Step 2 of the NIST Cybersecurity Framework is protect. Learn the importance of protecting data, technology, and services by using humans and technology as the solutions.
- Now that we covered step one, Identify,…you're ready to create an inventory list of key assets,…identify access to systems based on job roles,…and make a list of Cloud providers…your business uses or may want to use.…In step two, Protect, we're going to look…at how to secure those key assets.…Protection comes in many forms,…from nontechnical human components…to highly technical products…you'll need specialists to deploy.…
Some protective steps can be taken today…by anyone and everyone in your office.…But some will require a bit of research…to find the best company and products…to partner with on your security journey.…The threats are always changing…as we adapt to protect ourselves,…so you'll need to stay vigilant…to be sure you evaluate your security…and adapt to the new threats as they come out.…Let's look at how you can start…protecting your business from cyber threats right now.…
Author
Released
7/16/2018- Physical security vs. cybersecurity
- Identifying what you have that's valuable to others
- Protecting valuable data and accounts
- Detecting a breach
- Responding to an incident in an efficient manner
- Recovering from a breach
- Technology checklists for small and medium businesses
Skill Level Beginner
Duration
Views
Related Courses
-
IT Security: Key Policies and Resources
with Gregory Michaelidis23m 44s Intermediate -
IT Security Foundations: Core Concepts
with Lisa Bock1h 13m Beginner -
Cybersecurity Foundations
with Malcolm Shore2h 26m Intermediate
-
Introduction
-
Welcome1m 4s
-
-
1. The Basics
-
Why you should care4m 5s
-
-
2. Identify
-
Step #1: Identify key assets1m 47s
-
What about the cloud?5m 26s
-
-
3. Protect
-
4. Detect
-
Step #3: Detect a breach1m 47s
-
-
5. Respond
-
State breach response laws3m 13s
-
6. Recover
-
Cybersecurity insurance4m 27s
-
Reputation management2m 5s
-
7. Resources
-
Scam and threat alerts3m 32s
-
Conclusion
-
Next steps1m 18s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Step #2: Protect data and accounts