Request Demo

NIST Cybersecurity Framework

Former Global CSO, CyberSaint Founder: The Benefits of a Standards-Based Approach

down-arrow

Originally published in CSO Online by CyberSaint CEO & Founder George Wrenn.

The Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure is starting to motivate action from not only U.S. federal agencies, but also from U.S. businesses. Recent cyberattacks and breaches have resulted in heightened private sector awareness, which is driving businesses to reevaluate how they can reduce enterprise risk. As a former security executive of a multinational corporation, I have always been on the hunt for more resiliency and best practices, so I can relate.

The National Institute of Standards and Technology’s Cybersecurity Framework, formally titled The Framework for Improving Critical Infrastructure Cybersecurity, can overwhelm even experienced security professionals with its inherent complexity. Yet, increasingly, it is recognized as a national gold-standard. Its popularity and support is apparent: 30 percent of U.S. businesses have adopted the framework as of 2015, and that number is growing rapidly. According to Gartner, over 50 percent are projected to adopt by 2020. The NIST CSF builds upon existing frameworks, and was created by over 3,000 public and private security professionals.

[Webinar with Cybersecurity Influencers: The Benefits of Frameworks and Standards HERE]

The framework is a risk-based approach to managing cybersecurity. NIST further states that its purpose is to create a common language for cyber that unifies the conversation around enterprise risk and security. Some organizations are even requiring their vendors to adopt the framework as they scale. Likewise, financial and healthcare companies are also realizing the importance of securing their data following this set of best practices. Europe, too, clearly sees the value of the framework as they look to it while finalizing the NIST Directive.

Running a Better Security Assessment Every Time is Critical to Proving Compliance. Learn How to Streamline Your Next Assessment with our Comprehensive Guide to Streamline Any Assessment.

When I left my position as a global CSO to start a company, I set out to accomplish one goal. I realized that the framework’s nature—by far the most comprehensive approach—necessitates that is also the most complex. Its five core functions: identify, protect, detect, response and recover, are a blueprint to mitigate cyber risk. Implemented properly, an organization will have the most powerful set of tools and procedures in place. In a sense, the Framework is a dynamic Deming cycle—continuous, logical and always learning.

After years of fighting to harden systems, I came to a pair of key conclusions. First, cyber must be managed proactively and not reactively. This leads to the second conclusion: companies have to be strategic when building their programs. As business leaders, there is a substantial responsibility to execute and keep our companies breaches. The pressure is real, and we see it regularly in hacks that damage revenue and reputation. A proactive information security professional will certainly stay informed and advocate for increased resilience via a standards-based approach. As noted above, the NIST Cybersecurity Framework is by far the most comprehensive framework, but it is also the most complex to navigate.

In another article on our CSO blog, our co-founder Scott goes into detail about how to simplify NIST Cybersecurity Framework adoption. More strategies to ease adoption will also be published here in the future. In the meantime, you can also access my free NIST Cybersecurity Framework on-demand webinar as a resource, which details a quick and powerful approach to begin implementing the framework.

You may also like

The Key To Turning Your Security ...
on December 11, 2018

It is often said, “if you don’t want something noticed, don’t talk about it”. This is true of a bad GPA, a stain on a carpet, or a project you might have missed a deadline for. ...

Solving The Cybersecurity Skills ...
on December 6, 2018

It is no shock to those in the cyber community that cybersecurity has become a board-level issue for many enterprises. A PwC survey showed a 20% increase in CEO’s concern over ...

The Next Wave Of Innovation For ...
on December 12, 2018

   The internet of things (IoT) is a force transforming the modern enterprise. Anything from robotics in warehouses to smart manufacturing to data center monitoring, the ...

The Corporate Compliance and ...
on December 4, 2018

Corporate compliance and oversight (CCO) is one of the main pillars to a strong integrated risk management (IRM) program and solution. Today, compliance leaders are faced with a ...

Securing the AI powered enterprise
on December 5, 2018

Machine learning and artificial intelligence (AI) has become the competitive differentiator of our time. By 2020, Gartner predicts that almost all new products to enter the market ...

4 Compliance And Risk Reports ...
on December 12, 2018

  In his predictions for 2019 Deloitte CEO of risk and financial advisory, Chuck Saia, harped on the necessity for compliance and risk professionals to involve business leaders -  ...

Alison Furneaux