Request Demo

Thought Leadership

How Can My Cyber Program Benefit From a Standards-Based Approach?

down-arrow

The Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure is starting to motivate action from not only U.S. federal agencies, but also from U.S. businesses. Recent cyberattacks and breaches have resulted in heightened private sector awareness, which is driving businesses to reevaluate how they can reduce enterprise risk. As a former security executive of a multinational corporation, I have always been on the hunt for more resiliency and best practices, so I can relate.

The National Institute of Standards and Technology’s Cybersecurity Framework, formally titled The Framework for Improving Critical Infrastructure Cybersecurity, can overwhelm even experienced security professionals with its inherent complexity. Yet, increasingly, it is recognized as a national gold-standard. Its popularity and support is apparent: 30 percent of U.S. businesses have adopted the framework as of 2015, and that number is growing rapidly. According to Gartner, over 50 percent are projected to adopt by 2020. The NIST CSF builds upon existing frameworks, and was created by over 3,000 public and private security professionals.

The framework is a risk-based approach to managing cybersecurity. NIST further states that its purpose is to create a common language for cyber that unifies the conversation around enterprise risk and security. Some organizations are even requiring their vendors to adopt the framework as they scale. Likewise, financial and healthcare companies are also realizing the importance of securing their data following this set of best practices. Europe, too, clearly sees the value of the framework as they look to it while finalizing the NIST Directive.

When I left my position as a global CSO to start a company, I set out to accomplish one goal. I realized that the framework’s nature—by far the most comprehensive approach—necessitates that is also the most complex. Its five core functions: identify, protect, detect, response and recover, are a blueprint to mitigate cyber risk. Implemented properly, an organization will have the most powerful set of tools and procedures in place. In a sense, the Framework is a dynamic Deming cycle—continuous, logical and always learning.

 

After years of fighting to harden systems, I came to a pair of key conclusions. First, cyber must be managed proactively and not reactively. This leads to the second conclusion: companies have to be strategic when building their programs. As business leaders, there is a substantial responsibility to execute and keep our companies breaches. The pressure is real, and we see it regularly in hacks that damage revenue and reputation. A proactive information security professional will certainly stay informed and advocate for increased resilience via a standards-based approach. As noted above, the NIST Cybersecurity Framework is by far the most comprehensive framework, but it is also the most complex to navigate.

In another article on our CSO blog, our co-founder Scott goes into detail about how to simplify NIST Cybersecurity Framework adoption. More strategies to ease adoption will also be published here in the future. In the meantime, you can also access my free NIST Cybersecurity Framework on-demand webinar as a resource, which details a quick and powerful approach to begin implementing the framework.

Originally published in CSO Magazine.

You may also like

Booz Allen 2019 Cyber Threat Report
on February 7, 2019

@BoozAllen @BoozAllenCyber #cybertrends #cybersecurity #cyber Find out the 8 ways threat actors can make waves in 2019 in the annual Booz Allen Cyber Threat Outlook Report: ...

It’s Time to Embrace Password ...
on February 7, 2019

Why Your Enterprise Needs Password Security Strategies Unfortunately, trusting employees to create strong passwords on their own may no longer serve as a tenable strategy. ...

Nearly Half Billion US Personal ...
on February 7, 2019

There’s good news and bad news about identity theft in 2018 according to a new report from the Identity Theft Resource Center (ITRC). The good news is the number of US data ...

News Insights: Millions Of Bank ...
on January 28, 2019

According to Colin Bastable, CEO, Lucy Security: “When US lenders offload our mortgages and loans to third parties, they offload the data too, and wash their hands of all ...

CyberSaint Security Announces ...
on January 28, 2019

BOSTON--(BUSINESS WIRE)--CyberSaint Security, a cybersecurity software firm that powers automated, intelligent compliance and risk management, today announced record-breaking ...

A Cybersecurity Compliance Crystal ...
on January 28, 2019

What Recent News Means for the Future The compliance landscape is changing, necessitating changes from the compliance profession as well. A team of experts from CyberSaint discuss ...

George Wrenn