SlideShare a Scribd company logo
1 of 10
© 2012 Liberty Group Ventures. All rights reserved
NIST FRAMEWORK OVERVIEW
Presented by
Kiersten Todt
Roger Cressey
Liberty Group Ventures, LLC
1
Liberty Group Ventures, LLC Proprietary
and Business Confidential
© 2012 Liberty Group Ventures. All rights reserved
2
Framework Background
 Executive Order 13636
 Failure by Congress to pass cyber legislation
 Unprecedented cyber threat environment
 Role of NIST
 Develop voluntary framework
 Industry-led
 Process
 Ten months, five workshops, transparent process
 12,000 public comments adjudicated
 Collaboration between NIST, White House (NSC),
DHS, and private sector
© 2012 Liberty Group Ventures. All rights reserved
3
Framework Basics
 Core: Set of cybersecurity activities and informative
references common across CI
 Functions: Overview of organization’s management of
cyber risks
 Identify, Protect, Detect, Respond, Recover (IPDRR)
Tiers: Mechanism to view approach and processes for
managing cyber risk
1. Partial
2. Risk Informed
3. Repeatable
4. Adaptive
 Tier 4 is not the goal for every organization
© 2012 Liberty Group Ventures. All rights reserved
4
Framework Basics (continued)
 Profiles
 Alignment of IPDRR with business requirements, risk
tolerance, and resources of organization
 Current Profile
 Target Profile
 Profiles create gap analysis
Creating a profile helps a company understand its
dependencies with business partners, vendors, and
suppliers.
© 2012 Liberty Group Ventures. All rights reserved
5
What the Framework is Really About
 Creating a common language for cyber risk management
 Objective: Facilitate behavioral change in organizations
 Treat cyber risk as a mission equal in priority to other corporate risk
 Intended for critical infrastructure owners and operators…
but can be used by many others
 Applies market-driven approach to cyber risk management
 Product of industry, not government
 Not one size fits all…user experience will vary
© 2012 Liberty Group Ventures. All rights reserved
6
Implications of Framework
 Industry: Each Sector Will Define Adoption
 Identify metrics for success
 Facilitate information sharing within industry
 Defining cost-effectiveness
 Role for insurance….finally?
 Business
 Small (prioritize, develop risk management process)
 Medium (grow risk management process)
 Large (share best practices and lessons learned)
© 2012 Liberty Group Ventures. All rights reserved
7
Framework: The Way Ahead
 NIST’s Initial Areas for Further Work
 Authentication
 Automated Indicator Sharing
 Conformity Assessment
 Cybersecurity Workforce
 Data Analytics
 Federal Agency Cybersecurity Alignment
 Supply Chain Risk Management
 International Aspects, Impacts, and Alignment
 Technical Privacy Standards
© 2012 Liberty Group Ventures. All rights reserved
8
Framework: The Way Ahead
(continued)
 Government
 DHS role evolving
 Launch of Critical Infrastructure Cyber Community Voluntary
Program
 Providing managed security services to states, localities who
adopt framework - a good first step
 Work with Sector Specific Agencies in first year, expand to all CI
business in future
 Seeking input from small business on framework adoption
 More work on incentives is required
 International adoption…and overcoming Snowden
challenge
 Need for role of US business with global presence to engage
and facilitate
© 2012 Liberty Group Ventures. All rights reserved
9
Framework: The Way Ahead
(continued)
 Industry
 Participate in additional workshops on implementation
and areas for improvement
 Adopt Framework by mapping it to existing risk management
process and addressing gaps that are identified through profile
development
 Conduct training to “normalize” cyber risk behavior, including
simulations and exercises with corporate leadership
 Feedback to government: Lessons learned/what works/what
doesn’t/what’s missing
 Industry input will shape development of Framework 2.0
 Non-lifeline sector adoption
 Retail, Manufacturing, etc.
© 2012 Liberty Group Ventures. All rights reserved
9
Framework: The Way Ahead
(continued)
 Industry
 Participate in additional workshops on implementation
and areas for improvement
 Adopt Framework by mapping it to existing risk management
process and addressing gaps that are identified through profile
development
 Conduct training to “normalize” cyber risk behavior, including
simulations and exercises with corporate leadership
 Feedback to government: Lessons learned/what works/what
doesn’t/what’s missing
 Industry input will shape development of Framework 2.0
 Non-lifeline sector adoption
 Retail, Manufacturing, etc.

More Related Content

What's hot

Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...
Dr. Amarjeet Singh
 

What's hot (20)

7 Ways Insurance Brokers Should Approach InsurTech
7 Ways Insurance Brokers Should Approach InsurTech7 Ways Insurance Brokers Should Approach InsurTech
7 Ways Insurance Brokers Should Approach InsurTech
 
The future of insurance distribution: New models for a digital customer
The future of insurance distribution: New models for a digital customerThe future of insurance distribution: New models for a digital customer
The future of insurance distribution: New models for a digital customer
 
Cracking the Code on Consumer Fraud | Accenture
Cracking the Code on Consumer Fraud | AccentureCracking the Code on Consumer Fraud | Accenture
Cracking the Code on Consumer Fraud | Accenture
 
Hivos Seminar - Dar es Salaam 2010
Hivos Seminar - Dar es Salaam 2010Hivos Seminar - Dar es Salaam 2010
Hivos Seminar - Dar es Salaam 2010
 
CII-EY Insurance Report - Insurer of the Future 2016
CII-EY Insurance Report - Insurer of the Future 2016CII-EY Insurance Report - Insurer of the Future 2016
CII-EY Insurance Report - Insurer of the Future 2016
 
Fintech Insurance Report -June 2016
Fintech Insurance Report -June 2016Fintech Insurance Report -June 2016
Fintech Insurance Report -June 2016
 
Bridging the gap: cyber security skills
Bridging the gap: cyber security skillsBridging the gap: cyber security skills
Bridging the gap: cyber security skills
 
Digitalbusiness
DigitalbusinessDigitalbusiness
Digitalbusiness
 
Peer-to-Peer Insurance & Community - Webinar Deck
Peer-to-Peer Insurance & Community - Webinar DeckPeer-to-Peer Insurance & Community - Webinar Deck
Peer-to-Peer Insurance & Community - Webinar Deck
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Medicare-Aged Users Want a Digital Experience and Tools
Medicare-Aged Users Want a Digital Experience and ToolsMedicare-Aged Users Want a Digital Experience and Tools
Medicare-Aged Users Want a Digital Experience and Tools
 
What Your Competitors Are Already Doing with Big Data
What Your Competitors Are Already Doing with Big DataWhat Your Competitors Are Already Doing with Big Data
What Your Competitors Are Already Doing with Big Data
 
The Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for InsurersThe Internet of Things: Opportunity for Insurers
The Internet of Things: Opportunity for Insurers
 
Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...
 
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
Rethinking the Insurance Business in a Connected World - Insurance IoT EU Sum...
 
Sustainability, Best's Review, December 2018
Sustainability, Best's Review, December 2018Sustainability, Best's Review, December 2018
Sustainability, Best's Review, December 2018
 
Startup InsurTech Award - iCede
Startup InsurTech Award - iCedeStartup InsurTech Award - iCede
Startup InsurTech Award - iCede
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTech
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
IoT Insurance Observatory
IoT Insurance ObservatoryIoT Insurance Observatory
IoT Insurance Observatory
 

Viewers also liked

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 

Viewers also liked (6)

Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy GroupSpeaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
 
Speaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense IndexSpeaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense Index
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
US Cyber Security Policy
US Cyber Security PolicyUS Cyber Security Policy
US Cyber Security Policy
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 

Similar to Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventures, LLC (LGV)

Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Sherry Jones
 
Towards Quantification of Cyber Risk
Towards Quantification of Cyber RiskTowards Quantification of Cyber Risk
Towards Quantification of Cyber Risk
Kirstjen Nielsen
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
MargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
bagotjesusa
 
Applying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsApplying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_efforts
Subhajit Bhuiya
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 

Similar to Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventures, LLC (LGV) (20)

What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
 
Mmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu EssayMmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu Essay
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Towards Quantification of Cyber Risk
Towards Quantification of Cyber RiskTowards Quantification of Cyber Risk
Towards Quantification of Cyber Risk
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
 
Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we work
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk
 
Applying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_effortsApplying risk management_to_your_business_continuity_management_efforts
Applying risk management_to_your_business_continuity_management_efforts
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
 

More from Investorideas.com

American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
Investorideas.com
 

More from Investorideas.com (7)

Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationViscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) Presentation
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 
Positive id PositiveID Corporation (OTCBB:PSID) Conference Presentation
Positive id PositiveID Corporation (OTCBB:PSID) Conference PresentationPositive id PositiveID Corporation (OTCBB:PSID) Conference Presentation
Positive id PositiveID Corporation (OTCBB:PSID) Conference Presentation
 
Implant Sciences (OTCQB:IMSC) Presentation
Implant Sciences (OTCQB:IMSC) Presentation Implant Sciences (OTCQB:IMSC) Presentation
Implant Sciences (OTCQB:IMSC) Presentation
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 

Recently uploaded

Sensual Moments: +91 9999965857 Independent Call Girls Aerocity Delhi {{ Moni...
Sensual Moments: +91 9999965857 Independent Call Girls Aerocity Delhi {{ Moni...Sensual Moments: +91 9999965857 Independent Call Girls Aerocity Delhi {{ Moni...
Sensual Moments: +91 9999965857 Independent Call Girls Aerocity Delhi {{ Moni...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
B2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccB2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxccccccccccccccc
MollyBrown86
 
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our EscortsVIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
sonatiwari757
 
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In AmritsarCall Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
only4webmaster01
 
Editing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxxEditing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxx
MollyBrown86
 
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service AvailableCall Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Sheetaleventcompany
 
Corporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfCorporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdf
Probe Gold
 
VIP Call Girls Kheda 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Kheda 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Kheda 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Kheda 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

(👉゚9999965857 ゚)👉 VIP Call Girls Friends Colony 👉 Delhi 👈 : 9999 Cash Payment...
(👉゚9999965857 ゚)👉 VIP Call Girls Friends Colony 👉 Delhi 👈 : 9999 Cash Payment...(👉゚9999965857 ゚)👉 VIP Call Girls Friends Colony 👉 Delhi 👈 : 9999 Cash Payment...
(👉゚9999965857 ゚)👉 VIP Call Girls Friends Colony 👉 Delhi 👈 : 9999 Cash Payment...
 
Sensual Moments: +91 9999965857 Independent Call Girls Aerocity Delhi {{ Moni...
Sensual Moments: +91 9999965857 Independent Call Girls Aerocity Delhi {{ Moni...Sensual Moments: +91 9999965857 Independent Call Girls Aerocity Delhi {{ Moni...
Sensual Moments: +91 9999965857 Independent Call Girls Aerocity Delhi {{ Moni...
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 
(‿ˠ‿) Independent Call Girls Laxmi Nagar 👉 9999965857 👈 Delhi : 9999 Cash Pa...
(‿ˠ‿) Independent Call Girls Laxmi Nagar 👉 9999965857 👈 Delhi  : 9999 Cash Pa...(‿ˠ‿) Independent Call Girls Laxmi Nagar 👉 9999965857 👈 Delhi  : 9999 Cash Pa...
(‿ˠ‿) Independent Call Girls Laxmi Nagar 👉 9999965857 👈 Delhi : 9999 Cash Pa...
 
B2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccB2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxccccccccccccccc
 
Call Girls 🫤 East Of Kailash ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
Call Girls 🫤 East Of Kailash ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...Call Girls 🫤 East Of Kailash ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...
Call Girls 🫤 East Of Kailash ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
 
Pakistani Call girls in Ajman +971563133746 Ajman Call girls
Pakistani Call girls in Ajman +971563133746 Ajman Call girlsPakistani Call girls in Ajman +971563133746 Ajman Call girls
Pakistani Call girls in Ajman +971563133746 Ajman Call girls
 
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our EscortsVIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
VIP Amritsar Call Girl 7001035870 Enjoy Call Girls With Our Escorts
 
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024
 
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In AmritsarCall Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
 
Best investment platform in india-Falcon Invoice Discounting
Best investment platform in india-Falcon Invoice DiscountingBest investment platform in india-Falcon Invoice Discounting
Best investment platform in india-Falcon Invoice Discounting
 
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Udyog Vihar Gurgaon >༒8448380779 Escort Service
 
Editing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxxEditing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxx
 
Dattawadi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready Fo...
Dattawadi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready Fo...Dattawadi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready Fo...
Dattawadi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready Fo...
 
Diligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage StartupsDiligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage Startups
 
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
 
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service AvailableCall Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
 
(👉゚9999965857 ゚)👉 VIP Call Girls Greater Noida 👉 Delhi 👈 : 9999 Cash Payment...
(👉゚9999965857 ゚)👉 VIP Call Girls Greater Noida  👉 Delhi 👈 : 9999 Cash Payment...(👉゚9999965857 ゚)👉 VIP Call Girls Greater Noida  👉 Delhi 👈 : 9999 Cash Payment...
(👉゚9999965857 ゚)👉 VIP Call Girls Greater Noida 👉 Delhi 👈 : 9999 Cash Payment...
 
Corporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfCorporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdf
 
VIP Call Girls Kheda 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Kheda 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Kheda 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Kheda 7001035870 Whatsapp Number, 24/07 Booking
 

Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventures, LLC (LGV)

  • 1. © 2012 Liberty Group Ventures. All rights reserved NIST FRAMEWORK OVERVIEW Presented by Kiersten Todt Roger Cressey Liberty Group Ventures, LLC 1 Liberty Group Ventures, LLC Proprietary and Business Confidential
  • 2. © 2012 Liberty Group Ventures. All rights reserved 2 Framework Background  Executive Order 13636  Failure by Congress to pass cyber legislation  Unprecedented cyber threat environment  Role of NIST  Develop voluntary framework  Industry-led  Process  Ten months, five workshops, transparent process  12,000 public comments adjudicated  Collaboration between NIST, White House (NSC), DHS, and private sector
  • 3. © 2012 Liberty Group Ventures. All rights reserved 3 Framework Basics  Core: Set of cybersecurity activities and informative references common across CI  Functions: Overview of organization’s management of cyber risks  Identify, Protect, Detect, Respond, Recover (IPDRR) Tiers: Mechanism to view approach and processes for managing cyber risk 1. Partial 2. Risk Informed 3. Repeatable 4. Adaptive  Tier 4 is not the goal for every organization
  • 4. © 2012 Liberty Group Ventures. All rights reserved 4 Framework Basics (continued)  Profiles  Alignment of IPDRR with business requirements, risk tolerance, and resources of organization  Current Profile  Target Profile  Profiles create gap analysis Creating a profile helps a company understand its dependencies with business partners, vendors, and suppliers.
  • 5. © 2012 Liberty Group Ventures. All rights reserved 5 What the Framework is Really About  Creating a common language for cyber risk management  Objective: Facilitate behavioral change in organizations  Treat cyber risk as a mission equal in priority to other corporate risk  Intended for critical infrastructure owners and operators… but can be used by many others  Applies market-driven approach to cyber risk management  Product of industry, not government  Not one size fits all…user experience will vary
  • 6. © 2012 Liberty Group Ventures. All rights reserved 6 Implications of Framework  Industry: Each Sector Will Define Adoption  Identify metrics for success  Facilitate information sharing within industry  Defining cost-effectiveness  Role for insurance….finally?  Business  Small (prioritize, develop risk management process)  Medium (grow risk management process)  Large (share best practices and lessons learned)
  • 7. © 2012 Liberty Group Ventures. All rights reserved 7 Framework: The Way Ahead  NIST’s Initial Areas for Further Work  Authentication  Automated Indicator Sharing  Conformity Assessment  Cybersecurity Workforce  Data Analytics  Federal Agency Cybersecurity Alignment  Supply Chain Risk Management  International Aspects, Impacts, and Alignment  Technical Privacy Standards
  • 8. © 2012 Liberty Group Ventures. All rights reserved 8 Framework: The Way Ahead (continued)  Government  DHS role evolving  Launch of Critical Infrastructure Cyber Community Voluntary Program  Providing managed security services to states, localities who adopt framework - a good first step  Work with Sector Specific Agencies in first year, expand to all CI business in future  Seeking input from small business on framework adoption  More work on incentives is required  International adoption…and overcoming Snowden challenge  Need for role of US business with global presence to engage and facilitate
  • 9. © 2012 Liberty Group Ventures. All rights reserved 9 Framework: The Way Ahead (continued)  Industry  Participate in additional workshops on implementation and areas for improvement  Adopt Framework by mapping it to existing risk management process and addressing gaps that are identified through profile development  Conduct training to “normalize” cyber risk behavior, including simulations and exercises with corporate leadership  Feedback to government: Lessons learned/what works/what doesn’t/what’s missing  Industry input will shape development of Framework 2.0  Non-lifeline sector adoption  Retail, Manufacturing, etc.
  • 10. © 2012 Liberty Group Ventures. All rights reserved 9 Framework: The Way Ahead (continued)  Industry  Participate in additional workshops on implementation and areas for improvement  Adopt Framework by mapping it to existing risk management process and addressing gaps that are identified through profile development  Conduct training to “normalize” cyber risk behavior, including simulations and exercises with corporate leadership  Feedback to government: Lessons learned/what works/what doesn’t/what’s missing  Industry input will shape development of Framework 2.0  Non-lifeline sector adoption  Retail, Manufacturing, etc.