Enterprise Security Risk Management (ESRM) Community

 View Only
25 Jun, 2024 12:29 AM

This is a post I had made in LinkedIn, about translating the NIST guidelines to manage risk and all the edge components in a typical Security Deployment.

Unless you still live in the above analog world, you wouldn’t share the edge cybersecurity concerns that I am writing about.


(Disclaimer: I still love the art & music of the above analog world!)

This write-up is the first part of a five-part series that explains how to translate and use, the NIST Cybersecurity Framework (CSF) 2.0 to identify, manager and secure devices & data at the "edge" of your enterprise (outside of data centers). It is for business operations professionals who may not have time to keep up with the latest cybersecurity recommendations.

The series will cover the five functions of NIST CSF: Identify, Protect, Detect, Respond, and Recover. Each function will be explained in the context of securing edge devices and data.

https://www.linkedin.com/posts/nmaka_physicalsecurity-cybersecurity-cybersecurityexperts-activity-7171267996194164739-WQCy?utm_source=share&utm_medium=member_desktop


Statistics
0 Favorited
24 Views
1 Files
0 Shares
10 Downloads

Related Entries and Links

No Related Resource entered.