CyberSaint Security
Security.Measured
iStock-537331500-mod.jpg

CyberSaint Security: Industry NIST/DFARS/Cybersecurity News

Expert leading thought on cybersecurity. 

Three Takeaways for Your Business from President Trump’s Executive Order on Cybersecurity

Great post on Lexology on how the framework is useful for small to midsized organizations.

Three Takeaways for Your Business from President Trump’s Executive Order on Cybersecurity

Here are three takeaways for your business from the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure signed on May 11, 2017.

1. Incorporate the NIST Cybersecurity Framework into your business.

The Executive Order requires federal agencies to use the well-established NIST Cybersecurity Frameworkto fulfill their mission to protect federal networks and critical infrastructure and to appropriately plan for and procure cybersecurity training, products, and services for the future.

As background, the Framework was first published in Feb. 2014. It uses business drivers (e.g., achieving business results, increasing cost effectiveness, reducing enterprise risk) to guide cybersecurity activities and it considers cybersecurity risk as part of an organization’s overall risk management process.

It also explains cybersecurity in simple terms that business people without IT backgrounds can easily comprehend in order to facilitate discussions about core principles in cybersecurity, the concrete steps an organization can take to move from where you are in terms of cybersecurity to where you want to be, and how to make a boardroom business case for procuring cybersecurity training, products, and services.

Because it is a framework, it is easily scalable from small and medium sized companies to large organizations and government agencies. Even before the Executive Order was issued, it was estimated that 50% of all U.S. organizations would be using the Framework by 2020.

The Framework will help your business identify the gaps in your cybersecurity and help you determine where to spend your finite resources to best bolster your cybersecurity defenses. For example, it will help you make a business case that instead of spending a half-million dollars on reports about the latest malware out of eastern Europe (at an executive’s suggestion), a tenth of that amount would be better spent on employee training to prevent HR from accidentally releasing employee W-2 information to criminals or to prevent employees from clicking on word attachments in emails that introduce malware into your system.

Read the source article in Lexology.