Duration:
1 Day
Audience:
Employees of federal, state and local governments; and businesses working with the government.
Course Description:
It includes:
- ISCM Overview
- ISCM Background
- Organization Perspective
- Ongoing System Authorizations
- Automation
- ISCM Roles and Responsibilities
- ISCM Process – NIST SP 800-137
- Step 1 – Define Strategy
- Step 2 – Establish ISCM program
- Step 3 – Implement
- Step 4 – Analyze and Report
- Step 5 – Respond to Findings
- Step 6 – Review and Update
- DHS Support of FISMA & ISCM
- Establish ISCM Program
- Implement ISCM Program
- Analyze Data / Report Findings
- Respond to Findings
- Review and Update Monitoring Program and Strategy
- Implementation of ISCM
- ISCM Technologies
- Security Automation Domains
- Security Information and Event Management (SIEM)
- Continuous Monitoring and Risk Scoring (CMRS)
- ISCM Challenges & Pitfalls
The course content of Information Security Continuous Monitoring (ISCM) is geared to meet the needs of a diverse audience covering the spectrum of management, operational and technical roles.
Students will gain thorough knowledge of the theory and policy background underlying continuous monitoring as well as the practical knowledge needed for effective implementation.
Course Prerequisites
A prerequisite to this course is a strong understanding of RMF, and it is highly recommended students complete the 4-day RMF training program prior to registration.
What if I Have Questions After Training?
Train Plus is our RMF training partner’s post class Q&A session designed for students that have attended a class. Whether your training experience has been online, onsite or at an IT Dojo facility, our partners deliver this follow up session to answer questions that may arise post class.
It’s easy. Just dial in for a scheduled webinar and spend time with our RMF Subject Matter Expert to hear your questions answered along with other students’ questions. After all, education doesn’t stop just because the class is over.
Who Should Attend?
The Continuous Monitoring training program is suitable for government employees and contractors in DoD, federal “civil” agencies and the intelligence community, particularly those responsible for managing and monitoring security posture on an ongoing basis.
About the Instructors
The instructors tasked to complete this training have previously developed training programs for DoD Information Assurance Certification and Accreditation Process (DIACAP) and the Federal Information Security Management Act (FISMA). These have now been completely revamped to reflect the unification of information security and risk management practices in accordance with the Risk Management Framework (RMF). To date, thousands of military personnel, civilian government employees and contractor personnel have completed one or more these training programs.
If you are looking for other dates or would like to bring an instructor into your facility or city, please contact us!