All Episodes

Displaying 91 - 114 of 114 in total

GV.RR-04 - Embedding Cybersecurity in HR Practices

GV.RR-04 integrates cybersecurity considerations into human resources processes, such as hiring, onboarding, training, and offboarding, to enhance organizational secur...

GV.RR-03 - Allocating Resources for Cybersecurity Success

GV.RR-03 ensures that sufficient resources—people, processes, and technology—are allocated to support the organization’s cybersecurity risk strategy and assigned roles...

GV.RR-02 - Clarifying Cybersecurity Roles and Responsibilities

GV.RR-02 focuses on defining and disseminating clear roles, responsibilities, and authorities for cybersecurity risk management across the organization. This clarity e...

GV.RR-01 - Leadership’s Role in Cybersecurity Accountability

GV.RR-01 assigns responsibility to leadership for overseeing cybersecurity risk, ensuring they are accountable for strategy development and execution. It emphasizes fo...

GV.RM-07 - Embracing Strategic Opportunities in Risk Management

GV.RM-07 recognizes that not all risks are negative, encouraging organizations to identify and discuss strategic opportunities, or “positive risks,” alongside threats....

GV.RM-06 - Standardizing Cybersecurity Risk Assessment

GV.RM-06 establishes a consistent methodology for assessing and prioritizing cybersecurity risks, using tools like risk registers or quantitative formulas. This standa...

GV.RM-05 - Building Communication Channels for Cybersecurity Risks

GV.RM-05 emphasizes creating structured communication channels to share cybersecurity risk information across departments and with external parties like suppliers. Thi...

GV.RM-04 - Crafting Strategic Risk Response Options

GV.RM-04 focuses on defining and sharing a strategic direction for responding to cybersecurity risks, outlining options like acceptance, mitigation, or transfer (e.g.,...

GV.RM-03 - Integrating Cybersecurity into Enterprise Risk Management

GV.RM-03 integrates cybersecurity risk management into the broader enterprise risk management (ERM) framework, ensuring it is considered alongside other risks like fin...

GV.RM-02 - Defining Risk Appetite and Tolerance

GV.RM-02 requires organizations to define and communicate their risk appetite—the level of risk they are willing to accept—and translate it into specific, measurable r...

GV.RM-01 - Setting Cybersecurity Risk Management Goals

GV.RM-01 involves setting clear, agreed-upon objectives for managing cybersecurity risks across the organization, ensuring alignment among stakeholders like leadership...

GV.OC-05 - Mapping Organizational Dependencies

GV.OC-05 focuses on recognizing and sharing knowledge about the external outcomes, capabilities, and services the organization relies upon to function effectively. Thi...

GV.OC-04 - Prioritizing Critical Objectives and Services

GV.OC-04 centers on identifying and communicating the critical objectives, capabilities, and services that stakeholders rely on, ensuring they are prioritized in cyber...

GV.OC-03 - Navigating Legal and Regulatory Cybersecurity Requirements

GV.OC-03 addresses the need for organizations to fully grasp and manage the legal, regulatory, and contractual obligations that govern their cybersecurity practices. T...

GV.OC-02 - Understanding Stakeholder Needs in Cybersecurity

GV.OC-02 focuses on identifying and comprehending the stakeholders—both within and outside the organization—who influence or are impacted by cybersecurity risk managem...

GV.OC-01 - Aligning Cybersecurity with Organizational Mission

The GV.OC-01 subcategory emphasizes the importance of aligning an organization’s cybersecurity risk management efforts with its overarching mission. It ensures that le...

Introduction to NIST CSF Profiles

Cybersecurity is not a one-size-fits-all approach, and that’s where N I S T C S F Profiles come in. In this episode, we break down how organizations can customize the ...

Introduction to NIST 800-53

In this episode of Bare Metal Cyber Presents: Framework, we take a deep dive into NIST 800-53, one of the most comprehensive security frameworks for implementing struc...

Cybersecurity Risk Management

In this episode of Bare Metal Cyber Presents: Framework, we explore the critical role of risk management in the NIST Cybersecurity Framework 2.0 (CSF 2.0). Cyber threa...

Cybersecurity Maturity

In this episode of Bare Metal Cyber Presents: Framework, we break down the cybersecurity maturity tiers in NIST Cybersecurity Framework 2.0 (CSF 2.0) and how organizat...

The Fundamentals of Cybersecurity Controls

In this episode of Bare Metal Cyber Presents: Framework, we take a deep dive into cybersecurity controls—the fundamental safeguards that protect organizations from cyb...

Introduction to Gap Assessments

In this episode of Bare Metal Cyber Presents: Framework, we dive into the importance of cybersecurity gap assessments—an essential process for identifying weaknesses, ...

Introduction to the NIST CSF

In this episode of Bare Metal Cyber Presents: Framework, we introduce the National Institute of Standards and Technology (NIST) and its groundbreaking Cybersecurity Fr...

Welcome to Framework! Coming Soon!

 Cybersecurity frameworks can feel complex, but they don’t have to be. Bare Metal Cyber Presents: Framework is here to break them down—especially the NIST Cybersecurit...

Broadcast by