EP 80: Risk Management Framework with Drew Church

EP 80: Risk Management Framework with Drew Church

Author: Kip Boyle September 30, 2022 Duration: 1:06:26

https://www.yourcyberpath.com/80/

In this episode, Kip and Jason, along with special guest Drew Church, take a closer look at the NIST risk management framework to help facilitate selecting the right kind of security for your system and help clarify how to direct resources towards the right controls.

Drew Church, RMF expert and global security strategist at Splunk, is here to talk about the different steps of RMF, the importance of preparation work, and understanding the bigger picture of what you want your system to accomplish.

They also go through the seven steps of RMF in detail: prepare, categorize, select, implement, assess, authorize, and monitor, highlighting the best procedures and ways of going about completing each step, as RMF is highly structured. They also call attention to soft skills and how invaluable they are throughout your cybersecurity career.

Drew and Jason also explain different terms, including STIGS, DIKW pyramid, and POAM, and their importance while developing the RMF.

Finally, they go over various tips and tricks to make sure you are ready for your assessment, like knowing what your system is going to be graded on and maybe also testing beforehand, as well as having in mind that the assessors are not going to be experts in your system. 

What You’ll Learn

●     What is RMF (and what it’s not)?

●     Are RMF and CSF the same?

●     What are the seven steps of the RMF?

●     How important is the DIKW pyramid in RMF?

●     What is the secret to success of system assessments against RMF controls?

Relevant Websites For This Episode

●     www.YourCyberPath.com

●     www.nist.gov

●   www.splunk.com

Other Relevant Episodes

●     Episode 62 - The NIST Cybersecurity Framework

●     Episode 56 - Cybersecurity Careers in the Defense Sector

●    Episode 22 - Impress Us with Your Resume Skills Section


Navigating a career in cybersecurity can feel like a maze without a clear map. Your Cyber Path: How to Get Your Dream Cybersecurity Job, hosted by Kip Boyle, cuts through the noise by focusing on the perspective of the people who actually make hiring decisions. This isn't just generic advice; it's a direct line to understanding what employers are truly looking for in candidates, from entry-level roles to advanced positions. Each episode delves into the practical, often unspoken, steps needed to build your skills, craft your resume, and ace interviews in this competitive field. You'll hear concrete strategies for bridging the gap between where you are now and that ideal job, all framed within the broader contexts of business, technology, and personal growth. Tune into this podcast for honest conversations that translate complex career pathways into actionable plans, helping you move forward with confidence. Whether you're considering a pivot or aiming to advance, the guidance here is rooted in real-world hiring dynamics, making it a valuable resource for anyone serious about building a future in cybersecurity.
Author: Language: English Episodes: 100

Your Cyber Path: How to Get Your Dream Cybersecurity Job
Podcast Episodes
EP 45: Live Resume Review [not-audio_url] [/not-audio_url]

Duration: 42:24
Today Kip Boyle is joined with Glen Sorensen to look at three anonymous, but real, resumes of people trying to get their dream cybersecurity job. What makes a good resume? How can your resume start making you appear irre…
EP 43: Threat Intelligence [not-audio_url] [/not-audio_url]

Duration: 1:26:50
Kip Boyle and Wes Shriner talk more about the Service Catalog specifically number 15, Threat Intelligence with the help of our two guests, Mike Sheward, an enthusiastic Information Security Leader, and Gary Brown, an Int…
EP 42: Strategy through Architecture [not-audio_url] [/not-audio_url]

Duration: 1:04:09
Kip Boyle and Wes Shriner talk more about the Service Catalog specifically number 10, Security Strategy in Architecture with the help of our guest, Peter H. Gregory. He is has written about 50 different articles and book…
EP 41: Inside Secrets from a Network Pentester [not-audio_url] [/not-audio_url]

Duration: 59:42
Kip and Wes are on the vacation this week, so instead, you get a very special episode where we are sharing with you an interview we have done in one of our recent Your Cyber Path Office Hours in our Masterclass, How to g…
EP 40: Security Awareness & Training [not-audio_url] [/not-audio_url]

Duration: 1:04:22
Looking for a nontechnical job in Cybersecurity?! This might be a good option for you! In today's episode, we have a very special guest, Gabriel Friedlander, the founder of Wizer Security and Co-founder & CTO of ObserveI…
EP 39: It all begins with policy [not-audio_url] [/not-audio_url]

Duration: 1:15:10
All security begins with a Policy! In today's episode, we will be exploring a Policy Administrator position and what you should know about it with the help of our friend Torin Larsen. Download the slides here: https://tr…
EP 38: Wes' Job Hunt [not-audio_url] [/not-audio_url]

Duration: 41:09
Wes recently went looking for his dream cybersecurity job. We’re going to tell you his story. There are quite a few lessons he learned and will share with you. You can see us on YouTube: https://www.youtube.com/YourCyber…
EP 37: Security Operations Overview [not-audio_url] [/not-audio_url]

Duration: 1:16:22
Some of the best "entry level" cybersecurity jobs are found in the Security Operations department. In this episode, Kip and Wes will give you a tour with the help of our guest, Steve Winterfeld. NEW: You can see us (and…
EP 36: Product Security Overview [not-audio_url] [/not-audio_url]

Duration: 42:30
Today, we’re going to explain what the Product Security organizational unit does. And we’ll do that with the help of our friend and expert Matt Clapham. NEW: You can see us (and the slides) on YouTube: https://www.youtub…