Everyone talks about Cybersecurity (e.g. hacking, hacks, hackers…) and has a general sense of what is being secured . But the reality is, Cybersecurity exists in virtually every aspect of our lives. Cyber including the internet, the deep web, the dark web, are analagous to an ecosystem found in nature.
Like any ecosystem, cyber is made up of dynamics and ecology that continually changes. Your data lives in that ecosystem and needs that ecosystem to have value. Data optimizes it’s integrity and availability in that ecosystem. In that ecosystem like any there are……diseases and predators. Cybersecurity is your Data’s defense mechanism.
Five Parts of Cybersecurity
The NIST (National Institute Standards and Technology) is a government agency that has created a practical and easy to use and understand cybersecurity framework they explain cybersecuruty has five main parts. If you understand what these thinsg are and why they are important you can fully understand the value of cybersecurity solutions.
You need to know what is in your ecosystem, what ecosystem your ecosystem is in, and so on…
“Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. The activities in the Identify Function are foundational for effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs.”
Keep your ecosystem safe. What people, process, technology and data do you need?
“Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event.”
Did something bad happen to your ecosystem, is happening, or about to happen to your ecosystem?
"Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecuritRespond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity eventy events."
What should you do when something happens?
"Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event"
OK now what?
Recover – Develop and implement the appropriate activities to maintain plans forresilience and to restore any capabilities or services that were impaired due to acybersecurity event.always exceed the client's expectation.