Skip to main Content
White Paper

Cybersecurity Frameworks to Consider for Organization-wide Integration

Global Knowledge
  • Date: 09 November, 2016

Abstract

Organizations are inevitably facing cybercrime and attacks that can be catastrophic. Guidelines and best practices are key elements in preparing an entire company to be cyber ready. Cybersecurity frameworks exist to provide some guidelines for managing cyber risk. Gain a general overview, and receive tips for implementing an action plan with this white paper. Dig a little deeper and decide which one your organization should explore and adopt to help better prepare for cybersecurity disasters.

Sample

Implementation Action Plan

The most difficult part of integrating a cybersecurity framework into your organization is starting the research. There is no shortcut or substitute for doing your own homework. I recommend designating at least a few hours per framework to read the framework documents themselves as well as look at reviews and evaluations of them. Be sure to seek out both those with positive and negative experiences. Just because a framework sounds good to you, does not mean that it will be a perfect fit for your organization. There are often elements and aspects you did not notice in your initial review. Learn from the concerns of others, and then review the framework documentation a second time.

Unless you are in an industry that has mandatory frameworks that you must stay in compliance with, most cybersecurity frameworks are voluntary. Which also means you can select to integrate some elements from one framework and include other pieces from another security system. The goal is to improve your organization’s security infrastructure, not to rigidly apply a system that was not designed with your company specifically in mind.

Download here

Browse Related Topics:

James Michael Stewart

James Michael Stewart has been working with computers and technology for over thirty years. His work focuses on security, certification, and various operating systems. He has been teaching job skill and certification courses for over 20 years, such as CISSP, ethical hacking/penetration testing, computer forensics, and Security+. James Michael Stewart is an author on the CISSP Study Guide 8th Edition and the author of Security+ Review Guide 4th Edition (SY0-501) and has also contributed to many other security focused materials including exam preparation guides, practice exams, video instruction, and courseware. He has developed certification courseware and training materials as well as presented these materials in the classroom. Michael holds variety of certifications, including: CISSP, CEH, CHFI, ECSA, and Security+. His computer knowledge is self-acquired, based on seat-of-the-pants hands-on “street smarts” experience.

Cookie Control toggle icon