Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/5f/00/d8/5f00d8a3-a9f2-e85e-8701-88a8f779820a/mza_7596626466744282381.jpg/600x600bb.jpg
Framework: The NIST Cybersecurity Framework (CSF)
Jason Edwards
114 episodes
1 week ago
**Framework** is your go-to podcast for mastering the **NIST Cybersecurity Framework (CSF)**—the foundational model for building and improving organizational security programs. This series breaks down every function, category, and subcategory within the CSF, helping professionals, educators, and leaders understand how to apply the framework in real-world environments. Each episode delivers clear, practical explanations that connect framework concepts to daily security operations, governance, and risk management practices. Whether you’re new to cybersecurity or refining an established program, Framework gives you the tools and understanding to align your organization with one of the most trusted security models in the world. Listeners will gain insight into how the CSF’s five core functions—Identify, Protect, Detect, Respond, and Recover—work together to strengthen resilience and reduce cyber risk. The series also explores how organizations can tailor the CSF to their size, sector, and maturity level, integrate it with other standards, and measure progress through profiles and implementation tiers. With practical examples and step-by-step explanations, Framework helps you turn the structure of the CSF into a living, operational roadmap for security success. Developed by **BareMetalCyber.com**, Framework is designed to make cybersecurity standards understandable, actionable, and relevant. Tune in on your favorite platform and build the clarity, confidence, and competence to apply the NIST Cybersecurity Framework in your organization.
Show more...
Technology
Education
RSS
All content for Framework: The NIST Cybersecurity Framework (CSF) is the property of Jason Edwards and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
**Framework** is your go-to podcast for mastering the **NIST Cybersecurity Framework (CSF)**—the foundational model for building and improving organizational security programs. This series breaks down every function, category, and subcategory within the CSF, helping professionals, educators, and leaders understand how to apply the framework in real-world environments. Each episode delivers clear, practical explanations that connect framework concepts to daily security operations, governance, and risk management practices. Whether you’re new to cybersecurity or refining an established program, Framework gives you the tools and understanding to align your organization with one of the most trusted security models in the world. Listeners will gain insight into how the CSF’s five core functions—Identify, Protect, Detect, Respond, and Recover—work together to strengthen resilience and reduce cyber risk. The series also explores how organizations can tailor the CSF to their size, sector, and maturity level, integrate it with other standards, and measure progress through profiles and implementation tiers. With practical examples and step-by-step explanations, Framework helps you turn the structure of the CSF into a living, operational roadmap for security success. Developed by **BareMetalCyber.com**, Framework is designed to make cybersecurity standards understandable, actionable, and relevant. Tune in on your favorite platform and build the clarity, confidence, and competence to apply the NIST Cybersecurity Framework in your organization.
Show more...
Technology
Education
Episodes (20/114)
Framework: The NIST Cybersecurity Framework (CSF)
Welcome to Framework: The NIST CSF

Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.

Show more...
3 weeks ago
1 minute

Framework: The NIST Cybersecurity Framework (CSF)
RC.CO-04 - Sharing Public Recovery Updates

RC.CO-04 involves sharing public updates on incident recovery using approved channels and messaging, such as breach notifications or preventative steps, to inform affected parties or the broader community. This ensures transparency about recovery efforts and future safeguards, maintaining public trust. It addresses external expectations post-incident.

This subcategory aligns with legal and risk requirements, ensuring communications are consistent and controlled to avoid misinformation. It supports reputation management by explaining recovery actions clearly and responsibly. RC.CO-04 bridges organizational recovery with public accountability.

Show more...
8 months ago
15 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RC.CO-03 - Communicating Recovery Progress

RC.CO-03 ensures recovery activities and progress are shared with designated stakeholders—like leadership and suppliers—consistent with response plans and agreements. This includes regular updates on restoration status, adhering to contractual protocols for information sharing. It keeps all parties informed and aligned during recovery.

This subcategory aligns communication with risk and operational needs, fostering trust and coordination with critical partners. It supports a unified recovery effort by ensuring transparency on progress and challenges. RC.CO-03 sustains stakeholder engagement through the restoration phase.

Show more...
8 months ago
16 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RC.RP-06 - Declaring Recovery Completion

RC.RP-06 declares the end of recovery once predefined criteria are met, finalizing the process with a comprehensive after-action report detailing the incident, actions, and lessons learned. This formal closure ensures all steps are documented for review and improvement. It marks the return to full normalcy.

This subcategory aligns with risk management by tying closure to measurable outcomes, ensuring accountability and transparency in recovery efforts. It supports future resilience by capturing insights for refinement. RC.RP-06 concludes recovery with clarity and foresight.

Show more...
8 months ago
16 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RC.RP-05 - Confirming System Restoration

RC.RP-05 verifies the integrity of restored assets—checking for lingering threats or root causes—before returning systems to production, confirming normal operations. This involves testing restoration adequacy to ensure functionality and security are fully restored. It finalizes recovery with assurance.

This subcategory aligns with risk goals by ensuring restored systems are secure and operational, preventing recurrence from overlooked issues. It supports confidence in recovery outcomes through rigorous validation. RC.RP-05 completes the restoration process with integrity.

Show more...
8 months ago
17 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RC.RP-04 - Restoring Critical Functions Post-Incident

RC.RP-04 considers critical mission functions and cybersecurity risks to define post-incident operational norms, using impact records to prioritize restoration order. This involves collaboration with system owners to confirm successful recovery and monitor performance for adequacy. It ensures recovery aligns with strategic goals.

This subcategory aligns restoration with risk and mission priorities, ensuring essential services resume first while maintaining security standards. It establishes a sustainable post-incident state, balancing functionality and protection. RC.RP-04 shapes a resilient operational recovery.

Show more...
8 months ago
17 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RC.RP-03 - Verifying Backup Integrity

RC.RP-03 ensures backups and restoration assets are checked for integrity—free of compromise or corruption—before use in recovery efforts. This verification prevents reintroducing threats or using unreliable data, safeguarding the restoration process. It guarantees a clean starting point for recovery.

This subcategory aligns with risk management by prioritizing the reliability of recovery tools, reducing the chance of failed restorations. It supports operational continuity by ensuring only trusted assets are deployed. RC.RP-03 underpins a secure recovery foundation.

Show more...
8 months ago
17 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RC.RP-02 - Prioritizing Recovery Actions

RC.RP-02 involves selecting, scoping, and prioritizing recovery actions based on incident response plan criteria and available resources, adapting as needs shift. This ensures efforts focus on critical systems first, balancing speed with effectiveness in execution. It operationalizes recovery with precision.

This subcategory aligns actions with risk and operational goals, ensuring resources address the most impactful areas efficiently. It supports flexibility by allowing reassessment of plans mid-recovery, optimizing outcomes. RC.RP-02 drives a targeted restoration process.

Show more...
8 months ago
18 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RC.RP-01 - Launching Incident Recovery Efforts

RC.RP-01 initiates the recovery phase of the incident response plan once triggered, ensuring all responsible parties are aware of their roles and required authorizations. This begins during or after containment, focusing on restoring affected systems and services systematically. It transitions the organization from response to recovery.

This subcategory aligns recovery with risk and operational priorities, ensuring a coordinated effort to regain normalcy with minimal disruption. It sets the stage for restoring availability, leveraging predefined plans for efficiency. RC.RP-01 launches the path to operational restoration.

Show more...
8 months ago
19 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.MI-02 - Eradicating Incident Threats

RS.MI-02 ensures incidents are fully eradicated, removing threats like malware or unauthorized access through automated system features or manual responder actions. This can involve third-party support, such as MSSPs, to eliminate root causes and residual risks. It restores systems to a secure state.

This subcategory aligns eradication with risk goals, ensuring complete threat removal to prevent recurrence, balancing speed with thoroughness. It supports recovery by clearing the path for safe restoration. RS.MI-02 finalizes the mitigation process with decisive action.

Show more...
8 months ago
13 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.MI-01 - Containing Cybersecurity Incidents

RS.MI-01 focuses on containing incidents to prevent their expansion, using automated tools like antivirus or manual actions by responders to isolate threats. This can involve third-party assistance (e.g., ISPs) or redirecting compromised endpoints to remediation VLANs, limiting damage. It stops incidents from spreading further.

This subcategory aligns containment with risk priorities, ensuring rapid action protects critical assets and minimizes disruption. It supports a proactive stance by leveraging both technology and human intervention as needed. RS.MI-01 is the first line of defense in incident mitigation.

Show more...
8 months ago
13 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.CO-03 - Sharing Information with Stakeholders

RS.CO-03 involves sharing incident information with designated stakeholders—both internal, like leadership, and external, like ISACs—consistent with response plans and agreements. This includes voluntary sharing of anonymized attack data or updates on insider threats with HR, enhancing situational awareness. It ensures relevant parties stay informed.

This subcategory strengthens response by aligning information flow with contractual rules and crisis protocols, such as supplier coordination. It promotes broader cybersecurity collaboration while protecting sensitive data. RS.CO-03 builds a network of informed responders and supporters.

Show more...
8 months ago
16 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.CO-02 - Notifying Stakeholders of Incidents

RS.CO-02 ensures timely notification of internal and external stakeholders—like customers, partners, or regulators—about incidents, following breach procedures or contractual obligations. This includes notifying law enforcement when criteria and approvals dictate, maintaining transparency and compliance. It keeps affected parties informed and engaged.

This subcategory aligns communication with legal and risk requirements, reducing delays in critical notifications that could impact trust or recovery. It supports coordinated response by ensuring stakeholders know their roles or risks. RS.CO-02 fosters a collaborative incident response ecosystem.

Show more...
8 months ago
15 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.AN-08 - Assessing Incident Magnitude

RS.AN-08 estimates and validates an incident’s magnitude by assessing its scope and impact, searching other targets for indicators of compromise or persistence. This involves manual reviews or automated tools to confirm the extent of damage or spread, refining initial assessments. It quantifies the incident’s true reach.

This subcategory aligns analysis with risk priorities, ensuring resources target the full breadth of an incident, from isolated to systemic effects. It supports effective mitigation by clarifying the scale of response needed. RS.AN-08 ensures a comprehensive grasp of incident consequences.

Show more...
8 months ago
16 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.AN-07 - Preserving Incident Data Integrity

RS.AN-07 focuses on collecting and preserving incident data and metadata—such as source and timestamps—using chain-of-custody procedures to ensure integrity. This comprehensive gathering supports forensic analysis and compliance, protecting evidence from alteration. It ensures data remains a trustworthy resource for investigation.

This subcategory aligns with risk and legal requirements, safeguarding critical information for root cause analysis and reporting. It enhances response accuracy by maintaining a pristine data set for review. RS.AN-07 underpins robust incident analysis and recovery.

Show more...
8 months ago
15 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.AN-06 - Recording Investigation Actions

RS.AN-06 ensures that all investigative actions during an incident—like system checks or containment steps—are meticulously recorded, with integrity and provenance preserved. This involves immutable logs by responders and detailed documentation by the incident lead, safeguarding evidence for legal or audit purposes. It maintains a reliable investigation trail.

This subcategory supports accountability and forensics by ensuring records are tamper-proof and traceable, aligning with risk management needs. It enables accurate post-incident reviews and lessons learned, enhancing future responses. RS.AN-06 upholds the credibility of incident investigations.

Show more...
8 months ago
16 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.AN-03 - Investigating Incident Causes

RS.AN-03 conducts detailed analysis to reconstruct incident events, identify involved assets, and pinpoint root causes, such as exploited vulnerabilities or threat actors. This includes examining deception technologies for attacker behavior insights, aiming to understand both immediate triggers and systemic issues. It provides the foundation for effective response and prevention.

This subcategory enhances response by delivering actionable findings, aligning analysis with risk priorities to address critical weaknesses. It supports forensics and recovery by uncovering underlying causes, reducing recurrence risks. RS.AN-03 drives a thorough understanding of incident dynamics.

Show more...
8 months ago
15 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.MA-05 - Initiating Incident Recovery

RS.MA-05 applies predefined criteria to determine when to shift from response to recovery, based on incident characteristics and operational considerations. This decision balances containment success with potential disruptions from recovery actions, ensuring a smooth transition. It marks the pivot to restoring normalcy.

This subcategory aligns recovery initiation with risk and operational priorities, preventing premature or delayed action that could worsen impacts. It ensures a deliberate, criteria-driven approach to recovery planning. RS.MA-05 facilitates a seamless move from mitigation to restoration.

Show more...
8 months ago
15 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.MA-04 - Escalating Incidents When Needed

RS.MA-04 ensures incidents are escalated or elevated to higher levels of authority or expertise when their complexity or impact exceeds initial handling capabilities. This involves tracking incident status and coordinating with designated stakeholders, both internal and external, for additional support. It maintains control over evolving incidents.

This subcategory aligns escalation with risk thresholds, ensuring timely involvement of senior leadership or specialists as needed. It enhances response flexibility by validating progress and adjusting resources dynamically. RS.MA-04 keeps incident management responsive to changing demands.

Show more...
8 months ago
16 minutes

Framework: The NIST Cybersecurity Framework (CSF)
RS.MA-03 - Categorizing and Prioritizing Incidents

RS.MA-03 categorizes incidents—such as ransomware or data breaches—and prioritizes them based on scope, impact, and urgency, balancing rapid recovery with investigation needs. This detailed review assigns incidents to specific response strategies, ensuring appropriate resource allocation. It organizes chaos into actionable steps.

This subcategory aligns response efforts with organizational priorities, focusing on high-impact events while preserving evidence where needed. It supports strategic decision-making by classifying incidents systematically. RS.MA-03 optimizes the response process for efficiency and effectiveness.

Show more...
8 months ago
16 minutes

Framework: The NIST Cybersecurity Framework (CSF)
**Framework** is your go-to podcast for mastering the **NIST Cybersecurity Framework (CSF)**—the foundational model for building and improving organizational security programs. This series breaks down every function, category, and subcategory within the CSF, helping professionals, educators, and leaders understand how to apply the framework in real-world environments. Each episode delivers clear, practical explanations that connect framework concepts to daily security operations, governance, and risk management practices. Whether you’re new to cybersecurity or refining an established program, Framework gives you the tools and understanding to align your organization with one of the most trusted security models in the world. Listeners will gain insight into how the CSF’s five core functions—Identify, Protect, Detect, Respond, and Recover—work together to strengthen resilience and reduce cyber risk. The series also explores how organizations can tailor the CSF to their size, sector, and maturity level, integrate it with other standards, and measure progress through profiles and implementation tiers. With practical examples and step-by-step explanations, Framework helps you turn the structure of the CSF into a living, operational roadmap for security success. Developed by **BareMetalCyber.com**, Framework is designed to make cybersecurity standards understandable, actionable, and relevant. Tune in on your favorite platform and build the clarity, confidence, and competence to apply the NIST Cybersecurity Framework in your organization.