Isaca
NIST-COBIT-2019
90 Minutes
50
ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019
A: Protect
B: Detect
C: Identify
A: Phase 4 - What Needs to Be Done?
B: Phase 2 - Where Are We Now?
C: Phase 3 - Where Do We Want to Be?
A: Information Protection Processes and Procedures
B: Anomalies and Events
C: Risk Assessment
A: Cybersecurity risk management practices are formalized and institutionalized.
B: Key stakeholders understand the quick wins of the cybersecurity program.
C: Key stakeholders understand the cybersecurity requirements of the chosen vendors.