1 / 2

NIST Cyber Security Framework

Cyber Security threats exploit the complexity of key network systems, putting the security, economy, public safety & health at risk. Connectis 905-695-2200 u2022 Cyber Security threats exploit the complexity of key network systems, putting the security, economy, public safety & health at risk. Connectis 905-695-2200

Download Presentation

NIST Cyber Security Framework

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NIST Cyber Security Framework Cyber Security threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, and public safety and health at risk. Similar to risks to reputation and finance, cyber security risks affects a company’s bottom line directly and fast. It can drive up costs and affect revenue. It can harm an organization’s ability to innovate and to gain and maintain customers. Cyber security can be an important and amplifying organization’s overall risk management. To better address these risks, the Cyber security Enhancement Act of 20141 (CEA) updated the role of the National Institute of Standards and Technology (NIST) to include identifying and developing cyber security risk frameworks for component of an

  2. voluntary use by critical infrastructure owners and operators. With a Security Framework, You Can Understand Security Status. Establish / Improve a Cyber Security Program. Communicate Cyber Security requirements with stakeholders. Identify opportunities for new or revised standards Enables investment decisions to address gaps Having a guideline to protect your network environment and data is the first security step to take

More Related