01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

equire the implementation of additional security requirements intended to reduce the risk of compromise<br />

by advanced persistent threats.<br />

Trans<strong>for</strong>mative Change<br />

While this proposed CMMC rule introduces additional requirements <strong>for</strong> defense contractors, it also<br />

presents an opportunity <strong>for</strong> deliberate and trans<strong>for</strong>mative change. Organizations that must comply with<br />

CMMC should consider stepping back and evaluating not only if security requirements are being met, but<br />

also if their cybersecurity program is poised to consistently meet these requirements over time and deliver<br />

value to the business.<br />

Organizations should consider the following to use CMMC adoption <strong>for</strong> trans<strong>for</strong>mative change:<br />

1. Understand how meeting CMMC will enable the organization to meet strategic goals and ensure<br />

the cybersecurity program strategy is aligned with these goals.<br />

2. Obtain senior leadership buy-in <strong>for</strong> the necessary resources—people, funding, and tools—to meet<br />

and maintain compliance with CMMC.<br />

3. Evaluate if CMMC security requirements also provide benefit to proprietary in<strong>for</strong>mation that is not<br />

used in the per<strong>for</strong>mance of defense contracts.<br />

4. Ensure that improvements to security controls are adequately documented in policies and<br />

procedures. Dedicating proper time and attention to documenting cybersecurity processes will<br />

improve the acculturation of the processes so that they are retained even in times of<br />

organizational stress.<br />

5. Schedule and plan continuous risk assessments to proactively manage cybersecurity and identify<br />

gaps ahead of CMMC assessment or affirmation obligations.<br />

Another important factor <strong>for</strong> organizations to consider when building or improving a cybersecurity<br />

program is the incorporation of per<strong>for</strong>mance management into operational processes. A CMMC<br />

assessment validates the implementation of security requirements at a point in time and does not provide<br />

organizational leadership continued assurance that cybersecurity measures are durable over time and<br />

aligned to strategic objectives. A more powerful approach includes the development of metrics to validate<br />

per<strong>for</strong>mance of these requirements over time to ensure they continue to provide a security posture<br />

commensurate with organizational needs as threat environments evolve. Organizations should regularly<br />

communicate the achievement of key metrics to ensure the effectiveness of security controls over time<br />

and to provide rationale <strong>for</strong> key decisions.<br />

System of Record<br />

<strong>Cyber</strong>security leaders, such as Chief In<strong>for</strong>mation security Officers (CISOs), have increased motivation to<br />

ensure that due care is used in the implementation and validation of cybersecurity controls. Recent rules<br />

adopted by the Securities and Exchange Commission (SEC) put pressure on public companies to<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 33<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!