Request Demo

NIST Cybersecurity Framework

Cybersecurity Awareness Month: Strengthen Your Cyber Posture


For years now, October has been recognized as National Cybersecurity Awareness Month. The National Cyber Security Alliance and the U.S. Department of Homeland Security brought cybersecurity into the spotlight when they created this initiative in 2003, and in light of recent events, there is no better time than now to be cyber aware.

[ Interested in learning how to strategically deploy the NIST Cybersecurity Framework? Sign up for our "Don't Fear The NIST CSF" Webinar to learn from industry experts]

The month of October is split into themes by week. The first week is centered around simple steps for online safety. The second week promotes education in the workplace about cyber threats and how to promote best practices to mitigate risks. Recognizing and combatting cybercrime is the theme of the third week, as identifying cybercrime can be difficult for those who aren’t schooled or have experience in the area. Week four focuses on the rapidly accelerating technology that is being increasingly integrated into our daily lives. Everyone is connected, and we can only look into the future to plan ahead and mitigate cyber risk for the future. Week five, the last week, is about building resilience, especially when it comes to our critical systems and infrastructure. 

To understand and truly take part in building resiliency this month, it’s important that stakeholders, especially those in risk and security, understand and implement strategies to mitigate cyber risk. This means whether you are implementing the NIST Cybersecurity Framework or not, it’s important to understand this nationally recognized set of best practices.

The Framework has five key focus areas: Identify, Protect, Detect, Respond, and Recover.

Identify: Run an assessment to identify your business or organization’s baseline status on information security. In this phase, you should be identifying the risks that your business has, and to do this properly it’s important that you understand where you stand to date. Look at what assets are accessed and by who, and in what location. When you understand where you stand, you’ll be able to identify potential problem areas much more efficiently.

Protect: This next step focuses on making safe the assets that you identified earlier by securing your organization in weak areas. This includes your network internally and externally, multi factor authentication (MFA) or two factor authentication (2FA), educating your teams in every department - not just cyber or IT - of the red flags of a cyberattack, a phishing email, how to handle sensitive information in the workplace and more.

Detect: How quickly can your organization detect a cyber incident? This question is the focus of the third phase. Some cyber attacks exist within organizations for weeks or even months without detection - don’t compromise your company’s data and reputation by letting that happen to you. Building off of the previous steps, understand your risks, threats and methods of protection. Then, put your resources (tools, people) in place to detect threats.

Respond: The Respond phase focuses on your organization’s ability to respond to incidents. Secure your response plan. To nail this phase at the very least you should have an incident response plan with protocols on how to communicate along and within what timeline. You should then test your plan as thoroughly as possible to optimize the process.

Recover: Make sure that you’re able to recover your services and capabilities after an attack as quickly as possible to reduce the negative impact on your organization. Try to make your recovery approach adaptable process as the type of breach or attack can change. Make sure that your employees have the knowledge to recover your most valuable assets and processes.

Make sure your entire organization is involved in this process. It can be a lot of work to implement the NIST Cybersecurity Framework, more so if you aren’t using a platform that automates and streamlines your adoption process like CyberStrong does.


Learn How CyberStrong Streamlines the NIST Cybersecurity Framework Adoption



You may also like

Why GRC Needs IRM
on February 15, 2019

Today, every organization strives to optimize the speed with which they access information. Data is being stored, processed, transmitted and utilized in almost every day-to-day ...

Alison Furneaux
Government Shutdown Cybersecurity ...
on February 12, 2019

In January, CyberSaint CEO George Wrenn penned his thoughts on the impact of the government shutdown. In his post, George foresaw the outcome of the shutdown not being a future ...

The Cybersecurity Skills Gap: The ...
on February 7, 2019

The cybersecurity skills gap is nothing new to the seasoned cyber professional. It has been widely discussed in cyber and information security circles for some time. The main flag ...

George Wrenn
The Post-Digitization CISO
on February 5, 2019

Information leaders in digital businesses, whether focusing on optimization or a full transformation, are inherently altering their position among the executive leadership. As ...

Integrated Risk Management and ...
on January 31, 2019

With technology permeating every aspect of a business, one begins to wonder what technology is reserved for digital risk management rather than the other facets of integrated risk ...

Department of Defense Launches ...
on January 29, 2019

The Defense Federal Acquisition Regulation Supplement (DFARS) mandate, specifically Clause 252.204-7012 requiring all members of the Department of Defense’s supply chain to comply ...