SlideShare a Scribd company logo
Uses and Benefits of the
Cybersecurity Framework
July 2018
cyberframework@nist.gov
Uses of the Cybersecurity Framework
The Framework is designed to complement existing business and
cybersecurity operations, and can be used to:
• Understand security status
• Establish / Improve a cybersecurity program
• Communicate cybersecurity requirements with stakeholders
• Identify opportunities for new or revised standards
• Assists in prioritizing improvement activities
• Enables investment decisions to address gaps
3
Who should use the Framework?
The Cybersecurity Framework is for organizations of all…
• Size
• Sector
• Maturity
It’s not just for critical infrastructure!
4
Common Patterns of Use
The Cybersecurity Framework has helped organizations:
• Integrate the functions into your leadership vocabulary and
management tool sets.
• Determine optimal risk management using Implementation Tiers.
• Reflect on business environment, governance, and risk
management strategies.
• Develop Profiles and Roadmaps to prioritize improvement activities
Supporting Risk Management with Framework
6
7
Why Use the Cybersecurity Framework?
It’s a framework, not a prescriptive standard
• Common Language
• Adaptable
• Collaboration Opportunities
• Ability to Demonstrate Due Care
• Easily Maintain Compliance
• Secure Supply Chain
• Cost Efficiency
Compliance Secure
For guidance on implementing the
Framework see the Resources
page:
www.nist.gov/cyberframework/fram
ework-resources-0
Framework Success Stories
highlight real world
implementation:
cyberframework@nist.gov
Resources
Where to Learn More and Stay Current
8

More Related Content

PDF
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
PDF
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
PDF
What is Project Management Framework.pdf
PDF
2023-it-roadmap-for-cybersecurity-techcnical
PPTX
Its time to rethink everything a governance risk compliance primer
PPTX
Marketing Automation Center of Excellence (CoE): Governance Structure for Con...
PDF
Huron Consulting — 2018 Salesforce Roadmap
PPTX
Role of the virtual ciso
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
What is Project Management Framework.pdf
2023-it-roadmap-for-cybersecurity-techcnical
Its time to rethink everything a governance risk compliance primer
Marketing Automation Center of Excellence (CoE): Governance Structure for Con...
Huron Consulting — 2018 Salesforce Roadmap
Role of the virtual ciso

Similar to uses_and_benefits_of_framework based on NIST (20)

PPTX
Chapter 1 Security Framework
PPTX
Welingkar First Year Project- ProjectWeLike
PDF
Security Maturity Model. Even Cybersecurity Needs to Grow Up [EN].pdf
PPTX
An intro to building an architecture repository meta model and modeling frame...
PPTX
GRC– The Way Forward
PDF
What Are the Best Practices for IT Infrastructure Operations.pdf
PDF
Gain business insight with Continuous Controls Monitoring
PPTX
ITIL4 - DIGITAL TRUST FRAMEWORK
PPTX
framework_update_report-yer20170301.pptx
PDF
Running a Software Security Program with Open Source Tools
PPTX
Cybersecurity Risk Management Program and Your Organization
PPTX
How is Your AppSec Program Doing Compared to Others
PPT
IT Services Development
PDF
standards1.pdf
PPTX
Aws dev ops saif ahmed
PPTX
SAFe v4.6 full
PPTX
FRAMEWORKS AND STANDARDS-GRC,GDPR,SOX,PCI DSS,SOX,ISO
PDF
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
PDF
CISSP Domain 08 Software Development Security.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Chapter 1 Security Framework
Welingkar First Year Project- ProjectWeLike
Security Maturity Model. Even Cybersecurity Needs to Grow Up [EN].pdf
An intro to building an architecture repository meta model and modeling frame...
GRC– The Way Forward
What Are the Best Practices for IT Infrastructure Operations.pdf
Gain business insight with Continuous Controls Monitoring
ITIL4 - DIGITAL TRUST FRAMEWORK
framework_update_report-yer20170301.pptx
Running a Software Security Program with Open Source Tools
Cybersecurity Risk Management Program and Your Organization
How is Your AppSec Program Doing Compared to Others
IT Services Development
standards1.pdf
Aws dev ops saif ahmed
SAFe v4.6 full
FRAMEWORKS AND STANDARDS-GRC,GDPR,SOX,PCI DSS,SOX,ISO
OWASP San Antonio: Open Software Assurance Maturity Model (OpenSAMM)
CISSP Domain 08 Software Development Security.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Ad

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
A Presentation on Artificial Intelligence
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Modernizing your data center with Dell and AMD
PDF
cuic standard and advanced reporting.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
Understanding_Digital_Forensics_Presentation.pptx
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The AUB Centre for AI in Media Proposal.docx
A Presentation on Artificial Intelligence
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation_ Review paper, used for researhc scholars
Modernizing your data center with Dell and AMD
cuic standard and advanced reporting.pdf
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
Ad

uses_and_benefits_of_framework based on NIST

  • 1. Uses and Benefits of the Cybersecurity Framework July 2018 cyberframework@nist.gov
  • 2. Uses of the Cybersecurity Framework The Framework is designed to complement existing business and cybersecurity operations, and can be used to: • Understand security status • Establish / Improve a cybersecurity program • Communicate cybersecurity requirements with stakeholders • Identify opportunities for new or revised standards • Assists in prioritizing improvement activities • Enables investment decisions to address gaps 3
  • 3. Who should use the Framework? The Cybersecurity Framework is for organizations of all… • Size • Sector • Maturity It’s not just for critical infrastructure! 4
  • 4. Common Patterns of Use The Cybersecurity Framework has helped organizations: • Integrate the functions into your leadership vocabulary and management tool sets. • Determine optimal risk management using Implementation Tiers. • Reflect on business environment, governance, and risk management strategies. • Develop Profiles and Roadmaps to prioritize improvement activities
  • 5. Supporting Risk Management with Framework 6
  • 6. 7 Why Use the Cybersecurity Framework? It’s a framework, not a prescriptive standard • Common Language • Adaptable • Collaboration Opportunities • Ability to Demonstrate Due Care • Easily Maintain Compliance • Secure Supply Chain • Cost Efficiency Compliance Secure
  • 7. For guidance on implementing the Framework see the Resources page: www.nist.gov/cyberframework/fram ework-resources-0 Framework Success Stories highlight real world implementation: cyberframework@nist.gov Resources Where to Learn More and Stay Current 8

Editor's Notes

  • #3: The Framework is designed to complement existing business and cybersecurity operations, and can be used to: Understand current cybersecurity operations through the creation of a current state profile Establish or Improve a cybersecurity program regardless of maturity by reducing risk Communicate cybersecurity requirements with stakeholders – including suppliers and partners Identify opportunities for new or revised standards Assists in prioritizing improvement activities (gap assessment) Enables investment decisions to address gaps Additionally, the Framework can help: Identify tools and technologies to help organizations use the Framework Integrate privacy and civil liberties considerations into a cybersecurity program
  • #4: Can be used by organizations regardless of size or sector. Framework was designed with CI in mind, but is extremely versatile and can easily be used by non-CI organizations Still provides value to mature programs, or can be used by organizations seeking to create a cybersecurity program. The framework complements, and does not replace, an organization’s risk management process and cybersecurity program. It can be used to leverage current processes and to identify opportunities to strengthen and communicate its management of cybersecurity risk while aligning with industry practices. Additionally, the Framework incorporates international standards and can be voluntarily used in or outside the United States
  • #6: The Framework helps guide key decision points about risk management activities through the various levels of an organization from senior execs, to business and process level, to implementation and operations. The executive level communicates the mission priorities, available resources, and overall risk tolerance to the business/process level. The business/process level uses the information as inputs into the risk management process, and then collaborates with the implementation/operations level to communicate business needs and create a Profile. The implementation/operations level communicates the Profile implementation progress to the business/process level. The business/process level uses this information to perform an impact assessment. Business/process level management reports the outcomes of that impact assessment to the executive level to inform the organization’s overall risk management process and to the implementation/operations level for awareness of business impact.
  • #7: The Framework provides a common language and systematic methodology for managing cyber risk. The Framework can be tailored to meet each organization’s needs. It does not tell an organization how much cyber risk is tolerable, nor provide “the one and only” formula for cybersecurity. Framework Profiles and Roadmaps can be used as artifacts to easily demonstrate due care for cybersecurity. The Framework Informative References and community published standards mappings can help achieve compliance goals. Enables best practices to become standard practices for everyone via common lexicon to enable action across diverse stakeholders. Communicates cybersecurity requirements with stakeholders, including partners and suppliers Framework profiles and roadmaps are completely customizable by the organization, allowing it to be cost effective for any budget.
  • #8: Framework Success Stories summarize why and how organization’s use the Framework, emphasizing the variety of approaches and benefits, typically including lessons results, learned, and next steps.