From the course: Security for the SMB: Implementing the NIST Cybersecurity Framework

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Cybersecurity five-step process overview

Cybersecurity five-step process overview

From the course: Security for the SMB: Implementing the NIST Cybersecurity Framework

Start my 1-month free trial

Cybersecurity five-step process overview

- I'm going to show you how to think about cybersecurity using the NIST cybersecurity framework's five step process which works for any size or type of business. These steps are not cybersecurity specific and fits into your organization's normal business risk management processes. The five functions or steps are: identify, protect, detect, respond and recover. I'll explain each at a high level so it's useful to small and medium businesses. Step one in the framework is identify. Identify what data and technology your business has that adds value to you and to cyber criminals. You can't secure valuable assets if you don't know you have them or where they're kept. Step two in the framework is protect. Once you know your key assets, put protections in place. Sounds logical so far, right? Step three in the framework is detect. What technologies and processes do you have in place that would allow you to detect a problem or…

Contents