Hi [[ session.user.profile.firstName ]]

Simplifying The NIST Cybersecurity Framework

It's clear that running cybersecurity as a true business function has never been more important than it is today. The NIST Cybersecurity Framework was designed by over 3,000 industry professionals as a gold standard collection of best practices for businesses across all industries. Business leaders have been quick to integrate the NIST CSF, with great results. However, at over 900 controls the NIST CSF is seen as the most complex framework to implement. In this webinar, you will learn how to streamline NIST CSF adoption from CyberSaint Founder George Wrenn, who was active in creating and reviewing the Framework itself. Webinar Takeaways: The origination and benefits of NIST Cybersecurity Framework How to identify and go through the 5 phases of the NIST CSF How to use your resources to your advantage as you adopt the Framework How to weigh your costs and impact on your overall cyber program
Recorded Oct 29 2020 15 mins
Your place is confirmed,
we'll send you email reminders
Presented by
George Wrenn, Founder, Former Fortune 500 CSO
Presentation preview: Simplifying The NIST Cybersecurity Framework

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Practice vs Process Maturity: Strengthening Your Cyber Compliance & Risk Program Dec 21 2020 8:00 pm UTC 45 mins
    Steve Torino, Principal Solutions Architect
    How mature is your cybersecurity program? Are you measuring practice and process maturity? Compliance and risk programs demand up-to-date practices, and diligent processes, to lay a strong foundation for success. Learn how to measure and manage both towards the ultimate program in this webinar!

    Meeting compliance against regulations such as NIST, NERC, ISO27001 and ISO27002, DFARS (NIST SP 800-171), and others are critical to the success of your program. The key to compliance is implementing a continuous compliance program that is improved in real-time, meeting compliance, and enabling trust between CISOs, compliance, and risk teams.

    When it comes to risk management programs, your program must support risk quantification and report across technology, operations, and organizational strategy that aligns with organizational objectives. Leveraging dynamic risk identification, prioritization, and reporting can certainly help to strengthen your program more than before.

    What tactics can you use to facilitate this trajectory? Tune in to learn some of the most valuable recommendations from our information security experts.
  • Live: Automating Cyber Risk & Compliance Management with CyberStrong Dec 17 2020 11:00 pm UTC 24 mins
    Steve Torino, Principal Solutions Architect
    CyberSaint’s CyberStrong platform is disrupting the legacy GRC market with unprecedented assessment automation and agility as the only purpose-built integrated risk management platform for cybersecurity programs. CyberStrong’s patented natural language processing and machine learning technology are factors for the company's recent Gartner Cool Vendor designation, among others. At an industry level, there is currently a lack of best practice for mapping real-time telemetry into control environments, but CyberSaint is making progress in this area, making it accessible to customers from fortune 50 titans to mid-sized companies across the globe. Customers use CyberStrong to manage, measure and communicate their cybersecurity program performance in line with risk, compliance, and organizational objectives.

    CyberSaint’s mission is to empower all organizations to build a cybersecurity program that is as clear, actionable, and measurable as any other business function. Teams and executives across information security and beyond use CyberSaint’s CyberStrong platform to build cybersecurity resilience across risk and compliance programs with agility and alignment. Customers communicate cybersecurity program posture, value, and return on security investment from a trusted single system of record that adds advanced automation to risk and compliance assessments and programs. Organizations across the Fortune 500 and high-growth startups alike are empowered to simplify even the most extensive continuous compliance and risk projects and achieve remarkable results.
  • Ensuring Security & Compliance for Global Healthcare Dec 16 2020 7:00 pm UTC 31 mins
    Steve Torino, Principal Solutions Architect at CyberSaint; Shauntinez Jakab, Senior Director at Virsec
    While regulations the standards are prevalent in the healthcare sector, plenty of security risks remain as organizations aim to safeguard the privacy of medical records and patient data. With global healthcare organizations struggling to meet compliance mandates at the minimum, how can they foster a risk-aware culture that strengthens cyber resilience? To start, by assessing where they stand and determine where to intelligently and strategically improve.
  • 2021 Predictions: Cyber Risk Management, Global Attacks, and Regulatory Change Dec 10 2020 8:00 pm UTC 30 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder
    In this webinar, our experts explore the cyber risk landscape, anticipated regulatory changes, and pervasive attacks that we predict will shake up 2021. Further, we look at the unprecedented events of 2020 and discuss how these global shifts may affect the coming year.

    According to Cybersecurity Ventues, Cybercrime damage costs are predicted to hit $6 trillion annually by 2021. Cyber crime damages will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. It is no question that the events of 2020 and our increasingly digitized world are propelling us into a new wave of cyber attacks, cyber risks, and regulatory change in the coming years. Watch the webinar to hear predictions for 2021 directly from our cyber risk and regulatory compliance experts.
  • Understanding the DFARS Interim Rule: Key Takeaways for Your CMMC Strategy Dec 9 2020 5:00 pm UTC 61 mins
    Padraic O'Reilly, Chief Product Officer & Co-Founder CyberSaint; Sanjeev Verma, Co-Founder PreVeil; Berhard Bock, CISO SysArc
    This webinar focused on helping defense Primes, Contractors, and Subcontractors understand the DFARS Interim Rule and its implications for their Cybersecurity Maturity Model Certification (CMMC) strategy.

    The webinar features Bernhard Bock, CISO, who just finished his Provisional Assessor training and was able to explain to viewers what the Interim Rule requires of contractors. Padraic O’Reilly, technology innovator and frameworks expert, also presents and discussed how defense companies can determine, remediate, and maintain their NIST and CMMC compliance scores. We close out the webinar by providing attendees a look at how the choice of the right technology, presented by Sanjeev Verma, Co-Founder, is critical to demonstrating the maturity required by the Interim Rule as well as enabling CMMC compliance.

    Speakers:

    Bernhard Bock- CISO @ SysArc
    Padraic O’Reilly- Co-founder @ CyberSaint
    Sanjeev Verma – Co-founder @PreVeil
    Stuart Itkin – CEO @Cycurity Advisors
  • 2020 Recap: The Top Cyber Events of the Year Analyzed Dec 3 2020 8:00 pm UTC 45 mins
    Steve Torino, Principal Solutions Architect
    2020 has been a year full of change, and we've gone through digital transformation initiatives in the span of a single year that probably would have taken us many years otherwise. As COVID-19 has been pervasive across global headlines, cybercriminals have taken advantage of the chaos leading to an increase in cyber attacks seen in 80% of firms 2020. Cloud-based attacks rose 630% between January and April, phishing attempts rose 600% since February, and ransomware attacks rose 148% in March, according to FinTech News.

    In this webinar, we delve into detail on the most newsworthy attacks of 2020, the most pervasive cyber trends, and postulate whether cyber risk could have been mitigated to help organizations avoid these events.
  • The NIST Cybersecurity Framework Implementation Tiers Simplified Dec 1 2020 5:00 pm UTC 17 mins
    Steve Torino, Principal Solutions Architect
    In this talk, CyberSaint Principal Solutions Architect Steve Torino dives into the NIST CSF Implementation Tiers and explains how to use them to bridge the gap between business and technical leadership, how to choose what tier is right for your organization or asset, and walks viewers through each tier in detail.
  • Why We're Cool: Gartner Cool Vendors in Cyber & IT Risk Management Q4 2020 Recorded: Nov 19 2020 28 mins
    Alison Furneaux, VP of Marketing and Padraic O'Reilly, Co-Founder & Chief Product Officer
    We’re excited to be named in the 2020 Gartner Cool Vendors in Cyber & IT Risk Management report!

    What makes the CyberStrong platform new, innovative, and impactful? We believe in solving enterprise cybersecurity and IT risk management challenges with breakthrough innovations that enable agile digital transformation for cyber risk and compliance teams. Learn more about why CyberSaint is being recognized.

    Gartner, Cool Vendors in Cyber and IT Risk Management
    The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc.
    and/or its affiliates and is used herein with permission. All rights reserved. Gartner does
    not endorse any vendor, product or service depicted in its research publications and
    does not advise technology users to select only those vendors with the highest ratings or
    other designation. Gartner research publications consist of the opinions of Gartner’s
    Research & Advisory organization and should not be construed as statements of fact.
    Gartner disclaims all warranties, expressed or implied, with respect to this research,
    including any warranties of merchantability or fitness for a particular purpose
  • Transform Cyber Risk Management to Support Digital Transformation Recorded: Nov 18 2020 27 mins
    Steve Torino, Principal Solutions Architect
    As of 2020, 68% of business leaders feel their cybersecurity risks are increasing, yet only 16% of executives say their organizations are well prepared to deal with cyber risk. 2020 has been a year full of change, and we've gone through digital transformation initiatives in the span of a single year that probably would have taken us many years otherwise.

    Organizations' approach to cyber risk management must change to facilitate security in this digital era, but this is no easy task. Many leading organizations are including cyber risk transformation projects within their overall digital transformation initiatives to support this shift. Cyber risk transformation requires a collaborative effort across the CISO group, IT compliance, other facets of information security and technology, and risk management teams. These improvements across cyber risk should align with business needs, hit on key security challenges, and help to automate compliance requirements.

    Through integrations and powerful patented automation, businesses can leverage data coming from disparate applications in the information technology and security tech stack to enable compliance automation, dynamic risk management, and data-driven decision-making.
  • Automating Compliance Across Frameworks with Natural Language Processing (NLP) Recorded: Nov 18 2020 25 mins
    Steve Torino, Principal Solutions Architect
    What is Natural Language Processing, and how can security professionals use it to make the most of all the valuable data coming out of their tech stack? In this webinar, CyberSaint's Principal Security Architect Steve Torino will cover how organizations can leverage NLP in two ways: Mapping data from Vulnerability Management tools, SIEM, SOAR, and other solutions to compliance controls and meet NIST requirements in real-time. Harmonizing controls frameworks thereby meeting compliance across standards such as CIS, HIPAA, ISO, NERC, PCI, and many more. Learn how organizations are using CyberSaint's patented technology to automate compliance, optimize resources, and dramatically reduce manual intervention.
  • Incorporate the Financial Services Sector Profile into Your Compliance Strategy Recorded: Nov 17 2020 22 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder
    The Financial Services Sector (FSSCC) Cyber Security Profile is one of the critical pieces of information used for proving compliance across a host of standards necessary of financial institutions of all types, financial services companies, financial firms, and their third-party providers.

    A recent survey showed that CISOs in the financial services sector spent 40% of their time, and their teams’ time reconciling various cybersecurity and regulatory frameworks instead of focusing on cybersecurity needs. This time spent was because each regulation has its own standards for institutions to follow for their cybersecurity initiatives resulting in a segmented approach to compliance with various regulatory standards.

    The Financial Services Sector Coordinating Council developed the Financial Services Sector Cybersecurity Profile to unify CISOs and practitioners’ efforts to maintain and improve their compliance activity. Learn how to implement the profile, eliminate manual inefficiencies, and bolster your cybersecurity resilience in this webinar.

    The FSSCC Cybersecurity Profile uses a cybersecurity risk management-based approach, very similar to the NIST Cybersecurity Framework, from which it draws inspiration. One thing that separates the FSSCC from the NIST CSF is that the FSSCC is broken up into four impact tiers based on an institution’s impact on the world.
  • Inform Your Risk Management Strategy for the Rest of 2020 Recorded: Nov 11 2020 23 mins
    Steve Torino, Principal Solutions Architect
    The recent COVID-19 pandemic clearly shows us that risk management must be a clear priority from now through the end of 2020. While most organizations focus on managing compliance, some organizations have identified ways to promote continuous compliance within their organizations, making compliance more achievable and making way for a risk-based approach. To go beyond static risk assessments, there are a few key actions that security leaders can take today that promote a continuously risk-aware culture and program. Our Principal Solutions Architect, Steve Torino, will discuss these helpful strategies that transform compliance programs to risk-based programs including: How risks have changed and what risks have emerged as priorities with the rise of COVID-19, the shift to remote work, and more How to prioritize remediation activities across people, process and technology controls How these trends should inform your risk management strategy for the remainder of 2020.
  • Live: Automating Cyber Risk & Compliance Management with CyberStrong Recorded: Nov 5 2020 25 mins
    Steve Torino, Principal Solutions Architect
    CyberSaint’s CyberStrong platform is disrupting the legacy GRC market with unprecedented assessment automation and agility as the only purpose-built integrated risk management platform for cybersecurity programs. CyberStrong’s patented natural language processing and machine learning technology are factors for the company's recent Gartner Cool Vendor designation, among others. At an industry level, there is currently a lack of best practice for mapping real-time telemetry into control environments, but CyberSaint is making progress in this area, making it accessible to customers from fortune 50 titans to mid-sized companies across the globe. Customers use CyberStrong to manage, measure and communicate their cybersecurity program performance in line with risk, compliance, and organizational objectives.

    CyberSaint’s mission is to empower all organizations to build a cybersecurity program that is as clear, actionable, and measurable as any other business function. Teams and executives across information security and beyond use CyberSaint’s CyberStrong platform to build cybersecurity resilience across risk and compliance programs with agility and alignment. Customers communicate cybersecurity program posture, value, and return on security investment from a trusted single system of record that adds advanced automation to risk and compliance assessments and programs. Organizations across the Fortune 500 and high-growth startups alike are empowered to simplify even the most extensive continuous compliance and risk projects and achieve remarkable results.
  • Illustrate the Value of Your Cyber Program With Return on Security Investment Recorded: Nov 3 2020 37 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder
    Join CyberSaint Chief Product Officer Padraic O'Reilly as he discusses the value that Return on Security Investment (RoSI) can have for information security leaders as they pursue more budget in the new year. Using a ROSI calculation, even better - an automated ROSI calculation, can enable information security leaders to illustrate where their proposed budget and requests for more funding will go. Padraic will dive into the process to calculate Return on Security Investment and how to best articulate that to business-side executives for greatest impact. In this webinar you'll learn: How Return on Security Investment (RoSI) is calculated Ways to articulate RoSI to business-side leadership How to illustrate RoSI such that it delivers the greatest value to executive management.
  • Simplifying The NIST Cybersecurity Framework Recorded: Oct 29 2020 15 mins
    George Wrenn, Founder, Former Fortune 500 CSO
    It's clear that running cybersecurity as a true business function has never been more important than it is today. The NIST Cybersecurity Framework was designed by over 3,000 industry professionals as a gold standard collection of best practices for businesses across all industries. Business leaders have been quick to integrate the NIST CSF, with great results. However, at over 900 controls the NIST CSF is seen as the most complex framework to implement. In this webinar, you will learn how to streamline NIST CSF adoption from CyberSaint Founder George Wrenn, who was active in creating and reviewing the Framework itself. Webinar Takeaways: The origination and benefits of NIST Cybersecurity Framework How to identify and go through the 5 phases of the NIST CSF How to use your resources to your advantage as you adopt the Framework How to weigh your costs and impact on your overall cyber program
  • Automating Compliance Across Frameworks with Natural Language Processing (NLP) Recorded: Sep 17 2020 26 mins
    Steve Torino, Principal Solutions Architect
    What is Natural Language Processing, and how can security professionals use it to make the most of all the valuable data coming out of their tech stack? In this webinar, CyberSaint's Principal Security Architect Steve Torino will cover how organizations can leverage NLP in two ways: Mapping data from Vulnerability Management tools, SIEM, SOAR, and other solutions to compliance controls and meet NIST requirements in real-time. Harmonizing controls frameworks thereby meeting compliance across standards such as CIS, HIPAA, ISO, NERC, PCI, and many more. Learn how organizations are using CyberSaint's patented technology to automate compliance, optimize resources, and dramatically reduce manual intervention.
  • Inform Your Risk Management Strategy for the Rest of 2020 Recorded: Aug 19 2020 24 mins
    Steve Torino, Principal Solutions Architect
    The recent COVID-19 pandemic clearly shows us that risk management must be a clear priority from now through the end of 2020. While most organizations focus on managing compliance, some organizations have identified ways to promote continuous compliance within their organizations, making compliance more achievable and making way for a risk-based approach. To go beyond static risk assessments, there are a few key actions that security leaders can take today that promote a continuously risk-aware culture and program. Our Principal Solutions Architect, Steve Torino, will discuss these helpful strategies that transform compliance programs to risk-based programs including: How risks have changed and what risks have emerged as priorities with the rise of COVID-19, the shift to remote work, and more How to prioritize remediation activities across people, process and technology controls How these trends should inform your risk management strategy for the remainder of 2020.
  • Illustrate the Value of Your Cyber Program With Return on Security Investment Recorded: Jan 23 2020 38 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder
    Join CyberSaint Chief Product Officer Padraic O'Reilly as he discusses the value that Return on Security Investment (RoSI) can have for information security leaders as they pursue more budget in the new year. Using a ROSI calculation, even better - an automated ROSI calculation, can enable information security leaders to illustrate where their proposed budget and requests for more funding will go. Padraic will dive into the process to calculate Return on Security Investment and how to best articulate that to business-side executives for greatest impact. In this webinar you'll learn: How Return on Security Investment (RoSI) is calculated Ways to articulate RoSI to business-side leadership How to illustrate RoSI such that it delivers the greatest value to executive management.
  • Simplifying The NIST Cybersecurity Framework Recorded: Dec 19 2019 16 mins
    George Wrenn, Founder, Former Fortune 500 CSO
    It's clear that running cybersecurity as a true business function has never been more important than it is today. The NIST Cybersecurity Framework was designed by over 3,000 industry professionals as a gold standard collection of best practices for businesses across all industries. Business leaders have been quick to integrate the NIST CSF, with great results. However, at over 900 controls the NIST CSF is seen as the most complex framework to implement. In this webinar, you will learn how to streamline NIST CSF adoption from CyberSaint Founder George Wrenn, who was active in creating and reviewing the Framework itself. Webinar Takeaways: The origination and benefits of NIST Cybersecurity Framework How to identify and go through the 5 phases of the NIST CSF How to use your resources to your advantage as you adopt the Framework How to weigh your costs and impact on your overall cyber program
Cybersecurity as a Business Function
Webinars, panels, and commentary for cutting-edge CISOs, cybersecurity teams, IT compliance professionals, and risk management experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Simplifying The NIST Cybersecurity Framework
  • Live at: Oct 29 2020 10:00 pm
  • Presented by: George Wrenn, Founder, Former Fortune 500 CSO
  • From:
Your email has been sent.
or close