Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • Data Protection Services
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Managed Recovery
      • Cloud Recovery
      • Cyber Incident Recovery
      • Business Continuity Consulting and Services
      • Physical Infrastructure Recovery Services
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed Detection and Response
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Managed Recovery
    • Cloud Recovery
    • Cyber Incident Recovery
    • Business Continuity Consulting and Services
    • Physical Infrastructure Recovery Services
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: The NIST CyberSecurity Framework
Author: James Costanzo
Date: September 20, 2022

What is the NIST CyberSecurity Framework?

Over the next few weeks, we’ll be diving deep into the ever-evolving, increasingly-dire state of data protection and security, and how organizations can harness the NIST CyberSecurity Framework to chart a successful path forward.

“It does not do to leave a live dragon out of your calculations, if you live near him,” writes J.R.R. Tolkien inThe Hobbit. What, exactly, makes a calculation sufficiently dragon-proof? We’ll get there, rest assured. First, let’s agree on this: There is a dragon, and he’s moved in next door.

For those unfamiliar with Smaug, the arrogant, cunning, wealth-hoarding dragon of The Hobbit, or the existential threat he presents to the book’s protagonist, Bilbo Baggins, here’s all you need to know: The dragons of Middle Earth are mean and greedy, greedy and mean. They love gold, and take it with impunity. In my estimation, this is the perfect analogy for our current data protection predicament, where data is akin to gold and instead of one fire-breathing menace intent on stealing it, there are many.

Either way, it simply does not do to be unprepared.

A Mountain of Gold 

From 2010 to 2020, the total amount of data created, captured, copied, and consumed globally increased by more than 62 zettabytes, according to Statista. Over the next half a decade, that number is expected to triple. This is particularly important because as the volume of data increases worldwide, so does its value. Just think of all the valuable information that now lives in virtualized environments: Medical records, financial statements, confidential employee information, classified government documents, photos of family pets, and so on.

Another way to frame this would be: The more data we have, the more we have to lose. Today, the pain associated with losing data — because of human error, hardware failure, natural disaster, or theft — is almost ubiquitous. Even my 85-year-old grandparents (generally) understand the importance of backing up their photos to the cloud. While losing family photographs can be frustrating, even saddening, the financial, legal, and reputational ramifications associated with data loss can be catastrophic for businesses, governments, and other large organizations.

And so, at last, we’ve reached the razor-sharp nadir of our logical chain reaction. Unfortunately, as the volume and value of our data continues to grow, so will attempts to steal and/or compromise it. Those who pay attention to recent headlines already know this to be true. Enter, the dragon(s).

Houston, We Have a Dragon 

In May of 2021, Colonial Pipeline Co, which operates the 5,500-mile network of pipes responsible for roughly 45 percent of the gasoline and diesel fuel consumed on the U.S. East Coast, was forced to close following a ransomware attack. It took five days for the company to begin restarting operations and, even then, fully restoring the flow of fuel was not immediate.

The attack’s impact was felt nationwide, with frenzied runs on fuel resulting in long lines and shortages up and down the East Coast, surging gas prices, and volatility across the energy market. It even prompted an emergency response from the Biden Administration, which addressed the growing threat of ransomware by name.

This, of course, is but one high-profile example in what is now a worldwide crisis. In the wake of the COVID-19 pandemic, especially, organizations have experienced an acute struggle to maintain security and business continuity. Between 2019 and 2021, the number of ransomware complaints reported to the FBI increased by 82 percent. Now with millions more people working from home, the risk of cyber threats and system breaches has grown exponentially, and is continuing to rise.

According to Cybersecurity Ventures, ransomware attacks alone are expected to impact a business, consumer, or device every two seconds by 2031, up from every 11 seconds in 2021. Over that same time frame, the total global cost of ransomware is projected to increase from $20 billion to a staggering $265 billion.

All totaled, the global cost of cybercrime is forecasted to grow by 15 percent year over year, according to Cybersecurity Ventures. By 2025, the damages are predicted to reach $15 trillion annually, up from $3 trillion in 2015. That would represent the greatest transfer of economic wealth in human history — exponentially larger than costs associated with natural disasters and more profitable than the global sale of all major illegal drugs combined.

Now that’s what I’d call a dragon-sized problem, one we’d be foolish to leave out of our calculations.

Dragon-Proofing with the NIST CyberSecurity Framework

There’s something to be said for having a plan — a great many things, in fact.

From Confucius to Benjamin Franklin to Tolkien to today’s Tik Tok influencer du jour, human beings have long recognized (and touted) the virtue of preparation. And while we have no shortage of pithy reminders to plaster on posters, embroider on throw pillows, or wedge into blog posts (wink, wink), finding the rightt way to prepare for life’s many dragons is easier said than done.

When it comes to data security and protection planning, specifically, there are but a few accepted, cohesive frameworks. The one we will be discussing here — and in future posts (stay tuned) — was crafted and introduced by the National Institute of Standards and Technology (NIST). This voluntary framework consists of standards, guidelines, and best practices designed to help organizations of any size and sector improve the cybersecurity, risk management, and resilience of their systems. Critical calculations for nearby dragons, as Tolkien might say.

The origins of the NIST CyberSecurity Framework (CSF) can be traced back to February 2013, when President Barack Obama issued an executive order calling for the creation of a voluntary framework for cybersecurity and resiliency. On top of this executive order, Congress codified into law the “Cybersecurity Enhancement Act,” providing an additional layer of validity to the creation of such a framework. One year later, NIST published the “Framework for Improving Critical Infrastructure Cybersecurity.”

Originally intended for critical infrastructure, today it has broader applicability across all organization types. The NIST CSF has been increasingly recognized by governments and organizations as the recommended best practice guide to help improve the cybersecurity risk management and resilience of their systems. As of 2022, the NIST Cybersecurity Framework has been downloaded over 1.7 million times, and is currently being used by organizations across a wide range of sectors, sizes, and geographies.When boiled down, the NIST CSF consists five key functions: Identify, Protect, Detect, Respond, and Recover. According to NIST, these five functions were selected because they represent the five primary pillars for a successful and holistic cybersecurity program. They aid organizations in easily expressing their management of cybersecurity risk at a high level, enabling risk management decisions and acting as the backbone around which all other framework elements are organized.

 

Here is a brief breakdown of each function, taken directly from the CSF overview on NIST.gov:

Identify: 
The Identify Function assists in developing an organizational understanding for managing cybersecurity risk to systems, people, assets, data, and capabilities. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs.

Protect:
The Protect Function outlines appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event.

Detect:
The Detect Function defines the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecurity events.

Respond:
The Respond Function includes appropriate activities to take action regarding a detected cybersecurity incident. The Respond Function supports the ability to contain the impact of a potential cybersecurity incident.

Recover: 
The Recover Function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity incident.

How Can the NIST CyberSecurity Framework Help Your Business? 

Now for some exciting news: Over the next few weeks, 11:11 Systems will be getting a head start on CyberSecurity Awareness Month with a blog series on data security and the NIST CyberSecurity Framework.

Okay, I’m willing to admit that all this has been a rather roundabout way to arrive at our point (as well as yet another shameless shoehorning of Tolkien on my part), but I stand by it. Nevertheless, we’ll be diving deep into the ever-evolving, increasingly-dire state of data protection and security, and how organizations can harness the NIST CyberSecurity Framework to chart a well-planned, successful path forward.

Stay tuned for in-depth explorations into each of the NIST CSF’s five key functions from our seasoned team of product experts. Coming up first: Jim Jones, senior product infrastructure architect at 11:11 Systems, on “Identify.” Don’t miss out!

Categories: Covid-19 Pandemic, Cybercrime, Ransomware, SecurityBy James CostanzoSeptember 20, 2022
Tags: The NIST CyberSecurity Framework

Author: James Costanzo

James Costanzo is a Product Marketing Manager and Content Strategist at 11:11 Systems. In this role, James helps to create 11:11’s product, communications, and customer reference messaging and content. A storyteller at heart, James worked in development and as a reporter for nearly a decade prior to joining 11:11 marketing. James graduated with a master’s degree in journalism from the S.I. Newhouse School of Public Communications at Syracuse University.

Post navigation

PreviousPrevious post:Protecting Your Protection: Securing Cohesity Backups with DataLockNextNext post:The NIST CyberSecurity Framework: Identify

Related Posts

ransomware, cyber attack, cyber insurance
As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound – Part 2
September 21, 2023
Veeam, AWS, and 11:11 Systems logos
Best in Class for Data Protection
September 20, 2023
cyber threats, cyber attacks, cyberthreats, cyberattacks, cyber incidents, ransomware
As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound
September 18, 2023
layered security strategy
Why a Layered Security Strategy Matters
September 11, 2023
Are You Cyber Recovery Ready?
September 7, 2023
protect your brand reputation from cyber-attacks, stay under the radar
“Flying Under the Radar:” How to Protect Your Organization’s Reputation
August 31, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice |

Go to Top

https://1111systems.com/wp-content/uploads/2023/04/HPE-video-for-1111-SKO.mp4

https://1111systems.com/wp-content/uploads/2023/04/Dell-Global-Alliance-video-for-1111-SKO.mp4