Request Demo

NIST Cybersecurity Framework

Know Your Resources: Tackling NIST Cybersecurity Framework

down-arrow

The aim of the NIST CSF is provide a common language for cybersecurity so that in any organization, across all departments involved, there is clear communication leading to an efficient cyber program. Another advantage NIST intended is to create a thorough set of security best practices that almost any organization can implement. In a recent article published in CSO, the author goes into detail about acheiving long term cyber resilience with the NIST Cybersecurity Framework.

Common Problems When Tackling the Framework

Observing even mature companies trying to adopt this new gold standard with their teams, we have identifed a few problems that often come up, and that the author wrote about in her article as well.

Measuring your security practices is critical not only at a company wide level, but at the control level as well. Hackers and other cybercriminals are always changing their strategies, and you need to keep your practices up-to-date by monitoring and measuring your resilience. Aside from continuous monitoring and mature reporting practices, you should identify gaps in your processes and make improvements, which according to the author and CyberSaint's experience in the field, requires a to of talent and time to do alone. Oftentimes the person most qualified to carry out this endeavor also has a lot of other responsibilities, and if your company is not in the position to have a separate team around the project it can be a difficult ask. 

Learn How CyberStrong Streamlines the NIST Cybersecurity Framework Adoption

The Skillset Required

Relying on the workforce to catch up with the cyber trend isn't the best route if you don't already have the positions filled for this project. According to the CSO article, last year there were 112,000 InfoSec analyst job openings last year in the United States, but there were only 96,970 workers to fill their positions. Aside from the lack of skills in the workforce issue, hiring another position or two, or three, into your company to complete the task and going through the process of justifying that to upper management isn't as comfortable either, and the timeline from when the search begins to when you start the project is longer than you would think.

We often think of progressive security professionals a fast-learning, thorough and managerial CISO or the like, supplemented by IT specialists that understand the complexities and how to implement and adapt to new, better processes. However, implementing NIST sometimes requires a much greater volume of more advanced skills and people involved. 

The Perfect Match

Skills like those stated above, paired with CyberStrong, make for simple and swift implementation of the NIST Cybersecurity Framework. Continuously measure, report, and mitigate your cyber posture with your team even if they don't have the full knowledge base or lots of professional experience with the NIST CSF. Those advanced skills that are required to do it piecemeal aren't all that necessary with CyberStrong's intuitive interface and measurement system. In addition, baselining in only a few hours can provide your team with the basis to run optimizations through the platform that give low cost and high impact controls to cover on your roadmap to NIST adoption.

Read our article published in Infosecurity Magazine on 5 Steps to Implement the NIST Cybersecurity Framework

Take a look at the draft form of the major revision set to take place later this year on the NIST Cybersecurity Framework. You'll have he chance to add comments and input on the document as it stands.

You may also like

Reading Between the Lines of NIST ...
on July 9, 2019

On June 19th, the National Institute of Standards and Technology (NIST) released the much anticipated Rev 2 of SP 800-171 and the working draft of supplement SP 800-171B. As the ...

How We're Making DFARS Compliance ...
on July 2, 2019

With the Department of Defense (DoD) making DFARS compliance a requirement for all contractors doing business with the DoD, a great amount of stress has been put on DoD ...

What to Expect from the Security ...
on June 26, 2019

Digital Society is Real, and Security and Risk Management Solutions Must Embrace Digital to be Successful Digital Society: “The collection of people and things that are engaged in ...

Alison Furneaux
Integrating GRC: Compliance, ...
on June 25, 2019

In our Integrating Governance Risk and Compliance series, CyberSaint leadership explores the process through which cybersecurity leaders can reconfigure their organizations to ...

George Wrenn
Integrating GRC: Risk, ...
on June 19, 2019

In our Integrating Governance Risk and Compliance series, CyberSaint leadership explores the process through which cybersecurity leaders can reconfigure their organizations to ...

Padraic O'Reilly
CyberSaint at Gartner Security and ...
on June 13, 2019

Next week, forward-thinking security and risk leaders will congregate in National Harbor for Gartner’s annual Security and Risk Management Summit. As the preeminent voice in the ...