he got into the Cybersecurity industry This time we go over a very common case where people tend to study som…
EP 88: The CIA Triad - The Basis of Cybersecurity (Authentication) [not-audio_url] [/not-audio_url]

Duration: 37:12
https://www.yourcyberpath.com/88/ In this episode we arrive at the end of our five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication. Authentication is always associated…
EP 87: The CIA Triad - The Basis of Cybersecurity (Nonrepudiation) [not-audio_url] [/not-audio_url]

Duration: 25:19
https://www.yourcyberpath.com/87/ In the fourth video of this five-part series discussing the CIA-NA pentagram, Kips and Jason talk about nonrepudiation. In simple terms, nonrepudiation means you can't say you didn't do…