The National Institute of Standards and Technologies plans to soon release new updates to some of its publications, including its Cybersecurity Framework, to reflect new IT modernization priorities.

Ron Ross, the computer scientist behind the NIST Federal Information Security Management (FISMA) implementation, claims the three primary goals are to simplify, innovate, and automate.

The key area where the framework will provide new advice is about supply chain risks, identity management, and cybersecurity risk assessment and measurement. NIST’s second draft framework was released last December, but it’s currently reviewing public comments and will release the final version Spring 2018.

NIST has been working on revision five of the Security and Privacy Controls for Federal Information Systems and Organizations for quite some time now. The newest version will include integrating privacy and security controls in one unified catalog to help simplify the process.

In an effort to connect the C-suite to system owners, NIST is looking to integrate the cybersecurity framework into the risk management framework 2.0. The idea behind this is to get the C-suite to buy into the problem space by explaining the impact on the business if the system is breached.

The new version of the NIST Cybersecurity Framework will include simple descriptions and definition for identifying all stakeholders and associated cyber risks in an organizational supply chain.

Risk assessment is an area that’s expected to include fresh insight. This section will include a revised section on measuring and demonstrating cyber security effectiveness, including a section of self-assessing cyber risk, and a section on how organizations can identify, measure, and manage cyber risks to support broader business goals.

NIST also plans to publish its second version of its systems security engineering publication, 800-160, on March 21, 2018. This revised version will focus on cyber resiliency recommendations for the engineering of trustworthy secure systems, taking into account the basic notion that you can’t always stop the breach, but you can at least spot the breach.

The newest addition to the NIST toolset is NIST 800-171: Protecting Unclassified Information in Nonfederal Information Systems and Organizations. The deadline for NIST 800-171 is well past us (December 31, 2017), but for those still looking to for a continuous NIST compliance solution, refer to NNT. Let NNT show you how a single solution addresses one-third of all the security and compliance requirements across the various 14 categories within NIST 800-171.



Read the article on Federal News Radio

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.