<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

NIST Cybersecurity Framework

Telecommunications Industry Association Responds to the NIST Cybersecurity Framework

down-arrow

As IoT and all technologies evolve, and are increasingly being incorporated into industry businesses and products, it’s important to consider issues surrounding cyber threat readiness in areas involving and beyond traditional critical infrastructure. For the telecommunications and communications sector in particular, these events hold great implications when it comes to cybersecurity strength and how companies in that sector can improve as technology advances.

The Telecommunications Industry Association sent NIST a response to their Cybersecurity Framework, in order to give feedback on usability and an overview of what they believed was their industry’s reaction to the Framework.

“The TIA is a trade association representing hundreds of global manufacturers and vendors of information and communications technology equipment and services that are supplied to critical infrastructure owners and operators, enabling secure and resilient network operations across segments of the economy. We offer the specific input below based on TIA efforts to raise awareness of the Framework and our members’ experience using it.” the document stated.

It has been two years since the Framework was published, and it still serves as an important tool to aid this industry in approaching cyber risk management even up until its second draft, which NIST said will be released soon


Interested in the NIST Framework for your business? Learn more by reading our Free NIST Cybersecurity Framework Guide.


As communications technologies are being incorporated in other industries and beyond that of traditional critical infrastructure, government organizations and the public are starting to identify weak areas around cyber threat readiness in these sectors. Groups such as the TIA “and its members have identified the Framework as a great model for consideration of how to begin developing a flexible, voluntary, viable mechanism for cybersecurity readiness and resilience”.

TIA members and the larger ICT industry have recognized the value of the Framework’s approach, and according to their response, are taking steps to promote, implement, and use the Framework as best practice in their security programs. Many companies have begun to apply the Framework’s methodology to their individual business models.

The NIST Framework was built as a flexible approach that evolves with and encourages tech innovation and individualized security practices for any organization. As a risk based approach, companies protect their systems by assessing relevant threats, and also by both developing and implementing appropriate risk-management practices. A broad, one-size-fits-all security plan could produce vulnerabilities by simply forcing companies to spend time and resources protecting data or systems that present limited risk to them specifically, and sometimes no risk at all. Meeting standards that don’t address companies’ individual security environments is a recipe for missed steps and can cause these organizations to overlook their own needs, instead of spending resources efficiently and effectively.

The NIST Cybersecurity Framework exemplifies this approach. It recognizes the diversity of companies within the U.S. economy, and the need for a flexible, evolving Framework that allows companies of any size to tailor it to their specific business needs, resources, and risk in all areas. Government Congress, industry associations as mentioned above, and others have recognized the Framework as an appropriate means to approach running a proactive cyber program. Although technically voluntary, more U.S. companies as mentioned earlier are adopting the Framework, and are requiring it for their supply chains and vendors as well. 

Interested in adopting the NIST Cybersecurity Framework? CyberStrong allows you to adopt the Framework in just hours - measuring how you stand on all 5 of the NIST functions: Identify, Protect, Detect, Respond, and Recover and allowing for improvement through intelligent, AI-driven recommendations. Contact us for more information or schedule a consultation with one of our experts for more information, or to simply help you assess your options or needs.

Learn How CyberStrong Streamlines the NIST Cybersecurity Framework Adoption

You may also like

NIST vs. ISO –What You Need To Know
on June 24, 2022

Organizations are increasingly on the lookout for ways to strengthen their cybersecurity capabilities. Many have found solace in compliance frameworks that help guide and improve ...

Top 5 Recommendations For Your ...
on June 22, 2022

Discover, design, validate, promote, and sustain best practice cyber protection solutions to safeguard your people and processes. As the cyber attack surface expands, the Center ...

June Product Update
on June 21, 2022

It’s a celebration! 🎵♪🎵♪ ♩Automate your scores, come on (Let’s automate) Automate your scores, come on (Let’s automate) There’s a party goin’ on right here An automation to last ...

Why You Need CIS Controls for ...
on June 17, 2022

The Center for Internet Security (CIS) is a non-profit organization that helps public sectors and private sectors improve their cybersecurity. The organization aims to help small, ...

Small Business Cybersecurity ...
on June 15, 2022

To achieve peace of mind in the modern threat landscape, small business owners must have a solid security strategy and budget in place. VIPRE’s SMB Security Trends report state ...

Do Small Businesses and Startups ...
on June 10, 2022

Did you know that about 60% of small businesses shut down within 6 months by falling victim to a data breach or cyber-attack, where the average global breach cost hovers at $3.62 ...