This is a post I had made in LinkedIn, about translating the NIST guidelines to manage risk and all the edge components in a typical Security Deployment.Unless you still live in the above analog world, you wouldn’t share the edge cybersecurity concerns that I am writing about. (Disclaimer: I still love the art & music of the above analog world!)This write-up is the first part of a five-part series that explains how to translate and use, the NIST Cybersecurity Framework (CSF) 2.0 to identify, manager and secure devices & data at the "edge" of your enterprise (outside of data centers). It is for business operations professionals who may not have time to keep up with the latest cybersecurity recommendations.The series will cover the five functions of NIST CSF: Identify, Protect, Detect, Respond, and Recover. Each function will be explained in the context of securing edge devices and data.
https://www.linkedin.com/posts/nmaka_physicalsecurity-cybersecurity-cybersecurityexperts-activity-7171267996194164739-WQCy?utm_source=share&utm_medium=member_desktop
ASIS International1625 Prince StreetAlexandria VA 22314USAPhone: +1.703.519.6200(Monday - Friday, 9:00am to 5:00pm ET)email: community@asisonline.org
JoinBenefitsLearn More
About UsTerms of Use