Request Demo

NIST Cybersecurity Framework

Building a Holistic Cybersecurity Program


Gartner analyst Earl Perkins, research vice president, presented five cybersecurity trends during the Gartner Security & Risk Management Summit in 2017. One of his key tawaways was that cyber programs need to try a more holistic approach to cyber program strategy.

Getting Hacked isnt an "If" Anymore but a "When". Stop Focusing on Protection and Prevention Alone.

“Take the money you’re spending on prevention and begin to drive it more equitably to detection and response,” said Mr. Perkins. “The truth is that you won’t be able to stop every threat and you need to get over it.” 

In the past year it's become clear that even the largest enterprises can be subject to breach. Therefore, this year if you're wondering where to focus your attention, spending time on making and testing your response plans, plans for remediation and methods of detection is key. Still focus on the latest methods of protection and prevention, but realize that you have to have all of your best practices in place for a holistic program.

A Holistic Approach: The NIST Cybersecurity Framework

The NIST Framework is the most thorough and holistic approach to cybersecurity program best practices. However, it's the most complex framework to implement covering over 900 controls over 5 major functions. The functions are important becaues they allow security teams to prioritize all areas of a holistic program equitably. Identify, Protect, Detect, Respond, and Recover are the five functions, and they cover all areas that you would want to address.

Gartner reports that the framework is used by 30? of U.S. organizations, with projected use of 50% by 2020. [Download the Free NIST Cybersecurity Framework Guide]

Use of the framework is usually attributed to three key motivations: aligning with cybersecurity best practices (70%); business partner requirements (29%); and federal contract requirements (28%) - according to Gartner.

It's clear that more and more organizations are aligning with the NIST Framework and are requiring their partners, vendors and suppliers to do so as well. If you're interested about learning more on the Framework and building a holistic approach, let us know and we can give you advice to get your started. The CyberStrong Platform can baseline you against the Framework in HOURS.


You may also like

The Cybersecurity Skills Gap: The ...
on February 7, 2019

The cybersecurity skills gap is nothing new to the seasoned cyber professional. It has been widely discussed in cyber and information security circles for some time. The main flag ...

George Wrenn
The Post-Digitization CISO
on February 5, 2019

Information leaders in digital businesses, whether focusing on optimization or a full transformation, are inherently altering their position among the executive leadership. As ...

Integrated Risk Management and ...
on January 31, 2019

With technology permeating every aspect of a business, one begins to wonder what technology is reserved for digital risk management rather than the other facets of integrated risk ...

Department of Defense Launches ...
on January 29, 2019

The Defense Federal Acquisition Regulation Supplement (DFARS) mandate, specifically Clause 252.204-7012 requiring all members of the Department of Defense’s supply chain to comply ...

Digital Risk Management Frameworks
on January 24, 2019

As organizations continue to embrace digitization, security teams are faced with the challenge of keeping the enterprise secure while empowering growth and innovation. Many CISO’s ...

The Cybersecurity Impact Of The ...
on January 23, 2019

There has been a great deal of speculation around the cybersecurity posture of the nation in light of the most recent (and longest documented) government shutdown. I’ve seen two ...

George Wrenn