eWeek reached out to various cybersecurity experts to assess the impact of the May 11, 2017 EO on civilian and military agencies.
“This executive order is making the agencies executive heads accountable and responsible for cyber-security risk, quickly identifying and reporting back the current state of cybersecurity” noted Joseph Carson, Chief Security Scientist at Thycotic, a D.C. based provider of privileged account management (PAM) solutions.
“The cyber-security executive order specifically states that U.S. government agencies should use the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity. As part of the Executive Order, government agency heads need to provide a risk management report based on NIST cyber-security framework within 90 days of EO release.”
“The executive order has helped agencies prioritize their focus on securing areas such as critical infrastructure”, said John Chirhart, federal technical director at Tenable Network Security. Carson commented on the state of implementation today, ”What is lacking in this executive order is a clear cyber-security strategy and incident response. While it helps with the risk assessment, it is only part of what is needed to make a big difference."
CyberSaint’s provision of cyber compliance and mitigation strategies help to fill this gap. The combination of implementation and cyber management is at the foundation of every compliance roadmap.
According to Chirhard and a plethora of other security experts, the NIST CSF provides a flexible and cost-effective, prioritized, repeatable approach to cyber risk management. Nonetheless, Chirhard commented that there are ”obstacles for agencies to bring in the people and tools needed to effectively implement the framework”.
CyberSaint provides a toolkit of people and software to solve this problem for all agencies. The CyberStrong platform quickly establishes a baseline, and creates a detailed roadmap to NIST CSF compliance. Implementation issues that naturally come along with this mandate are quickly managed and agencies learn how to knowledgeably manage their cyber risk throughout the process.
Get more information: firstname.lastname@example.org
Read the source article from eWeek here.