810KB | 3 files | PDF
This short NIST article written by Ronald S. Ross focuses on the strategy “Build It Right, Then Continuously Monitor” when it comes to selecting, building and implementing the right security controls.
Failure to deploy available continuous monitoring resources in the right sequence and with the right level of effort could have significant potential adverse effects on the national and economic security interests of the United States. Continuous monitoring will be most effective when applied across all key components of an organization — from governance to architecture to systems.
This short, but very informative NIST article written by Ronald S. Ross, focuses on the strategy “Build It Right, Then Continuously Monitor” when it comes to selecting, building and implementing the right security controls. It touches on establishing a strong cybersecurity and risk management governance process to ensure your IT infrastructure is strong.
The attached zip file includes:
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ... More >>
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ... More >>
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ... More >>