: CyberSaint Security : NIST Cybersecurity Framework Platform - DFARS/800-171
CyberSaint Security. Accelerate DFARS / NIST SP 800-171, FedRAMP & NIST Cybersecurity Framework (CSF) adoption and monitoring to achieve cyber resilience.
Meet regulations and comply to standards. Empower your organization to proactively reduce cyber risk
CyberStrong™ Security Compliance, Orchestration,
Analytics and Reporting Platform
Our Core Products and Services
|CyberStrong for DFARS &
NIST SP 800-171
|CyberStrong Platform NIST
|Rapid Scorecard Service
NIST Cyber Framework
| Defense Contractors - Comply by December 31, 2017
Establish a baseline and quickly implement your path to cyber compliance.
|Measure cybersecurity as a business function.
Improve visibility, communication, and take control. Cybersecurity management for your organization.
| We scorecard your risk posture based on the NIST Cybersecurity Framework
Measure cyber posture and be able to report to management.
|Learn More||Learn More||Learn More|
Interested in Adopting the NIST Cybersecurity Framework? Measure, Mitigate, & Manage a Proactive Cyber Program.
Looming Compliance Deadline? Get Up and Running on DFARS & NIST SP 800-171 in HOURS, Not Weeks.
On-Demand Webinar: How to Simplify the NIST Cybersecurity Framework
"We don't sell scores, we improve them..."
- George Wrenn, CISSP, ISSEP, CEH
measure, monitor, mitigate & continuously improve cybersecurity resilience
It’s now an Executive Order.
The NIST Cybersecurity Framework is now a federal mandate for agencies
C-level executives are responsible and accountable for cybersecurity
Defense contractors must comply with DFARS & NIST SP 800-171 by December 31, 2017
Your business depends on it
Proactive CyberStrong™ resilience.
CyberStrong™ - Manage Cybersecurity as a Business Function.
Here are some of the biggest predictions in cybersecurity for 2018 from Forbes online
On December 5, 2017, the National Institute of Standards and Technology (“NIST”) announced the publication of a second draft of a proposed update to the Framework for Improving Critical Infrastructure Cybersecurity (“Cybersecurity Framework”), Version 1.1, Draft 2.
Just last week, Uber disclosed that hackers accessed the personal information of 57 million riders and drivers in October 2016, a breach it didn’t disclose publicly until November 21, 2017. This lack of Due Care and ethical process is making waves in the media as this incident adds a potential legal burden for the company.
Despite repeated major, high-profile breaches, most cybersecurity teams still struggle to get sufficient funding. “After this hack, cybersecurity budgets are bound to increase.” We’ve all thought it. But, curiously, it may not always happen. It’s a constant battle between profitable business investments and “unprofitable” security investments to protect the current bottom-line.
Cyberattacks of late are allowing us to imagine, for better or for worse, that major cyber incidents like these, but typically at a smaller scale, are more possible than ever. The growing threat of advanced cyberattacks on critical infrastructure and industrial control systems indicates a serious challenge for organizations.
As IoT and all technologies grow, and are increasingly being incorporated into industry businesses and products, it’s important to consider issues surrounding cyber threat readiness in areas beyond just traditional critical infrastructure. The telecommunications and communications sector in particular holds great implications when it comes to cybersecurity strength and how companies in that sector can improve as technology advances.
The White House Office of Management and Budget issued a memorandum laying out the procedures and requirements federal agencies should follow in reporting a cyber incident. The memo uses the NIST Cybersecurity Framework guidelines to direct the project, and uses past requirements under the Federal Information Security Modernization Act (FISMA) as well.
C-suites and boards of directors have tried, but so many have failed to meet the high standard of a robust cybersecurity program. Breaches are becoming more common, affecting many households and exposing consumer and business data. The private sector has to admit that it’s not less expensive to wait out a breach. Instead, companies must start investing in proper security controls throughout their organization at a larger scale.
The Conference of State Bank Supervisors published resources for bank executives back in 2014, that are widely accepted best practices and recommendations to be applied today. The CSBS gave examples of topics and questions that C-Level and other executives should be asking as they see cyberattacks and data breaches happening within their industry, and outside as well.
In May, Equifax, through their own negligence, suffered a major data breach that affected 140 million people with credit data and histories in their network. A few months ago, Rick Smith, CEO, was asked to resign from the company and take his $90M severance with him. How do we measure Due Care? How can we make sure that companies use Due Care to lower cyber risk?