Framework offentlig
[search 0]
Mer
Download the App!
show episodes
 
Artwork

1
Framework Focus

A SoftWriters Podcast

icon
Unsubscribe
icon
Unsubscribe
Månedlig
 
You’re listening to ”Framework Focus,” the podcast that explores trends, innovations, and insights in the long-term care pharmacy industry. Join us as we connect the entire LTC ecosystem.
  continue reading
 
Artwork

1
framework radio

produced and hosted by patrick mcginley

icon
Unsubscribe
icon
Unsubscribe
Månedlig+
 
phonography, field recording, the art of sound-hunting. open your ears and listen. more info at https://frameworkradio.net. support us at https://www.patreon.com/frameworkradio. 1 hour approx., updated weekly.
  continue reading
 
Artwork

1
Framework Leadership

SEU Media Network

icon
Unsubscribe
icon
Unsubscribe
Månedlig+
 
On Framework Leadership, Kent Ingle talks to some of the world’s most successful and innovative leaders about where they came from, how they developed their leadership skills, and how they lead their organizations to success. Listeners look forward to discovering how each guest found their driving passion and stays disciplined in a world full of distraction along with the practical ways they find the courage to act on opportunities.
  continue reading
 
Bare Metal Cyber Presents: Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF). Hosted by Dr. Jason Edwards, this series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Wh ...
  continue reading
 
Artwork
 
The "C-Suite Framework" podcast dives deep into the world of corporate leadership by speaking with experts and C-Suite executives about key roles such as Operations, Risk, People, and Sustainability. Each episode dissects the challenges leaders face today, offering insights and practical takeaways for listeners looking to enhance their own careers. Balancing depth with fun, the podcast is both entertaining and informative, giving listeners a unique perspective into the dynamics of executive ...
  continue reading
 
Artwork

1
The Framework

Jason Gardner

icon
Unsubscribe
icon
Unsubscribe
Månedlig
 
A seed of structure in a supersaturated sea of information. A conversation to engineer your mental framework. A journey in pursuit of happiness through logic, questions, and introspection. Welcome to The Framework.
  continue reading
 
Artwork

1
Framework Conversations

Davidson Jules

icon
Unsubscribe
icon
Unsubscribe
Månedlig
 
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/davidson-jules/subscribe Join leader, optimist and change maker Davidson Jules as he sits down with some brilliant, inspiring and wonderful guests on their life stories and changes they are making to this world and people's lives. We talk about educational leadership, personal development and topics that matter for sustainable solution. Our goal is to Motivate, Encourage and Inspire! "If your goals don't influence your calenda ...
  continue reading
 
Artwork
 
A shiur based on the text of Derech Hashem. We will Use the clarity of the Ramchal to: Elucidate fundamental and esoteric ideas in Judaism. Give an introduction to Kabbalah and Chasidus. Give a sense of the “the big picture” of Hashem’s interactions with his world. We will take cerebral understandings and apply them “Al derech Havoda”to live a fuller Jewish life.
  continue reading
 
Artwork
 
Each Wednesday, Kurtis talks about either a framework or financial concept. These could be personal or professional and will span a wide range of topics. Once a month, Kurtis will host a guest to get another perspective. Join us in this journey to improve our thinking in life and work. Show notes and resources at kurtishanni.com/ff-podcast
  continue reading
 
This is a series dedicated to unlocking the power of Leadership, Ideas, People and Strategy in Organisations. Podcast Series: Mastering LIPS – Leadership, Ideas, People, and Strategy Episode 1: Introduction to the LIPS Framework Overview of the LIPS framework: Leadership, Ideas, People, and Strategy. Importance of integrating these elements for organisational success. Brief introduction to what each component entails and its impact on the organization. Episode 2: The Role of Leadership in th ...
  continue reading
 
Loading …
show series
 
RC.CO-04 involves sharing public updates on incident recovery using approved channels and messaging, such as breach notifications or preventative steps, to inform affected parties or the broader community. This ensures transparency about recovery efforts and future safeguards, maintaining public trust. It addresses external expectations post-incide…
  continue reading
 
In this podcast episode, Brendan Gilmore, managing director of BPG Strategy, shares his extensive experience in financial services, particularly focusing on debt and its strategic implications for businesses. He discusses the importance of understanding readiness for debt, the mindset required for engaging with debt markets, and the various types o…
  continue reading
 
Join host Patrick Hussey as he chats with Melissa Post, Director of People & Culture at SoftWriters, about tackling staffing challenges and creating a thriving workplace in long-term care (LTC) pharmacies. Melissa shares actionable strategies for recruiting and retaining top talent amid industry-wide shortages, building a strong talent bench throug…
  continue reading
 
RC.CO-03 ensures recovery activities and progress are shared with designated stakeholders—like leadership and suppliers—consistent with response plans and agreements. This includes regular updates on restoration status, adhering to contractual protocols for information sharing. It keeps all parties informed and aligned during recovery. This subcate…
  continue reading
 
RC.RP-06 declares the end of recovery once predefined criteria are met, finalizing the process with a comprehensive after-action report detailing the incident, actions, and lessons learned. This formal closure ensures all steps are documented for review and improvement. It marks the return to full normalcy. This subcategory aligns with risk managem…
  continue reading
 
RC.RP-05 verifies the integrity of restored assets—checking for lingering threats or root causes—before returning systems to production, confirming normal operations. This involves testing restoration adequacy to ensure functionality and security are fully restored. It finalizes recovery with assurance. This subcategory aligns with risk goals by en…
  continue reading
 
RC.RP-04 considers critical mission functions and cybersecurity risks to define post-incident operational norms, using impact records to prioritize restoration order. This involves collaboration with system owners to confirm successful recovery and monitor performance for adequacy. It ensures recovery aligns with strategic goals. This subcategory a…
  continue reading
 
RC.RP-03 ensures backups and restoration assets are checked for integrity—free of compromise or corruption—before use in recovery efforts. This verification prevents reintroducing threats or using unreliable data, safeguarding the restoration process. It guarantees a clean starting point for recovery. This subcategory aligns with risk management by…
  continue reading
 
RC.RP-02 involves selecting, scoping, and prioritizing recovery actions based on incident response plan criteria and available resources, adapting as needs shift. This ensures efforts focus on critical systems first, balancing speed with effectiveness in execution. It operationalizes recovery with precision. This subcategory aligns actions with ris…
  continue reading
 
RC.RP-01 initiates the recovery phase of the incident response plan once triggered, ensuring all responsible parties are aware of their roles and required authorizations. This begins during or after containment, focusing on restoring affected systems and services systematically. It transitions the organization from response to recovery. This subcat…
  continue reading
 
RS.MI-02 ensures incidents are fully eradicated, removing threats like malware or unauthorized access through automated system features or manual responder actions. This can involve third-party support, such as MSSPs, to eliminate root causes and residual risks. It restores systems to a secure state. This subcategory aligns eradication with risk go…
  continue reading
 
RS.MI-01 focuses on containing incidents to prevent their expansion, using automated tools like antivirus or manual actions by responders to isolate threats. This can involve third-party assistance (e.g., ISPs) or redirecting compromised endpoints to remediation VLANs, limiting damage. It stops incidents from spreading further. This subcategory ali…
  continue reading
 
RS.CO-03 involves sharing incident information with designated stakeholders—both internal, like leadership, and external, like ISACs—consistent with response plans and agreements. This includes voluntary sharing of anonymized attack data or updates on insider threats with HR, enhancing situational awareness. It ensures relevant parties stay informe…
  continue reading
 
RS.CO-02 ensures timely notification of internal and external stakeholders—like customers, partners, or regulators—about incidents, following breach procedures or contractual obligations. This includes notifying law enforcement when criteria and approvals dictate, maintaining transparency and compliance. It keeps affected parties informed and engag…
  continue reading
 
RS.AN-08 estimates and validates an incident’s magnitude by assessing its scope and impact, searching other targets for indicators of compromise or persistence. This involves manual reviews or automated tools to confirm the extent of damage or spread, refining initial assessments. It quantifies the incident’s true reach. This subcategory aligns ana…
  continue reading
 
RS.AN-07 focuses on collecting and preserving incident data and metadata—such as source and timestamps—using chain-of-custody procedures to ensure integrity. This comprehensive gathering supports forensic analysis and compliance, protecting evidence from alteration. It ensures data remains a trustworthy resource for investigation. This subcategory …
  continue reading
 
RS.AN-06 ensures that all investigative actions during an incident—like system checks or containment steps—are meticulously recorded, with integrity and provenance preserved. This involves immutable logs by responders and detailed documentation by the incident lead, safeguarding evidence for legal or audit purposes. It maintains a reliable investig…
  continue reading
 
RS.AN-03 conducts detailed analysis to reconstruct incident events, identify involved assets, and pinpoint root causes, such as exploited vulnerabilities or threat actors. This includes examining deception technologies for attacker behavior insights, aiming to understand both immediate triggers and systemic issues. It provides the foundation for ef…
  continue reading
 
RS.MA-05 applies predefined criteria to determine when to shift from response to recovery, based on incident characteristics and operational considerations. This decision balances containment success with potential disruptions from recovery actions, ensuring a smooth transition. It marks the pivot to restoring normalcy. This subcategory aligns reco…
  continue reading
 
RS.MA-04 ensures incidents are escalated or elevated to higher levels of authority or expertise when their complexity or impact exceeds initial handling capabilities. This involves tracking incident status and coordinating with designated stakeholders, both internal and external, for additional support. It maintains control over evolving incidents.…
  continue reading
 
RS.MA-03 categorizes incidents—such as ransomware or data breaches—and prioritizes them based on scope, impact, and urgency, balancing rapid recovery with investigation needs. This detailed review assigns incidents to specific response strategies, ensuring appropriate resource allocation. It organizes chaos into actionable steps. This subcategory a…
  continue reading
 
RS.MA-02 involves triaging and validating incident reports to confirm their cybersecurity relevance and need for response, applying severity criteria to prioritize action. This preliminary review filters out non-issues, ensuring resources focus on genuine threats like breaches or malware. It streamlines the initial handling of reported events. This…
  continue reading
 
RS.MA-01 initiates the execution of the incident response plan in coordination with third parties—like outsourcers or suppliers—once an incident is confirmed. This includes designating an incident lead and activating additional plans (e.g., business continuity) as needed to support response efforts. It ensures a structured, collaborative approach t…
  continue reading
 
DE.AE-08 involves declaring incidents when adverse events meet predefined criteria, such as severity or scope, ensuring a formal response is triggered. This process accounts for known false positives to avoid unnecessary escalation, applying criteria to event characteristics systematically. It marks the transition from detection to response. This s…
  continue reading
 
DE.AE-07 integrates cyber threat intelligence and contextual data—like asset inventories or vulnerability disclosures—into adverse event analysis to enhance accuracy and relevance. This involves securely feeding intelligence to detection technologies and personnel, enabling rapid analysis of supplier or third-party advisories. It enriches understan…
  continue reading
 
DE.AE-06 ensures that information about adverse events is promptly shared with authorized staff—such as SOC teams and incident responders—and integrated into response tools. This includes generating alerts, assigning tickets in ticketing systems, and providing access to analysis findings at all times. It enables swift, coordinated action against de…
  continue reading
 
DE.AE-04 estimates the impact and scope of adverse events to gauge their potential harm, using tools like SIEMs or manual analysis to assess affected assets and severity. This process refines initial estimates through review, ensuring a clear understanding of consequences like data loss or downtime. It informs prioritization of response efforts. Th…
  continue reading
 
DE.AE-03 correlates information from diverse sources—like logs, sensors, and threat intelligence—to build a unified picture of potential adverse events. This involves consolidating log data into centralized servers and using event correlation tools (e.g., SIEM) to identify patterns or connections. It enhances detection by linking disparate clues in…
  continue reading
 
DE.AE-02 focuses on analyzing potentially adverse events to understand their nature, using tools like SIEM systems to examine log events for malicious or suspicious activity. This includes leveraging cyber threat intelligence to characterize threat actors, tactics, and indicators of compromise, supplemented by manual reviews where automation falls …
  continue reading
 
DE.CM-09 involves monitoring hardware, software, runtime environments, and associated data to detect adverse events like malware, phishing, or tampering. This includes tracking authentication attempts, configuration changes, and endpoint health to identify risks such as unauthorized software or credential attacks. It ensures a deep, system-level vi…
  continue reading
 
DE.CM-06 requires monitoring the activities and services of external providers—like cloud platforms or ISPs—to detect adverse events that could impact the organization. This includes tracking remote administration or onsite maintenance by third parties for deviations from expected behavior. It ensures external dependencies don’t become blind spots.…
  continue reading
 
DE.CM-03 monitors personnel activity and technology usage to identify potentially adverse events, such as insider threats or policy violations, using tools like behavior analytics and access logs. This includes tracking unusual access patterns or interactions with deception technologies, like honeypot accounts, to detect malicious intent. It focuse…
  continue reading
 
DE.CM-02 involves monitoring the physical environment housing technology assets to detect adverse events, such as unauthorized access or tampering with controls like locks and alarms. This includes reviewing logs from badge readers and visitor records for unusual patterns, supplemented by tools like cameras and security guards. It protects the phys…
  continue reading
 
DE.CM-01 focuses on continuously monitoring networks and network services, such as DNS and BGP, to detect potentially adverse events like unauthorized connections or traffic anomalies. This involves comparing real-time network flows against established baselines to identify deviations that could signal a security threat. It ensures visibility into …
  continue reading
 
PR.IR-04 maintains sufficient resource capacity—storage, compute, power, and bandwidth—to ensure system availability, monitoring usage and forecasting needs. This proactive scaling prevents performance bottlenecks or failures that could disrupt operations. It aligns capacity planning with risk and resilience objectives. This subcategory supports un…
  continue reading
 
PR.IR-03 implements mechanisms like redundant storage, load balancing, and high-availability components to meet resilience requirements under both normal and adverse conditions. This avoids single points of failure, ensuring systems remain operational during disruptions. It supports continuous service delivery aligned with risk goals. This subcateg…
  continue reading
 
PR.IR-02 safeguards technology assets from environmental threats like flooding, fire, or excessive heat, using physical protections and resilient infrastructure. This includes requiring service providers to mitigate such risks in their operations, ensuring consistent protection across owned and outsourced systems. It maintains asset availability un…
  continue reading
 
PR.IR-01 protects networks and environments from unauthorized logical access by segmenting them based on trust boundaries (e.g., IT, IoT, OT) and restricting communications to essentials. This includes zero trust architectures and endpoint health checks to limit access to verified devices only. It prevents intruders from moving freely within system…
  continue reading
 
PR.PS-06 integrates secure development practices into the software lifecycle, protecting code from tampering and ensuring releases have minimal vulnerabilities. This includes monitoring performance to maintain security in production and securely disposing of software when obsolete. It ensures organization-developed software meets high security stan…
  continue reading
 
PR.PS-05 prevents the installation and execution of unauthorized software by restricting platforms to approved applications and verifying software integrity before use. This includes using approved DNS services to block malicious domains and limiting execution to permitted products where risk warrants. It reduces the risk of malware or unvetted sof…
  continue reading
 
PR.PS-04 requires configuring systems, applications, and services to generate log records that support continuous monitoring, ensuring visibility into activities and events. This includes securely sharing logs with centralized infrastructure for analysis, tailored to needs like zero trust architectures. It provides the data needed to detect and res…
  continue reading
 
PR.PS-03 ensures hardware is maintained, replaced, or securely removed based on its security capabilities and risk profile, such as replacing devices unable to support modern software protections. This includes planning for end-of-life support and disposing of hardware responsibly to prevent data leakage. It keeps the physical infrastructure secure…
  continue reading
 
PR.PS-02 focuses on maintaining, replacing, or removing software based on risk, including timely patching, updating container images, and phasing out end-of-life versions. This ensures software remains supported and secure, reducing vulnerabilities from outdated or unauthorized applications. It includes plans for obsolescence to manage lifecycle ri…
  continue reading
 
PR.PS-01 establishes and applies configuration management practices to maintain secure baselines for hardware, software, and services, adhering to the principle of least functionality. This involves testing and deploying hardened configurations while reviewing defaults for potential risks during installations or upgrades. It ensures platforms are s…
  continue reading
 
PR.DS-11 ensures that data backups are regularly created, securely stored, and tested to maintain availability and integrity for recovery purposes. This includes near-real-time backups for critical data, offline storage to protect against incidents, and annual testing to verify restorability. It supports resilience by enabling rapid restoration aft…
  continue reading
 
PR.DS-10 protects data-in-use—actively processed in memory or applications—by removing it when no longer needed and isolating it from other users or processes on the same platform. This prevents unauthorized access or leakage during active operations, a critical concern for sensitive computations. It ensures data remains secure while being manipula…
  continue reading
 
PR.DS-02 secures data-in-transit—moving across networks or communications—using encryption and integrity checks like digital signatures to prevent interception or alteration. This includes blocking or encrypting sensitive outbound emails and restricting access to personal communication tools on organizational systems. It ensures data remains protec…
  continue reading
 
PR.DS-01 focuses on securing data-at-rest—stored in files, databases, or devices—using encryption, digital signatures, and physical controls to protect confidentiality, integrity, and availability. This includes full disk encryption for endpoints and restricting removable media to prevent unauthorized access or exfiltration. It safeguards data when…
  continue reading
 
Loading …

Hurtigreferanseguide

Copyright 2025 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett
Lytt til dette showet mens du utforsker
Spill