Request Demo

In Review: NIST Cybersecurity Risk Management Conference

down-arrow

From November 7th-9th, NIST hosted their annual Cybersecurity Risk Management conference in Baltimore. At the conference, NIST assembled some of the greatest minds in cybersecurity spanning multiple industries and company sizes to discuss the current risk landscape and how the NIST frameworks (CSF, RMF, etc.) can help mitigate and manage those risks.

The CyberSaint team saw three main subjects tackled by the keynotes and breakout discussions: how organizations of all sizes are adopting the NIST CSF and the challenges that arise, the increase in risks associated with the supply chain, and working to define and standardize the security protocol around medical devices and internet of things (IoT) technologies.

Adoption of the NIST CSF and RMF

Why checkbox compliance fails organizations

Michael Darling, Director of Information Security at Venable LLP spoke directly to the issues with check-the-box compliance: “I can do all the controls in 800-53 and say ‘yeah I’ve got that’, but I don’t know which ones [controls] are the most important”. The importance of prioritization, especially relative to the desired outcomes, is critical to the success of an efficient and effective compliance program

As is the case with a checkbox approach to security and compliance, many CISO’s and their organizations are approaching the issue in a binary fashion: either we have it or we don’t. However, as we’ve discussed on the CyberSaint blog, organizations focused on compliance are not recognizing the unique risks and threats to their own organization on a continual basis. Darling said compliance frameworks needed to add in “measurement” and “prioritization” to facilitate an outcomes-based approach (two elements the CyberStrong platform inherently enables security teams to do for this reason).

As security becomes a board-level issue, an outcomes-based approach is increasingly necessary. CISO’s must be able to connect their security programs to business outcomes as a means to facilitating stable and secure growth of the enterprise. Donald Heckman, Principal Director and CIO at US Dept of Defense said, “there’s compliance, but then there’s continuous remediation” and that all organizations need to think through a risk-based lens to continuously improve as opposed to ‘check the box’. “It’s not a one and done, it’s a continuous process.”

Adoption roadblocks: scalability

For many enterprise-level organizations, adopting the NIST CSF whole-hog would mean a complete overhaul to the existing security strategy and program. Of course, this is not possible for a Fortune 50, or even Fortune 500, company. That doesn’t mean that the NIST CSF can’t add value to these organizations. In fact, it’s these large organizations that can glean the most value from the gold-standard framework. William Westwater, Program Manager for Information Security Governance, at Boeing said, on scaling the NIST CSF for large enterprise, "You're gonna have to buy your scalability- outsource (humans) and consultants."

With security becoming a top-of-mind problem CEO’s are looking to solve, CISO’s need to be able to provide actionable steps to further mitigate risks to their organization. The NIST CSF can provide those steps, but CISO’s must be able to prioritize the steps necessary to provide a concrete plan of action to supplement an existing cyber program with the Framework.

Adoption roadblocks: risk quantification

Going hand-in-hand with the scalability problems that many enterprises face when looking to adopt the NIST CSF, risk quantification and a data-based approach of where to start is a problem organizations of all sizes face. This is an area that Gartner sees as an area that will define AI backed integrated risk management (IRM) solutions. The CyberStrong platform already offers AI backed risk quantification and prioritizes remediation steps based on impact.

Vendor (supply chain) risk

As enterprises become a digital ecosystem or internal stakeholders and third-party vendors, the risk of those vendors grows exponentially. With 75% organizations seeing their vendor list grow by 20% this year, supply chain risk management is a top priority for CISO’s. The overall theme that emerged as a means to mitigate this risk was a strong cybersecurity strategy that was based on risk, not checkbox compliance. In the opening keynote, Leo Simonovich, Siemens Vice President and Global Head of Industrial and Digital Cyber, said "security has to be more than a seatbelt or an airbag in the digital world." This is especially true in managing supply chain risk. As organizations continue to outsource more and more, reactionary thinking is no longer an option.

Securing medical devices and the internet of things (IoT)

The balance between user experience and security

During its development, security in the internet of things was largely an afterthought. However, as we’ve seen with recent attacks, this cannot stay that way. For organizations embracing IoT, it is a form of risk they are not familiar with: a smart light bulb is suddenly an endpoint that needs to be secured. Speaking on an IoT security panel, CyberSaint CEO George Wrenn discussed that user experience has been a great hindrance to IoT security.

As a cutting-edge technology that alters user behavior, product managers recognized that a hard to use product would slow adoption. Why outfit your house with smart light bulbs if you had to create secure passwords for each light bulb? You’d simply buy ‘dumb’ lightbulbs and forget the hassle. However, as Wrenn said, the dichotomy of a secure product and one that’s easy to use has created the problem that security professionals face today: not only are black-hat actors able to harness the power of these insecure IoT products, manufacturers are only now implementing security standards into their products. Calling it the “right to patching”, Wrenn spoke about a consumer and businesses right to have these security holes repaired, even in legacy devices.

Where are the standards?

NIST CRM 5

During the IoT panel, the panelists were asked what they saw in the future of IoT security standards and certifications. IoT security threats pose the greatest risk to enterprise organizations as they have the greatest reliance on this technology. On the other hand, it is difficult to identify specific threats to the consumer side of IoT. CyberSaint CEO Wrenn spoke to this in saying “We’re starting to see more of a call for regulations in industrial IoT and enterprise IoT but it’s going to be a while until the consumer market gets to that level of certification and that kind of standard.”

Furthermore, Wrenn also spoke to when the industry will start to see IoT security certifications as one would with other security verticals: “My crystal ball tells me that the NIST [IoT] standard, when it becomes available, will very likely be the thing that the UL’s, the TUV’s of the world will take from and create an actual certification for this.” Basing his projection on the way organizations have adopted the NIST CSF, George sees the NIST IoT framework as the foundation for many organizations’ (manufacturers and users) IoT security programs.

Conclusions

What we can expect to see in the coming year is the continued increase in security awareness in non-technical stakeholders. CISO’s must be prepared to increase the transparency within their organization and view their security program through a risk-based lens. Checkboxes won’t cut it anymore. 

We saw that the NIST CSF continues to be the gold-standard for organizations, no matter the size. The challenges that enterprises face can be reduced by augmenting team’s ability with the use of AI backed tools like the CyberStrong platform. Learn how by scheduling a demo here.

Lastly, we saw that IoT continues to be the wild-west for security standards and that end users (both enterprise and consumers) need to approach these technologies with caution and aware of the risks inherent to them. While we will start to see standards emerge, enterprises especially need to air on the side of caution and adopt them proactively. 

You may also like

The Key To Turning Your Security ...
on December 11, 2018

It is often said, “if you don’t want something noticed, don’t talk about it”. This is true of a bad GPA, a stain on a carpet, or a project you might have missed a deadline for. ...

Solving The Cybersecurity Skills ...
on December 6, 2018

It is no shock to those in the cyber community that cybersecurity has become a board-level issue for many enterprises. A PwC survey showed a 20% increase in CEO’s concern over ...

The Next Wave Of Innovation For ...
on December 5, 2018

   The internet of things (IoT) is a force transforming the modern enterprise. Anything from robotics in warehouses to smart manufacturing to data center monitoring, the ...

The Corporate Compliance and ...
on December 4, 2018

Corporate compliance and oversight (CCO) is one of the main pillars to a strong integrated risk management (IRM) program and solution. Today, compliance leaders are faced with a ...

Securing the AI powered enterprise
on December 5, 2018

Machine learning and artificial intelligence (AI) has become the competitive differentiator of our time. By 2020, Gartner predicts that almost all new products to enter the market ...

4 Compliance And Risk Reports ...
on November 28, 2018

By 2020, 100% of large enterprises will be asked to report to their board of directors on cybersecurity and technology risk at least annually, which is an increase from today's ...

Alison Furneaux