Request Demo

NIST Cybersecurity Framework

Know Your Resources: Tackling NIST Cybersecurity Framework


The aim of the NIST CSF is provide a common language for cybersecurity so that in any organization, across all departments involved, there is clear communication leading to an efficient cyber program. Another advantage NIST intended is to create a thorough set of security best practices that almost any organization can implement. In a recent article published in CSO, the author goes into detail about acheiving long term cyber resilience with the NIST Cybersecurity Framework.

Common Problems When Tackling the Framework

Observing even mature companies trying to adopt this new gold standard with their teams, we have identifed a few problems that often come up, and that the author wrote about in her article as well.

Measuring your security practices is critical not only at a company wide level, but at the control level as well. Hackers and other cybercriminals are always changing their strategies, and you need to keep your practices up-to-date by monitoring and measuring your resilience. Aside from continuous monitoring and mature reporting practices, you should identify gaps in your processes and make improvements, which according to the author and CyberSaint's experience in the field, requires a to of talent and time to do alone. Oftentimes the person most qualified to carry out this endeavor also has a lot of other responsibilities, and if your company is not in the position to have a separate team around the project it can be a difficult ask. 

Learn How CyberStrong Streamlines the NIST Cybersecurity Framework Adoption

The Skillset Required

Relying on the workforce to catch up with the cyber trend isn't the best route if you don't already have the positions filled for this project. According to the CSO article, last year there were 112,000 InfoSec analyst job openings last year in the United States, but there were only 96,970 workers to fill their positions. Aside from the lack of skills in the workforce issue, hiring another position or two, or three, into your company to complete the task and going through the process of justifying that to upper management isn't as comfortable either, and the timeline from when the search begins to when you start the project is longer than you would think.

We often think of progressive security professionals a fast-learning, thorough and managerial CISO or the like, supplemented by IT specialists that understand the complexities and how to implement and adapt to new, better processes. However, implementing NIST sometimes requires a much greater volume of more advanced skills and people involved. 

The Perfect Match

Skills like those stated above, paired with CyberStrong, make for simple and swift implementation of the NIST Cybersecurity Framework. Continuously measure, report, and mitigate your cyber posture with your team even if they don't have the full knowledge base or lots of professional experience with the NIST CSF. Those advanced skills that are required to do it piecemeal aren't all that necessary with CyberStrong's intuitive interface and measurement system. In addition, baselining in only a few hours can provide your team with the basis to run optimizations through the platform that give low cost and high impact controls to cover on your roadmap to NIST adoption.

Read our article published in Infosecurity Magazine on 5 Steps to Implement the NIST Cybersecurity Framework

Take a look at the draft form of the major revision set to take place later this year on the NIST Cybersecurity Framework. You'll have he chance to add comments and input on the document as it stands.

You may also like

The Cybersecurity Skills Gap: The ...
on February 7, 2019

The cybersecurity skills gap is nothing new to the seasoned cyber professional. It has been widely discussed in cyber and information security circles for some time. The main flag ...

George Wrenn
The Post-Digitization CISO
on February 5, 2019

Information leaders in digital businesses, whether focusing on optimization or a full transformation, are inherently altering their position among the executive leadership. As ...

Integrated Risk Management and ...
on January 31, 2019

With technology permeating every aspect of a business, one begins to wonder what technology is reserved for digital risk management rather than the other facets of integrated risk ...

Department of Defense Launches ...
on January 29, 2019

The Defense Federal Acquisition Regulation Supplement (DFARS) mandate, specifically Clause 252.204-7012 requiring all members of the Department of Defense’s supply chain to comply ...

Digital Risk Management Frameworks
on January 24, 2019

As organizations continue to embrace digitization, security teams are faced with the challenge of keeping the enterprise secure while empowering growth and innovation. Many CISO’s ...

The Cybersecurity Impact Of The ...
on January 23, 2019

There has been a great deal of speculation around the cybersecurity posture of the nation in light of the most recent (and longest documented) government shutdown. I’ve seen two ...

George Wrenn