Category: NIST
-
Cybersecurity: Functions (Part 5)
Detect. If you are following Cybersecurity news and trends you are likely recognizing that breaches are becoming numbingly commonplace. As the SEC increases requirements on companies and states scrutinizing businesses’ practices of collecting, retaining, and protecting data the stakes are getting higher. The burden of having intelligible and actionable alerts and network visibility is growing…
-
Cybersecurity: Functions (Part 4)
Protect. This function, protection, is perhaps the most common function associated with cybersecurity. When speaking about the CIA triad, the day-to-day functions, and the purposes of cybersecurity, the first function most people think about is the protection of identities, data, and assets. As we’ve seen in the previous posts about cybersecurity functions, there are many…
-
Cybersecurity: Functions (Part 3)
Under NIST, to know the organization, its risk profile, threats, vulnerabilities, priorities, requirements, and capabilities, we use the function Identify.
-
Cybersecurity: Functions (Part 2)
In this post, we’ll take a high-level pass at Cybersecurity’s Govern responsibility. Merriam-Webster dictionary includes many definitions for the word govern. In the context of Cybersecurity, the definitions are “to control, direct, or strongly influence the actions and conduct of” and “to exert a determining or guiding influence in or over.” Remembering that Cybersecurity’s key…