Cybersecurity: Developing and Performing Security Assessments and Control Compliance

Registrations: 145

Date/Time by Timezone

Thu, Dec 8th, 2022 1:00 PM - 2:15 PM ET
Thu, Dec 8th, 2022 12:00 PM - 1:15 PM CT
Thu, Dec 8th, 2022 11:00 AM - 12:15 PM MT
Thu, Dec 8th, 2022 10:00 AM - 11:15 AM PT
By reserving your seat, you are agreeing to all aspects of our Legal Liability Waiver and give consent to Justice Clearinghouse to use this information to send additional communications as described in the Privacy Policy below. You agree to indemnify and hold JCH and the presenter harmless from any lawsuits, damages, injuries, losses or claims arising from your decisions as to how to use this information.

Security assessments are an important process in determining the value and importance of an organization’s assets and the cost and impacts should they be compromised. Assets are not only technological and can span networks, devices, data, intelligence and even materials, equipment, inventories and human workers and the workforce.

Every organization sector has a different reliance on assets and the security controls for them will differ, reflecting their value as well as levels of confidentiality and sometimes legislative requirements. Both private and public sectors, across all industries will find this webinar useful. Law enforcement, government and military will find this webinar very useful as it covers assessment and compliance with NIST and also addresses the importance of the Authorization to Operate and that the proper controls are selected and implemented.

This webinar will cover the basics of the Security Assessment and Authorization (SA&A) process, generically and using the industry standard NIST 800:53. It will also cover the main SA&A deliverables and reports and what they are used for, and SA&A formulas and procedures for assessing assets, the current security posture, vulnerabilities, and the four threat scenarios we aim the protect against. A short discussion on insider threats will be given to provide an understanding of how this threat is a derivative of the common threat scenarios and how it is mitigated through certain security controls and the security assessment tool, TIGIR, will be used to demonstrate some of the more complex deliverables. Other standards and assessments, such as SOC 1,23, ISO 27000 series, CMMC and others will also be explained. Attendees will leave with a working knowledge on develop the scope and how to perform a security assessment and the NIST standard, as well as an understanding of other industry standards, and common terms and deliverables in Security Assessments.

 

Other Webinars with this Speaker:

Additional Resources
2 months ago
Online Course: Resolving Workplace Conflict Using Mediation Techniques
What do most people envision when they think of conflict? Hostility, raised voices, a racing heartbe […]
1 year ago
Building a Crime Gun Intelligence Capability
How do you stop gun violence when it reaches a point that an innocent 13-year-old is gunned down whi […]
1 year ago
From Flash to Bang: How Disinformation Fueled the Attack on The U.S. Capitol
Disinformation is wreaking havoc on our modern society. The January sixth attack on the Capitol is o […]
2 years ago
Thoughts on Crime Gun Intelligence from Pete Gagliardi
Pete Gagliardi shared some incredible insights and advice during the webinar, Sustainable Crime Gun […]
4 years ago
Intelligence-Driven Strategies: Creating an Integrated Approach for Justice Agencies
The shift towards intelligence based practices rose post-9/11. From being a largely response-focused […]
X