Skip to content
info@johnstek.com Corporate HQ: Coral Gables, FL, USA +1.786.375.9020 Latin American HQ: Asuncion, Paraguay +595.213.277.395
Search:
Search
JohnsTek
Strategic Technology Engineering
JohnsTekJohnsTek
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact

Taking Steps Towards Cyber Resilience

You are here:
  1. Home
  2. Blog
  3. Taking Steps Towards Cyber Resilience
Mar12017
BlogCyberSecurityCyberSecurity

The President is in the process of defining the Cyber Security Policy for the United States.  This follows on from the previous administration’s efforts to improve cyber security throughout the US.  While we expect to see more emphasis on public-private cooperation as well as potentially refining and defining what the roles of the Department of Defense and the Department of Homeland Security fill, at the end of the day, organizations are still going to be responsible for protecting themselves in Cyberspace.

The NIST Cybersecurity Framework (NIST CSF) provides organizations with a method to assess their current cybersecurity posture, determine the desired state and put plans in place to achieve the desired state.  The five areas of Identify, Protect, Detect, Respond and Recover are a workable approach to the critical areas of cyber resilience.  Even the most ill prepared organization can apply the evaluation to determine what steps they need to accomplish.  Using the NIST CSF can seem like a large undertaking but in today’s age it is imperative that organizations evaluate their cybersecurity posture and take steps to improve.

Identify, the first part of the NIST CSF “Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.”  Under this one of the five core functions, there are five sub-categories.

  • Asset Management (ID.AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to business objectives and the organization’s risk strategy.
  • Business Environment (ID.BE): The organization’s mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform cybersecurity roles, responsibilities, and risk management decisions.
  • Governance (ID.GV): The policies, procedures, and processes to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk.
  • Risk Assessment (ID.RA): The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.
  • Risk Management Strategy (ID.RM): The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions

(NIST CSF)

By taking some of the actions above, organizations can take important steps toward cyber resilience.  As the Administration works to develop their Cyber Security Policy, organizations should take important steps to secure themselves.  There are many reputable companies who can support companies and organizations seeking to implement the NIST CSF.  JohnsTek Inc is one such company.

Cyber Security is not an issue only for large companies, small business need to protect themselves.  There are resources out there to help.  Click here for more information or to schedule your free consultation.

Author:  Ernest Ferraresso @JTI_EFerraresso (Twitter)
Ernest Ferraresso is the JohnsTek Director of Operations.
www.johnstek.com
@JOHNSTEK
Categories: Blog, CyberSecurityBy Scott JohnstonMarch 1, 2017Leave a comment

Author: Scott Johnston

https://www.johnstek.com

Post navigation

PreviousPrevious post:Putting Eyes On The Blind spots with SUAVsNextNext post:JohnsTek Conducts Field Test of Integrated Communications Platform and Drone Ground Control Station

Related posts

CyberShield
Stay Secure During the Holiday Season!
December 13, 2020
Cafe Photo
Data Protection In Cafes And Restaurants
February 10, 2019
JohnsTek Capability Statement 2019
February 9, 2019
EOC_ops
Five Things Local Governments Can Do Now To Prepare For Disaster Response
January 11, 2019
Cyber_Pentagon_Transparent
Five Things You Can Do Now To Implement Or Improve Cybersecurity
January 8, 2019
IBM_JohnsTek
JohnsTek Partners with IBM Security!
November 19, 2018

Leave a Reply Cancel reply

You must be logged in to post a comment.

Shortcuts
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
JohnsTek News
  • CyberShield
    Stay Secure During the Holiday Season!
    December 13, 2020
  • Cafe Photo
    Data Protection In Cafes And Restaurants
    February 10, 2019
  • JohnsTek Capability Statement 2019
    February 9, 2019
Security Alerts
  • Alert Dispatch 23JUN17 ~ By JohnsTek
    June 23, 2017
  • Alert Dispatch 5JUN17 ~ By JohnsTek
    June 5, 2017
  • Alert Dispatch 18MAY17 ~ By JohnsTek
    May 18, 2017
Intel Brief
  • The Intel Brief 02OCT17 ~ By JohnsTek
    September 28, 2017
  • The Intel Brief 16AUG17 ~ By JohnsTek
    August 16, 2017
  • The Intel Brief 16JUN17 ~ By JohnsTek
    June 16, 2017
Press Releases
  • JohnsTek Capability Statement 2019
    February 9, 2019
  • IBM_JohnsTek
    JohnsTek Partners with IBM Security!
    November 19, 2018
  • Veterans Day
    JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!
    November 10, 2017
Copyright © 2021 JohnsTek | All Rights Reserved.
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
Footer