How to implement the US Cybersecurity Framework

The technology that supports and protects an organization’s information is increasingly advanced and connected. It is also increasingly under attack. Earlier this year, the National Institute of Standards and Technology released the US Cybersecurity Framework (CSF) to help critical infrastructure providers. Now, new guidance from ISACA, an association of 115,000 global technology and business professionals, helps organizations of all sizes and in all industries use the CSF.

The CSF, released in February 2014, included ISACA’s COBIT framework as a core reference. ISACA’s Implementing the NIST Cybersecurity Framework shows how organizations can implement the CSF guidance using ISACA processes. The publication maps to each of the CSF steps and activities, extending the CSF guidance with practical, measurable activities.


“Most organizations know they need to ramp up their security efforts, but they need a road map that helps them protect their business assets,” said Greg Witte, an author of the publication and senior security engineer for G2 Inc. “This guidance provides a proven approach and manageable processes that will help them achieve measurable improvement.”


Implementing the NIST Cybersecurity Framework answers the following questions:
1. What are the core components of the CSF?
2. How do COBIT principles align with the CSF?
3. Should our organization align to the CSF?
4. How do I create a profile for my organization?
5. Where can I find sector-specific implementation information?
6. Where can I find templates to help me implement the CSF?
A supplementary tool kit provides those templates.


“Cybersecurity is a top priority for ISACA, and it is our mission to help enterprises improve their security efforts and develop their security workforces,” said Robert E Stroud, CGEIT, CRISC, international president of ISACA. “As part of our Cybersecurity Nexus, we’ve issued this implementation guidance to help organizations take practical steps to improving their cybersecurity and protecting their information and infrastructure.”
 

Veeam appoints Nick McAlister as UKI Channel Director to strengthen its channel strategy across...
Pure Storage, now Everpure, expands into cloud data management with the acquisition of 1touch,...
BMC has partnered with AWS to enhance intelligent automation, emphasising data orchestration at a...
Check Point has unveiled an AI-focused security strategy, supported by three acquisitions.
Arrow Electronics teams up with Oaka Studio to offer strengthened support for Microsoft channel...
Phoenix has been recognised as a VMware Pinnacle Partner, reflecting its ongoing collaboration and...
Emerge research finds that AI investments are now under stricter timelines, compelling leaders to...
Red Hat collaborates with the UK MOD to provide centralised cloud-native platforms aimed at...