NIST CSF: Assessing the Maturity of your Cybersecurity Program
Includes Webinar Recording, NIST CSF Presentation and NIST CSF Worksheet.
Notice: See below for CPE Policy
Cybersecurity risks and the management of those risks are a priority across all industries. Have you ever had to quantify the maturity of your cybersecurity program? If you were provided a budget for remediation and maturity, how will this affect your cybersecurity posture? During this presentation, we will look at the National Institute of Technology and Standards (NIST) Cybersecurity Framework (CSF) as a means of quantifying the maturity of your cybersecurity program.
We will specifically look at:
• Background on the NIST CSF and its comparison with other maturity frameworks
• Understanding the value proposition related to assessing the maturity of your cybersecurity program
• Framework implementation guidance using the CSF’s 7 step process
• Assessing the maturity of your cybersecurity program
• Setting a target maturity goal
• Developing a cybersecurity remediation roadmap
• NIST provided tools to assist in the assessment and visualization of your cybersecurity maturity
• Reporting maturity to executives and boards
In response to the Los Angeles Public Health order of prohibiting group events and gatherings and as a follow-up to our cancellation communication of future in-person events on March 8, ISACA Los Angeles has converted our monthly dinner meetings to webinars to continue supporting our members. Our first webinar is scheduled on Tuesday, April 21, 2020. Once you’ve registered, you will receive a confirmation email with instructions to join the webinar.
Last date to register: Sunday, April 19, 2020
About Our Speaker
Peter Morin
Director of Cybersecurity, PwC
Peter is a Director in PwC’s Cyber Security and privacy practice where he focuses on ICS and Critical Infrastructure. He is a senior cyber security professional with over 20 years of experience focusing on information security risk management, cyber threat incident response, threat hunting, malware analysis, and computer forensics. Peter has worked in senior positions for a number of organizations, including a national telecommunications and media company, Fortune 500 cloud-computing company, a recognized cyber security software company and most recently a major US defense contractor where he focused on developing insider threat solutions, engaging in incident response and threat hunting and implementing monitoring and detection systems for security operations centers. Peter holds a number of designations including the CISSP, CISA, CRISC, CGEIT as well as a number of SANS GIAC certifications. Peter has presented at numerous events held by the FBI, US Department of Homeland Security, HTCIA, PMI, SANS, and ISACA. Peter is also a frequent guest lecturer at numerous colleges and university throughout North America.
Agenda
5:00 PM – 6:00 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
*Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.