EP 83: Automating NIST Risk Management Framework with Rebecca Onuskanich

EP 83: Automating NIST Risk Management Framework with Rebecca Onuskanich

Author: Kip Boyle November 11, 2022 Duration: 44:52

https://www.yourcyberpath.com/83/

In this episode, we go more in depth with the NIST RMF, answering extremely important questions about the different steps of the process and the checklist mentality that can be developed when implementing RMF.

Rebecca Onuskanich, CEO of the International Cyber Institute, is here to share with us some of her knowledge gained throughout her 20 years of experience with security compliance and how eMASS is used to implement RMF and its real-world adaptation.

Alongside Kip, Rebecca goes over her experience with RMF discussing how different backgrounds can influence the implementation and that a lot of people will have to get over the rigid mentality of RMF in favor of a more technical, real-world, viable approach.

Especially when facing the challenge of implementing RMF with different systems, including legacy systems.

They also unpack eMASS, who can use it, what are the requirements to use eMASS, what are its limitations, how it helps support the process, and if there are any other ways to implement RMF, highlighting that the current direction is to emphasize resilience and survivability and always put the mission first.

What You’ll Learn

How is RMF adapted in the real world?

● How to make the best use of RMF?

●     How do the NIST CSF and the RMF compare to one another?

●     What is eMASS?

Relevant Websites For This Episode

●     www.YourCyberPath.com

●    www.nist.gov

Other Relevant Episodes

●    Episode 80 - Risk Management Framework with Drew Church

●    Episode 62 - The NIST Cybersecurity Framework

●  Episode 56 - Cybersecurity careers in the Defense sector


Navigating a career in cybersecurity can feel like a maze without a clear map. Your Cyber Path: How to Get Your Dream Cybersecurity Job, hosted by Kip Boyle, cuts through the noise by focusing on the perspective of the people who actually make hiring decisions. This isn't just generic advice; it's a direct line to understanding what employers are truly looking for in candidates, from entry-level roles to advanced positions. Each episode delves into the practical, often unspoken, steps needed to build your skills, craft your resume, and ace interviews in this competitive field. You'll hear concrete strategies for bridging the gap between where you are now and that ideal job, all framed within the broader contexts of business, technology, and personal growth. Tune into this podcast for honest conversations that translate complex career pathways into actionable plans, helping you move forward with confidence. Whether you're considering a pivot or aiming to advance, the guidance here is rooted in real-world hiring dynamics, making it a valuable resource for anyone serious about building a future in cybersecurity.
Author: Language: English Episodes: 100

Your Cyber Path: How to Get Your Dream Cybersecurity Job
Podcast Episodes
EP 86: The CIA Triad - The Basis of Cybersecurity (Availability) [not-audio_url] [/not-audio_url]

Duration: 42:17
https://www.yourcyberpath.com/86/ In this episode, Kip and Jason discuss everything that makes the A in the CIA Triad, Availability. Availability is when you like to use a system and it's there ready for you to use, beca…
EP 85: The CIA triad - The Basis of Cyber Security (Integrity) [not-audio_url] [/not-audio_url]

Duration: 40:05
https://www.yourcyberpath.com/85/ In this episode, Kip and Jason discuss the second pillar of the CIA pentagram, Integrity. The whole idea of integrity is making sure any entity that you interact with has not been modifi…
EP 84: The CIA triad - The Basis of Cyber Security (Confidentiality) [not-audio_url] [/not-audio_url]

Duration: 28:53
https://www.yourcyberpath.com/84/ In this short episode, Jason and Kip discuss the first aspect of the CIA Triad which is Confidentiality. They break down the critically important confidentiality point and how it works i…
EP 82: From Truck Driver to Cybersecurity Analyst with Mike Hillman [not-audio_url] [/not-audio_url]

Duration: 36:04
https://www.yourcyberpath.com/82/ In this episode, we get to learn about our guest’s inspirational story as he went from truck driver to Cybersecurity Analyst in less than 15 months. Mike Hillman, former truck driver and…
EP 81: How to Negotiate a Pay Raise with Ed Skipka [not-audio_url] [/not-audio_url]

Duration: 46:54
https://www.yourcyberpath.com/81/ In this episode, we listen to Kip and Ed go over how Ed managed to get a 25% pay raise in a very short period of time and the whole details of his situation. Edward Skipka, a vulnerabili…
EP 80: Risk Management Framework with Drew Church [not-audio_url] [/not-audio_url]

Duration: 1:06:26
https://www.yourcyberpath.com/80/ In this episode, Kip and Jason, along with special guest Drew Church, take a closer look at the NIST risk management framework to help facilitate selecting the right kind of security for…
EP 79: Mid-Career Transition Success Story with Steve McMichael [not-audio_url] [/not-audio_url]

Duration: 40:56
https://www.yourcyberpath.com/79/ In this episode, Kip and Jason are joined by Steve McMichael who has rapidly climbed the cybersecurity career ladder. Within 2 years, Steve was able to move up to the position of Directo…
EP 77: Get Into the Talent Pipeline With Max Shuftan and Winnie Yung [not-audio_url] [/not-audio_url]

Duration: 40:11
https://www.yourcyberpath.com/podcast/77/ In this episode, Kip and Jason, with special guests Max Shuftan and Winnie Yung, talk about what a talent pipeline is and why hiring managers should be using a solid talent pipel…
EP 76: Which Certification Roadmap or Path Should I Use? [not-audio_url] [/not-audio_url]

Duration: 24:54
https://www.yourcyberpath.com/podcast/76/ In this episode of Your Cyber Path, Kip and Jason discuss the world of cybersecurity certifications and how you can determine the proper path for you to follow. We bust the myth…