SlideShare a Scribd company logo
January 2017 page 1
The NIST Cybersecurity Framework
Adopting the NIST Cybersecurity Framework can help any organization improve its
cyber readiness. Organizations that already have a security program based on
regulatory compliance requirements such as HIPAA and SOX or industry standards
such as PCI-DSS and ISO 27001 can use the framework to measure and
communicate the current effectiveness of implemented policies and processes
addressing cybersecurity risks. Organizations with no formal security program can
leverage the framework as a road map to identify business security needs and take
necessary steps to address cybersecurity risks to their data, operations, systems, and
employees.
Background
The framework is a result of a 2013 Presidential Executive Order titled
“Improving Critical Infrastructure Cybersecurity” which called for the
development of a voluntary risk-based cybersecurity framework based on
industry standards and best practices to help private sector organizations
manage cybersecurity risks. Faced with the growing tide of cyber attacks against
private businesses and organizations in industry sectors such as energy, financial
services, and healthcare, which are critical to our economy, national security,
and very way of life, this order was an attempt to help these organizations defend
against cybersecurity threats without creating additional regulatory burdens.
The resulting framework, released in 2014 after ten months of collaboration
between government and private sector security experts, creates a common
language to address and manage cybersecurity risk in a cost-effective manner
based on business needs.
Benefits of adopting the Framework
There are four key benefits an organization can realize by adopting the NIST
Cybersecurity Framework:
 Harmonize cybersecurity approaches and provide a common language for
discussing cybersecurity risks within and across organizations and industries.
 Establish the right level of security for an organization based on business
needs.
 Inform cybersecurity budget planning based in risk prioritization.
January 2017
page 2
 Communicate cybersecurity risk comprehensively to senior leadership.
Framework Components
The framework consists of three primary components: Core, Implementation Tiers,
and Profile.
The Core provides a set of activities, outcomes, and informative references providing
the detailed guidance for developing individual organizational risk management
profiles. It consists of five concurrent and continuous functions which provide a high
level, strategic view of the lifecycle of an organization’s management of
cybersecurity risk.
 Identify – Develop the organizational understanding to manage cybersecurity
risk to systems, assets, data, and capabilities.
 Protect – Develop and implement the appropriate safeguards to ensure delivery
of critical infrastructure services.
 Detect – Develop and implement the appropriate activities to identify the
occurrence of a cybersecurity event.
 Respond – Develop and implement the appropriate activities to take action
regarding a detected cybersecurity event.
 Recover – Develop and implement the appropriate activities to maintain plans
for resilience and to restore any capabilities or services that were impaired due to
a cybersecurity event.
January 2017
page 3
The Implementation Tiers provide context on how an organization views
cybersecurity risk and processes in place to manage that risk. Tiers describes the
degree to which an organization’s cybersecurity risk management practices exhibit
the characteristics defined in the framework.
 Tier 1 (Partial) – Risks are managed in an ad hoc manner with limited
awareness of risks.
 Tier 2 (Risk Informed) – Risk management processes and program are in
place but are not integrated enterprise-wide.
 Tier 3 (Repeatable) – Formal policies for risk management processes and
program are in place enterprise-wide.
 Tier 4 (Adaptive) – Risk management processes and programs are based on
lessons and predictive indicators derived from previous and current
cybersecurity activities.
The Profile component represents cybersecurity outcomes based on business needs
that an organization has selected from Core function categories. Profiles can be used
to identify gaps and opportunities for improving an organization’s cybersecurity risk
management posture by creating a “Current” Profile which represents the current
organization risk management posture based on implemented policies, processing,
and controls and a “Target” Profile which represents the desired posture based on
business needs. Gaps between the current and target profiles establish the baseline for
implementation of the framework and improving an organization’s cybersecurity
readiness.
January 2017
page 4
Bottom Line - And Next Steps
The first step to improving organizational cyber readiness is an initial “fitness”
assessment based on the framework. NIST has provided access to all framework
related information including a Reference Tool to help organizations looking to
implement the framework on their website.
Organizations that need help implementing the framework or want to learn more
about its benefits can visit the MCGlobalTech CyberRx Risk Intelligence Solution
which automates the framework and helps organizations determine their
cybersecurity risk exposure and the potential financial impact of a successful data
breach.
Source: https://www.nist.gov/cyberframework
January 2017
page 5
About William McBorrough
William J. McBorrough is an Information Assurance and Cyber Security leader
with an extensive background managing, designing, and implementing
medium and large enterprise physical and information technology security
solutions and programs. Mr. McBorrough is Co-Founder and Managing
Principal at MCGlobalTech, a Washington, DC-based Information Security
Management Consulting firm where he helps clients in the public and private
sectors build Risk-Focused Security Programs. Mr. McBorrough has served on
the faculty of various universities including University of Maryland University College, EC-Council
University, George Mason University and Northern Virginia Community College where he has
conducted research and taught graduate and undergraduate courses relating to cybersecurity,
cybercrime, cyberterrorism, and information security and assurance. He is a Certified Information
Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in
Risk Information System Control (CRISC), Certified Ethical Hacker (CEH) and HITRUST Certified
Common Security Framework Practitioner (CCSFP).

More Related Content

PDF
Security Framework for Digital Risk Managment
PDF
Cyber security reguations: The shape of things to come for captives?
PPTX
Cybersecurity Framework - Introduction
PPTX
Information security management (bel g. ragad)
PDF
Biznesa infrastruktūras un datu drošības juridiskie aspekti
PDF
NIST Cybersecurity Framework 101
PDF
Kmicro Cybersecurity Offerings 2020
PDF
Business case for information security program
Security Framework for Digital Risk Managment
Cyber security reguations: The shape of things to come for captives?
Cybersecurity Framework - Introduction
Information security management (bel g. ragad)
Biznesa infrastruktūras un datu drošības juridiskie aspekti
NIST Cybersecurity Framework 101
Kmicro Cybersecurity Offerings 2020
Business case for information security program

What's hot (17)

PDF
Cyber Security Risk Management
DOCX
Information Systems Security & Strategy
DOCX
So you want to be a CISO - 5 steps to Success
PDF
Simplifying Security for Cloud Adoption - Defining your game plan
PDF
Transforming Expectations for Treat-Intelligence Sharing
 
PPTX
ORX cyber and information security risk (CISR) initiative overview, July 2019
PDF
Information Security Management System: Emerging Issues and Prospect
PPTX
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
PDF
2010 Sc World Congress Nyc
PDF
Fdic ffiec cyber_security_assessments
PPTX
Information Security - Back to Basics - Own Your Vulnerabilities
PPTX
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
PPTX
Week 1&2 intro_ v2-upload
PDF
CCA study group
PPSX
Information Security Governance: Concepts, Security Management & Metrics
Cyber Security Risk Management
Information Systems Security & Strategy
So you want to be a CISO - 5 steps to Success
Simplifying Security for Cloud Adoption - Defining your game plan
Transforming Expectations for Treat-Intelligence Sharing
 
ORX cyber and information security risk (CISR) initiative overview, July 2019
Information Security Management System: Emerging Issues and Prospect
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
2010 Sc World Congress Nyc
Fdic ffiec cyber_security_assessments
Information Security - Back to Basics - Own Your Vulnerabilities
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Week 1&2 intro_ v2-upload
CCA study group
Information Security Governance: Concepts, Security Management & Metrics
Ad

Similar to Improving Cyber Readiness with the NIST Cybersecurity Framework (20)

DOCX
Project 7 - Organization Security PlanChoose an organization fro.docx
DOC
The security risk management guide
DOC
The security risk management guide
PDF
NIST to CSF to ISO or EC 27002 2022 with NIST
DOCX
Project 7 Organization Security PlanChoose an organization from.docx
PDF
CIS20 CSCs+mapping to NIST+ISO.pdf
DOCX
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
PDF
Ffiec cat may_2017
PDF
DHS Guidelines
PDF
Department of Homeland Security Guidance
PPTX
CYBER SECURITY
PPSX
Meraj Ahmad - Information security in a borderless world
PDF
ISACA Cybersecurity Audit course brochure
PDF
From checkboxes to frameworks
PDF
Integrating-Cyber-Security-for-Increased-Effectiveness
DOCX
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
DOCX
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
PDF
Security-Brochure
PDF
Security-Brochure
PDF
NCSC-Cyber-securitydhhdhhhfhfhfhfhfhfhfhfhf
Project 7 - Organization Security PlanChoose an organization fro.docx
The security risk management guide
The security risk management guide
NIST to CSF to ISO or EC 27002 2022 with NIST
Project 7 Organization Security PlanChoose an organization from.docx
CIS20 CSCs+mapping to NIST+ISO.pdf
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
Ffiec cat may_2017
DHS Guidelines
Department of Homeland Security Guidance
CYBER SECURITY
Meraj Ahmad - Information security in a borderless world
ISACA Cybersecurity Audit course brochure
From checkboxes to frameworks
Integrating-Cyber-Security-for-Increased-Effectiveness
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
Security-Brochure
Security-Brochure
NCSC-Cyber-securitydhhdhhhfhfhfhfhfhfhfhfhf
Ad

More from William McBorrough (20)

PPTX
MCGlobalTech CMMC Managed Compliance Service
PDF
MCGlobalTech Managed Security Compliance Program
PDF
MCGlobalTech Cyber Capability Statement
PPTX
Cybersecurity Career Information by Next Gen Cyber
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PDF
MCGlobalTech Commercial Cybersecurity Capability Statement
PPTX
MCGlobalTech Consulting Service Presentation
PPTX
MCGlobalTech Enterprise Risk Management Program
PDF
MCGlobalTech Cyber Capability Statement_Final
PDF
MCG_OnePageBrochure_Final
PPTX
MCGlobalTech Service Presentation
PDF
Information Security Continuous Monitoring within a Risk Management Framework
PDF
MCGlobalTech Capability Statement
PPTX
Managing Security Risks in Manufacturing
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PPT
Protecting Customer Confidential Information
PPTX
Need for Improved Critical Industrial Infrastructure Protection
PDF
Need for Improved Critical Industrial Infrastructure Protection
PDF
No National 'Stand Your Cyberground' Law Please
MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Cyber Capability Statement
Cybersecurity Career Information by Next Gen Cyber
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Consulting Service Presentation
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Cyber Capability Statement_Final
MCG_OnePageBrochure_Final
MCGlobalTech Service Presentation
Information Security Continuous Monitoring within a Risk Management Framework
MCGlobalTech Capability Statement
Managing Security Risks in Manufacturing
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Protecting Customer Confidential Information
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
No National 'Stand Your Cyberground' Law Please

Recently uploaded (20)

PPTX
sales presentation، Training Overview.pptx
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
The FMS General Management Prep-Book 2025.pdf
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Business model innovation report 2022.pdf
PPTX
DMT - Profile Brief About Business .pptx
PDF
Chapter 5_Foreign Exchange Market in .pdf
DOCX
Business Management - unit 1 and 2
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
sales presentation، Training Overview.pptx
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Unit 1 Cost Accounting - Cost sheet
Ôn tập tiếng anh trong kinh doanh nâng cao
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
The FMS General Management Prep-Book 2025.pdf
WRN_Investor_Presentation_August 2025.pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Nidhal Samdaie CV - International Business Consultant
Probability Distribution, binomial distribution, poisson distribution
Power and position in leadershipDOC-20250808-WA0011..pdf
Business model innovation report 2022.pdf
DMT - Profile Brief About Business .pptx
Chapter 5_Foreign Exchange Market in .pdf
Business Management - unit 1 and 2
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
DOC-20250806-WA0002._20250806_112011_0000.pdf

Improving Cyber Readiness with the NIST Cybersecurity Framework

  • 1. January 2017 page 1 The NIST Cybersecurity Framework Adopting the NIST Cybersecurity Framework can help any organization improve its cyber readiness. Organizations that already have a security program based on regulatory compliance requirements such as HIPAA and SOX or industry standards such as PCI-DSS and ISO 27001 can use the framework to measure and communicate the current effectiveness of implemented policies and processes addressing cybersecurity risks. Organizations with no formal security program can leverage the framework as a road map to identify business security needs and take necessary steps to address cybersecurity risks to their data, operations, systems, and employees. Background The framework is a result of a 2013 Presidential Executive Order titled “Improving Critical Infrastructure Cybersecurity” which called for the development of a voluntary risk-based cybersecurity framework based on industry standards and best practices to help private sector organizations manage cybersecurity risks. Faced with the growing tide of cyber attacks against private businesses and organizations in industry sectors such as energy, financial services, and healthcare, which are critical to our economy, national security, and very way of life, this order was an attempt to help these organizations defend against cybersecurity threats without creating additional regulatory burdens. The resulting framework, released in 2014 after ten months of collaboration between government and private sector security experts, creates a common language to address and manage cybersecurity risk in a cost-effective manner based on business needs. Benefits of adopting the Framework There are four key benefits an organization can realize by adopting the NIST Cybersecurity Framework:  Harmonize cybersecurity approaches and provide a common language for discussing cybersecurity risks within and across organizations and industries.  Establish the right level of security for an organization based on business needs.  Inform cybersecurity budget planning based in risk prioritization.
  • 2. January 2017 page 2  Communicate cybersecurity risk comprehensively to senior leadership. Framework Components The framework consists of three primary components: Core, Implementation Tiers, and Profile. The Core provides a set of activities, outcomes, and informative references providing the detailed guidance for developing individual organizational risk management profiles. It consists of five concurrent and continuous functions which provide a high level, strategic view of the lifecycle of an organization’s management of cybersecurity risk.  Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.  Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services.  Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.  Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.  Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
  • 3. January 2017 page 3 The Implementation Tiers provide context on how an organization views cybersecurity risk and processes in place to manage that risk. Tiers describes the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the framework.  Tier 1 (Partial) – Risks are managed in an ad hoc manner with limited awareness of risks.  Tier 2 (Risk Informed) – Risk management processes and program are in place but are not integrated enterprise-wide.  Tier 3 (Repeatable) – Formal policies for risk management processes and program are in place enterprise-wide.  Tier 4 (Adaptive) – Risk management processes and programs are based on lessons and predictive indicators derived from previous and current cybersecurity activities. The Profile component represents cybersecurity outcomes based on business needs that an organization has selected from Core function categories. Profiles can be used to identify gaps and opportunities for improving an organization’s cybersecurity risk management posture by creating a “Current” Profile which represents the current organization risk management posture based on implemented policies, processing, and controls and a “Target” Profile which represents the desired posture based on business needs. Gaps between the current and target profiles establish the baseline for implementation of the framework and improving an organization’s cybersecurity readiness.
  • 4. January 2017 page 4 Bottom Line - And Next Steps The first step to improving organizational cyber readiness is an initial “fitness” assessment based on the framework. NIST has provided access to all framework related information including a Reference Tool to help organizations looking to implement the framework on their website. Organizations that need help implementing the framework or want to learn more about its benefits can visit the MCGlobalTech CyberRx Risk Intelligence Solution which automates the framework and helps organizations determine their cybersecurity risk exposure and the potential financial impact of a successful data breach. Source: https://www.nist.gov/cyberframework
  • 5. January 2017 page 5 About William McBorrough William J. McBorrough is an Information Assurance and Cyber Security leader with an extensive background managing, designing, and implementing medium and large enterprise physical and information technology security solutions and programs. Mr. McBorrough is Co-Founder and Managing Principal at MCGlobalTech, a Washington, DC-based Information Security Management Consulting firm where he helps clients in the public and private sectors build Risk-Focused Security Programs. Mr. McBorrough has served on the faculty of various universities including University of Maryland University College, EC-Council University, George Mason University and Northern Virginia Community College where he has conducted research and taught graduate and undergraduate courses relating to cybersecurity, cybercrime, cyberterrorism, and information security and assurance. He is a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified in Risk Information System Control (CRISC), Certified Ethical Hacker (CEH) and HITRUST Certified Common Security Framework Practitioner (CCSFP).