From the course: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Get back to normal
From the course: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Get back to normal
- [Instructor] The final function we're going to touch on is recover. Similar to rebuilding after a tornado or recovering after a surgery, we need to restore our systems after a cyber incident. Just because we've stopped the harm by responding to the issue doesn't mean we're done. This is where recovery comes in and why the last function in the cybersecurity framework is the recover function. It's easy to group response and recovery activities together, but they were individually called out in this framework to highlight the importance of not just stopping the bleeding, but getting healthy and back to normal again. Once we remove that malicious actors' access to our systems and we address the vulnerability that allowed them to get in, we need to look at the damage that was done. Did they take systems down? Did they publish sensitive information on the open internet? What about changing banking or payroll data? When we think about recovering from a cybersecurity incident, we need to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.