2 hours 35 minutes
All right. Welcome to less than 3.4. We're gonna be talking about some public sector regulations related to cybersecurity and vulnerability management.
So in this video, we're gonna talk about, um, you know the previous lesson we talked about private sector. We want to talk about some of the public sector requirements you might face and vulnerability management. Some of the things you might see relevant miss guidance to assistant vulnerability management and, again, some takeaways for executive leadership. You know, some guidance to check out or
baby tasking your team to check some of these resource is out.
So public sector requirements, you know, it really depends what kind of agency you are, what you're doing. But you know there's us, sir. There's nous. There's DHS. So there might be some organist organizations in some documentation out there relevant again. It depends on what your organization is, but there's a lot of really great vulnerability management guides out there
either from NIST or, you know, sister puts out some great material.
If you're interested, They they've been ah, there are newer organization, but they're putting out a lot of great content to try to help with vulnerability. management.
So it looks like a lot. But there's a lot of greatness guidance out there, especially for the public sector. You know, things to be aware of password guidelines. I'm really interested in the 802 of 70 trust architecture. I think that's, uh, you know, is your trust has been around for a while, but I think it's great. Mist has got their own guidance on it.
Security Privacy controls again 853 The are five is still in draft,
but it's a great document to check out,
UH, the 81 the interagency report, a 1 79 criticality analysis process model prioritizing systems and components. I think that's a really important guide, especially if you're trying to figure out what assets do I have. And what's most important that guide can really help on. Then you get the bottom here. We've got the 801 44
security and privacy in Public Cloud Computing,
U. S organizations are moving more to the cloud. It's good to understand security and privacy implications in the cloud on how vulnerability management kind of plays into that.
All right, so some of the take aways like, what's the important things that executive leadership we should be looking at? Um, we need to have a very technical vulnerability management lead. I think it is more difficult and smaller organizations, but having someone who's technical, understand security and really understand vulnerabilities and what they mean
to help keep up with changing guidance, you know, they could be the ones that are tasked with Hey,
tell me what What regulations Tell me what guidance we have out now that we need to be following to make sure that we're in compliance. Um, so you can stay up to date
and think holistically. It was this something that I think you know kind of goes through each module, each lesson thinking about our whole environment. Vulnerability Management is not just
patch management. It's not just one thing. It's not just code reviews. Um, requirements are vast. There's a lot of things we need to think about. And so having someone who really specializes in vulnerability management could help you to create a more secure environment.
Ah, and then vulnerability remediation efforts. I mentioned again in a previous lesson, but it's so important
when you're talking about remediation efforts and if you feel like it's, you know, it's too much of a burden, and we just we have too many vulnerabilities. It's too much of a mess. We can't deal with it. Um, maybe turn it into a project like you would a tech refresh or like a integrating a new product into the environment.
You know, take, take some resource is and say, You know what? I need you guys to really help and focus
on these remediation efforts for the next month. Six weeks. Whatever it is, let's focus and really, really hammer this down as much as we can.
So in this summer, we talked about some of the public sector requirements related to cybersecurity, vulnerability management. There's a lot of great information out there. Uh, so having vulnerability management, SME can really help point you in the right direction and make sure that you're looking at the right stuff. Uh, this guidance
missed guidance, which creates, um,
help you create, helps you to create ah, holistic approach to vulnerability, identification and remediation. Sonesta guidance can really give you that whole picture from identification to remediation and continuous monitoring on. Then what executive leadership should be aware of for any public sector requirements and regulations that might affect them.
So here my references on and I will see you in the next lesson.
Offensive Penetration Testing
As a pentester, you need to understand the methods of real-life attackers and use the ...
22 CEU/CPE Hours Available
Certificate of Completion Offered
Certified Information Security Manager (CISM)
A CISM certification shows you have an all-around technical competence and an understanding of the ...
13 CEU/CPE Hours Available
Certificate of Completion Offered