Implementing A Risk-Based Cyber Security Framework
The NIST CSF quick guide to clarity, readiness, buy-in and risk management for business security leaders
We respect your privacy, by submitting this form you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest. For further information on how we process and monitor your personal data click here.
In 2013, US President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cyber Security, which called for the development of a voluntary, risk-based cybersecurity framework (CSF) that is “prioritized, flexible, repeatable, performance-based, and cost-effective.” The CSF was developed through an international partnership of small and large organizations, including owners and operators of the nation’s critical infrastructure, with leadership by the National Institute of Standards and Technology (NIST). President Trump went one step further and issued EO 13800 in 2017, Strengthening the Cyber Security of Federal Networks and Critical Infrastructure, and made the framework created by Obama’s order part of federal government policy.
There are several books, guides, and consultants available on the topic of technical implementation of the NIST CSF. However, this report serves to educate and inform business leaders (private enterprise, government, and non-profits) about the need for a prioritized, flexible, repeatable, performance-based, and cost-effective framework for critical infrastructure cyber security.
Download the full report “Implementing A Risk-Based Cyber Security Framework” and you will learn:
- How to standardize the control framework to drive enterprise value.
- How to provide a common language and systematic methodology for managing cyber security risk.
- Why the NIST Cyber Security Framework is the go-to standard for security practices and development.
Plus, hear from key analysts and executives providing real-world commentary and examples on NIST CSF clarity, readiness and buy-in for business security leaders.