How following NIST guidelines can help guard against security breaches

Why the threat of cybersecurity attacks against critical infrastructure is real and why improving defenses is essential. Find out more in the upcoming CA Webcast on how to leverage the NIST framework for cybersecurity breaches.

The timing of the National Institute of Standards and Technology (NIST) Framework For Improving Critical Infrastructure Cybersecurity couldn’t be more relevant for an upcoming Webcast that I will be leading with one of my colleagues. Recent reports such as CNN Money’s on energy grid hacks and others citing nation state attacks show the threat is real and defense is mandatory.

CA Technologies has spoken to a number of companies that are in the early stages of planning to update their cybersecurity infrastructure and controls to more closely align with the NIST guidelines.

If you work in or around cybersecurity for your organization, it is important that you understand the Framework’s standards, guidelines and practices. The Framework is broken down into five overarching cybersecurity functions:

  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

 

Each of these functions contain recommended security outcomes that can help improve your organization’s cybersecurity posture.

Identity and access management (IAM) has a very strong tie-in to the Framework, especially for the “protect” function. This area, as the name implies, defines security controls that help protect critical applications and data from improper access, misuse or theft. It’s important that organizations evaluate their critical assets, threat environments and risk tolerance in order to develop cybersecurity goals and establish a prioritized roadmap to achieve these goals.

Learn more about the NIST Framework and how you can leverage it for improved cybersecurity by joining us for a Webcast on December 4, at 12 p.m. ET.

CA Technologies director of global government relations Jamie Brown and I will provide an overview of the Framework as well as details about identity management technologies that can help you understand and align with the Framework.

We hope you can join us.

Image credit: PNNL

Sumner is a director in the security business unit at CA. Previously, he managed the…

Comments

rewrite

Insights from the app driven world
Subscribe Now >
RECOMMENDED
DevOps and Cloud: Better Together >Cloud and DevOps: The Bacon and Eggs of the Modern Software Factory >Staying Positive in the Age of Ransomware >