Free Cyber Risk Analysis: Your Top Cyber Risks in 3 Clicks

Get Started
Request Demo

In September 2018, connecting to the official website of the National Institute of Standards and Technology (NIST) would show it had announced its plan to develop a framework to manage privacy risks using the same process as their incredibly successful cybersecurity framework (NIST CSF) for managing data and cybersecurity risk.

Since the preliminary draft of the NIST Privacy Framework was released, NIST has hosted multiple workshops and webinars soliciting comments on the preliminary draft from both the private and public sectors in the same fashion as the NIST Cybersecurity Framework. During this development phase, we’ve kept an ear to the ground for what to expect.

Why A Separate Framework 

For most, even members of the security industry, privacy and security are seen as the same thing. It makes sense: secure organizations identify and store data, and that information stays in the hands of the organization that the end-user gave it to - close, but not quite. Bob Seigel gives the perfect simile for the interaction between security and privacy:

Just as the drapes on a window may be considered a security safeguard that also protects privacy, an information security program provides the controls to protect personal information. Security controls can limit access to personal information and protect against unauthorized use and acquisition of it. It is impossible to implement a successful privacy program without the support of a security program.

Just as the bars on a window help prevent intruders from entering your home while allowing people to look inside, a security program can implement controls without regard for privacy. For example, a security program could require credentials to access a network without restricting access to personal information. You would have security but no privacy, as anyone with valid credentials can see all of the personal information your organization possesses.

With the rise of data processing and attention economies, businesses now rely heavily on sharing sensitive information about their customers and prospects to deliver the tailored products or services that consumers have come to expect. However, whether that data is encrypted and transmitted securely and with the customer’s knowledge can be unknown, Utilizing the Nist Privacy Framework can help incentivize your cyber security program towards protecting those individuals. At the NIST Cyber Risk Management Conference, Naomi Lefkovitz, a privacy engineering program head at NIST, described their approach - “We look at it as a Venn diagram.”

As Bob said, a cybersecurity program can be secure without respect to users’ privacy but not typically vice versa. Here we can see the case for a standalone framework start to take shape. The protection activities employed to secure data can be done without regard for user privacy, but privacy often cannot exist without some level of data protection and security.

“A foundation, not a prescription.” 

As with the CSF, the new privacy framework is intended to be a voluntary tool. NIST’s approach to publishing voluntary frameworks has empowered adopters to integrate these best practices into their programs in the most efficient way, rather than a pre-canned compliance approach, law, or regulation.

One of the interesting aspects of the CSF was the omittance of granular controls as part of the framework. We anticipate that the privacy framework will be similar in the sense that organizations manage privacy risks arising today in a way that is largely nebulous in the definition of terms and subjective in the degree to which organizations approach privacy. From what we have seen and heard, the privacy framework will bear semblance to its security counterpart in the sense that it will be outcomes-based rather than focused on pigeon-holing organizations into the definition of terms. Furthermore, given the approach that NIST is taking with the development of the framework, getting bogged down in the definition of terms would drastically slow the development.

Better Together 

Taking Lefkovitz’s Venn diagram image further, think of security like a square and privacy like a rectangle: a square is a rectangle, but a rectangle isn’t always a square, meaning that a security program can exist without regard for privacy, but a privacy program cannot exist without regard for security. From what we have seen to date, the NIST Privacy Framework will deliver the most value when coupled with the CSF and the NIST Risk Management Framework (RMF). We can already see how the CSF and RMF interact in platforms like CyberStrong that benchmark against the CSF and integrate RMF risk assessments into control assessments using artificial intelligence. This combinatory approach to these frameworks exponentially improves the value that they bring to those who adopt them.

To learn more about the NIST Privacy, Risk Management Framework, and Cybersecurity Framework, watch CyberSaint’s Co-Founder and CPO, Padraic O’Reilly, dive deep into this trio of gold-standard NIST frameworks. If you have any questions about how CyberStrong presents regulation in common language, NIST, the California Consumer Privacy Act (CCPA), General Data Protection Regulation (GDPR), ISO, or any other data protection frameworks or regulations, give us a call at 1 800 NIST CSF or click, here, to learn more.

You may also like

April Product Update
on April 18, 2024

The CyberSaint team is dedicated to providing new features to CyberStrong and advancing the CyberStrong cyber risk management platform to address all your cybersecurity needs. ...

Bridging the Gap: Mastering ...
on April 22, 2024

In today's digital landscape, cybersecurity has become essential to corporate governance. With the increasing frequency and sophistication of cyber threats, the SEC has set forth ...

March Product Update
on March 21, 2024

The CyberSaint team is dedicated to advancing the CyberStrong platform to meet your cyber risk management needs. These latest updates will empower you to benchmark your ...

Empowering Cyber Risk Modeling ...
on March 20, 2024

The practice of cyber risk management is cyclical. You start by assessing your cyber risk environment. That step includes identifying risks and classifying them in buckets. Then, ...

Leveraging the Executive Dashboard ...
on March 27, 2024

In the fast-paced business world, CISOs and C-suite executives constantly juggle multiple responsibilities, from budgeting to strategic planning. However, in today's digital ...

NIST CSF 2.0 Updates in CyberStrong
on April 4, 2024

The National Institute of Standards and Technology’s Cybersecurity Framework (CSF) is known in cybersecurity as the gold standard framework for cybersecurity and risk guidance; it ...