When confronted with the daunting task of developing a cybersecurity strategy, many people don’t know where to start. The quick answer is to make a list of the tasks required to accomplish the project, organize them by functional categories and determine what resources need to be brought together to accomplish the tasks on the list.

This might seem like an unsophisticated method to handle complicated issues, but cataloging is the underlying concept behind any framework. A cybersecurity framework provides a logical structure for the creation of strategy, lays out a sequence of activities required to implement the plan and provides meaningful target measures against which the strategy and key efforts are assessed.

Read the interactive white paper: Making the most of your risk management solutions

Moving to Risk Management

There is no greater challenge than securing your computing infrastructure. The complexities of the threat landscape and swiftly evolving technologies make it difficult to provide infrastructure security on an ad hoc basis. Historically, many organizations have failed to develop their security strategically, instead deploying solutions that meet narrow requirements — such as regulatory compliance or the hot technology of the week — without considering how they fit within a wider, more comprehensive security strategy.

This is beginning to change. Security leaders are starting to develop their lists by utilizing security frameworks to manage and assess their cybersecurity risks, and adoption of these frameworks is on the rise.

A Strategic Security Tool

Frameworks are becoming the strategic tools of choice to assess risk, prioritize threats, secure investment and communicate progress for the most pressing security initiatives. They provide assessment mechanisms that enable organizations to determine their current cybersecurity capabilities, set individual goals for a target state, and establish a cybersecurity strategy for improving and maintaining security programs. Frameworks help you understand the maturity of your security activities and can adapt over time to meet the maturity level of the threats you face and the security capabilities you employ.

NIST Cybersecurity Framework

There are various security frameworks that look at different types of needs, but one of the most popular is the National Institute of Science and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity, nominally referred to as the NIST Cybersecurity Framework (NIST CSF). This document was initially released in 2014 and is in the process of being updated.

The NIST CSF provides policy guidance to encourage organizations to develop a process-focused approach to digital security. It aims to provide direction on how to assess and improve an organization’s ability to prevent, detect and respond to cyberattacks.

The NIST CSF is organized with five core functions: Identify, Protect, Detect, Respond and Recover. Those categories are subdivided into 22 categories. The framework offers suggestions to build your list of things to do and establish a baseline against which you can measure the maturity of your control mechanisms. However, it doesn’t specifically tell you how to achieve these goals within individual security controls. With this guidance, you can make risk-based decisions about security investments to reduce actual cyber risks.

Deploying the Right Technology for Your Cybersecurity Strategy

Security is normally measured by the quantity of security tools deployed, not how well those tools mitigate specific risks to a business. Technology is no guarantee of threat protection. By assessing the threat mitigation capabilities against a business-oriented security framework, security teams can adjust resources to create a smart architecture that allows them to deploy the right tool for the right jobs.

Aligning security solutions with an overarching cybersecurity strategy moves organizations up to higher levels of maturity. Determining the mix of products and services that mitigate the greatest level of risk is difficult.

There is no one-size-fits-all solution for cybersecurity strategy. However, through the use of security frameworks such as the NIST CSF, organizations can shift from reactive efforts to a proactive approach to risk management. The framework provides the cybersecurity process, but security products and services are still required to minimize risk. The best route is to employ solutions that specifically address your needs within your stated framework.

Read the interactive IBM white paper: Making the most of your risk management solutions

More from CISO

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…

Moving at the Speed of Business — Challenging Our Assumptions About Cybersecurity

The traditional narrative for cybersecurity has been about limited visibility and operational constraints — not business opportunities. These conversations are grounded in various assumptions, such as limited budgets, scarce resources, skills being at a premium, the attack surface growing, and increased complexity. For years, conventional thinking has been that cybersecurity costs a lot, takes a long time, and is more of a cost center than an enabler of growth. In our upcoming paper, Prosper in the Cyber Economy, published by…

Reporting Healthcare Cyber Incidents Under New CIRCIA Rules

Numerous high-profile cybersecurity events in recent years, such as the Colonial Pipeline and SolarWinds attacks, spurred the US government to implement new legislation. In response to the growing threat, President Biden signed the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) in March 2022.While the law has passed, many healthcare organizations remain uncertain about how it will directly affect them. If your organization has questions about what steps to take and what the law means for your processes,…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…