Why you should adopt the NIST Cybersecurity Framework



Similar documents
Why you should adopt the NIST Cybersecurity Framework

CONCEPTS IN CYBER SECURITY

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

The NIST Cybersecurity Framework

Understanding the NIST Cybersecurity Framework September 30, 2014

How To Understand And Manage Cybersecurity Risk

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

ENTERPRISE RISK MANAGEMENT FRAMEWORK

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

NIST Cybersecurity Framework & A Tale of Two Criticalities

Nadya Bartol, CISSP, CGEIT VP, Industry Affairs and Cybersecurity Strategist UTC (Utilities Telecom Council) USA Utilities Telecom Council 1

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

istockphoto/ljupco 36 June 2015 practicallaw.com 2015 Thomson Reuters. All rights reserved.

PROTIVITI FLASH REPORT

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cybersecurity Framework: Current Status and Next Steps

ISACA North Dallas Chapter

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

How To Write A Cybersecurity Framework

Cybersecurity..Is your PE Firm Ready? October 30, 2014

Framework for Improving Critical Infrastructure Cybersecurity

Which cybersecurity standard is most relevant for a water utility?

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

FFIEC Cybersecurity Assessment Tool

Framework for Improving Critical Infrastructure Cybersecurity

The Office of Infrastructure Protection

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

Critical Infrastructure Security and Resilience

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Enterprise Security Tactical Plan

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

Cyber and Data Risk What Keeps You Up at Night?

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team. National Cybersecurity and Communications Integration Center

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Managing cyber risks with insurance

Framework for Improving Critical Infrastructure Cybersecurity

fs viewpoint

NIST Cybersecurity Framework What It Means for Energy Companies

INFORMATION SECURITY STRATEGIC PLAN

Keeping the Lights On

Cybercrime and Regulatory Priorities for Cybersecurity

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

Cyberprivacy and Cybersecurity for Health Data

Risk Management in Practice A Guide for the Electric Sector

Critical Manufacturing Cybersecurity Framework Implementation Guidance

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Health Industry Implementation of the NIST Cybersecurity Framework

Improving Critical Infrastructure Cybersecurity Executive Order Preliminary Cybersecurity Framework

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Framework for Improving Critical Infrastructure Cybersecurity

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH

UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION

CForum: A Community Driven Solution to Cybersecurity Challenges

Business Continuity / Disaster Recovery Context

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

FINRA Publishes its 2015 Report on Cybersecurity Practices

America s New Cybersecurity Framework: Help or New Source of Exposure?

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

NERC CIP Compliance with Security Professional Services

Cybersecurity The role of Internal Audit

Navigating the NIST Cybersecurity Framework

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

What are you trying to secure against Cyber Attack?

Applying Framework to Mobile & BYOD

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

NIPP Partnering for Critical Infrastructure Security and Resilience

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Preemptive security solutions for healthcare

Partnership for Cyber Resilience

Cybersecurity: What CFO s Need to Know

Applying IBM Security solutions to the NIST Cybersecurity Framework

NH-ISAC. Cybersecurity Resilience Securing the Infrastructures that Secure Healthcare & Public Health. The National Health ISAC

The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005

Continuous Network Monitoring

Happy First Anniversary NIST Cybersecurity Framework:

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

The Dow Chemical Company. statement for the record. David E. Kepler. before

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

How To Transform It Risk Management

the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group

Transcription:

Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive leaders and board members understand.

The NIST framework is a risk based framework based on leading cybersecurity standards It is valuable for ALL Businesses.

Critical infrastructure US Presidential Policy Directive 21 defines critical infrastructure as the following 16 sectors: Chemicals Commercial facilities Communications Critical manufacturing Dams Defense industrial base Emergency services Energy Financial services Food & agriculture Government facilities Healthcare & public health Information technology Nuclear reactors, materials, & waste Transportation systems Water & wastewater systems Source: Department of Homeland Security, Critical Infrastructure Sector While the NIST Cybersecurity Framework targets organizations that own or operate critical infrastructure, adoption may prove advantageous for businesses across virtually all industries 1. The Framework does not introduce new standards or concepts; rather, it leverages and integrates industry-leading cybersecurity practices that have been developed by organizations like NIST and the International Standardization Organization (ISO). The Framework is the result of a February 2013 Executive Order titled Improving Critical Infrastructure Cybersecurity and 10 months of collaborative discussions with more than 3,000 security professionals. 2 It comprises a risk-based compilation of guidelines that can help organizations identify, implement, and improve cybersecurity practices, and creates a common language for internal and external communication of cybersecurity issues. The Framework is a reiterative process designed to evolve in sync with changes in cybersecurity threats, processes, and technologies. It will be revised periodically to incorporate lessons learned and industry feedback. In effect, the Framework envisions effective cybersecurity as a dynamic, continuous loop of response to both threats and solutions. The Framework provides an assessment mechanism that enables organizations to determine their current cybersecurity capabilities, set individual goals for a target state, and establish a plan for improving and maintaining cybersecurity programs. It comprises three primary components: Profile, Implementation Tiers, and Core. 1 National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, February 12, 2014 2 Federal Register, Executive Order 13636 Improving Critical Infrastructure Cybersecurity, February 19, 2013

The Profile component enables organizations to align and improve cybersecurity practices based on their individual business needs, tolerance for risk, and available resources. To do so, organizations create a Current Profile by measuring their existing programs against the recommended practices in the Framework Core. These practices include processes, procedures, and technologies such as asset management, alignment with business strategy, risk assessment, access control, employee training, data security, event logging and analysis, and incident response plans. To identify a Target Profile, organizations employ the same Core criteria to determine the outcomes necessary to improve their cybersecurity posture. Unique requirements by industry, customers, and business partners can be factored into the Target Profile. Once completed, a comparison of the Current and Target Profiles will identify the gaps that should be closed to enhance cybersecurity and provide the basis for a prioritized roadmap to help achieve these improvements. Implementation Tiers help create a context that enables organizations to understand how their current cybersecurity risk-management capabilities stack up against the characteristics described by the Framework. Tiers range from Partial (Tier 1) to Adaptive (Tier 4) (Figure 1.). NIST recommends that organizations seeking to achieve an effective, defensible cybersecurity program progress totier 3 or Tier 4. Figure 1: Tiers of cybersecurity maturity Tier 1 Partial Risk management is ad hoc, with limited awareness of risks and no collaboration with others Tier 2 Risk Informed Risk-management processes and program are in place but are not integrated enterprise-wide; collaboration is understood but organization lacks formal capabilities Tier 3 Repeatable Formal policies for risk-management processes and programs are in place enterprise-wide, with partial external collaboration Tier 4 Adaptive Risk-management processes and programs are based on lessons learned and embedded in culture, with proactive collaboration

The Framework Core defines standardized cybersecurity activities, desired outcomes, and applicable references, and is organized by five continuous functions: Identify, Protect, Detect, Respond, and Recover. (Figure 2.) The Framework Core, in effect, describes the continuous cycle of business processes that constitute effective cybersecurity. Figure 2: Five core functions of effective cybersecurity Functions Definition Categories IDENTIFY An understanding of how to manage cybersecurity risks to systems, assets, data, and capabilities PROTECT DETECT RESPOND RECOVER The controls and safeguards necessary to protect or deter cybersecurity threats Continuous monitoring to provide proactive and realtime alerts of cybersecurityrelated events Incident-response activities Business continuity plans to maintain resilience and recover capabilities after a cyber-breach Asset management, business environment, governance, risk assessment, risk management strategy Access control, awareness and training, data security, data protection processes, maintenance, protective technologies Anomalies and events, continuous monitoring, detection processes Response planning, communications, analysis, mitigation, improvements Recovery planning, improvements, communications

For most organizations, whether they are owners, operators, or suppliers for critical infrastructure, the NIST Cybersecurity Framework may be well worth adopting solely for its stated goal of improving risk-based security. But it also can deliver ancillary benefits that include effective collaboration and communication of security posture with executives and industry organizations, as well as potential future improvements in legal exposure and even assistance with regulatory compliance. U.S. Securities and Exchange Commission SEC) s Office of Compliance Inspections and Examinations (OCIE) cybersecurity examinations of registered entities include questions outlined in the NIST Cybersecurity Framework. It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management. With good reason: Executive leaders and board members typically are well-versed in risk management, and framing cybersecurity in this context will enable security leaders to more effectively articulate the importance and goals of cybersecurity. The Framework has already been suggested as a potential baseline for best practices by companies, including in assessing legal or regulatory exposure to these issues or for insurance purposes. At a minimum, boards should work with management to assess their corporate policies to ensure how they match-up to the Framework s guidelines and whether more may be needed. If SEC or other proposed federal regulation of cybersecurity becomes a reality, implementing the Framework could be a mandatory exercise. By choosing to act now, organizations have the benefit of more flexibility in how they implement the Framework. Call OutSecure (203)81608061 and schedule a free initial assessment to determine how your business can benefit from adopting the NIST cybersecurity framework.