5 Year Anniversary Of The NIST Cybersecurity Framework & Its Impacts

By   ISBuzz Team
Writer , Information Security Buzz | Feb 18, 2019 05:30 am PST

This week The National Institute of Standards and Technology (NIST) marks the 5th anniversary of the release by NIST of its popular cybersecurity framework, the Framework for Improving Critical Infrastructure Cybersecurity. The document has been downloaded more than half a million times, and although its use is voluntary for the private sector, it became mandatory for all U.S. federal agencies through a 2017 Presidential executive order.

Experts Comments below:

George Wrenn, CEO at CyberSaint Security:

george wrenn“For those organizations attempting to fall under “safe harbor”, adopting the NIST Cybersecurity Framework is key to your success. It’s now been five years since the NIST CSF was published and Framework adoption has drastically helped information security organizations and CISOs, including myself, standardize cybersecurity best practices. It’s no surprise that after the Framework was declared as the standard for government, that adoption is becoming mandatory or at least heavily encouraged through regulations such as these at the state level.”

Laurence Pitt, Strategic Security Director at Juniper Networks:

isbuzz expert 2“The NIST Cybersecurity Framework was introduced at a time when large-scale attacks were getting more and more public visibility, just six months earlier we’d seen the CryptoLocker ransomware, which really brought malware to the public eye. This meant that these attacks were also getting noticed by management and ‘the board’. In addition to providing a framework to help organizations develop an effective security strategy, it has also enabled conversations on cybersecurity risk to occur between the security team and senior leadership using a language that both can understand.

“In five years, NIST has gone from being a framework to help develop an effective security program and posture, to a recognized process that has enabled successful conversations to bridge the gap between security and senior leadership.”