Summary is AI-generated, newsdesk-reviewed
  • NIST and DHS offer resources for managing cybersecurity risks in organisations.
  • The NIST Framework Core helps organisations manage, protect, detect, respond, and recover from cyber risks.
  • DHS resources guide businesses to minimise cybersecurity risks and foster information sharing.

There are resources to help guide an organisation’s management of cybersecurity risks, most prominently from the National Institute of Standards and Technology (NIST) and the U.S. Department of Homeland Security.

NIST defines cybersecurity as "the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorised use or modification, or exploitation.”

NIST has developed a framework to provide voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organisations to better manage and reduce cybersecurity risk. The NIST Framework Core consists of five concurrent and continuous functions::

  • Identify. Understand how to manage cybersecurity risks.

  • Protect. Put safeguards in place to protect assets and deter threats.

  • Detect. Monitor continuously.

  • Respond. Devise an action plan to react promptly in case of a cyberattack.

  • Recover. Maintain resilience and recover capabilities after a cyber-breach.

In addition to helping organisations manage and reduce risks, the framework was designed to foster communications about risk and cybersecurity management among both internal and external organisational stakeholders.

The Department of Homeland Security offers a wealth of resources to guide businesses to minimise cybersecurity risk, to promote information sharing, and to develop new and innovative solutions to cybersecurity problems.

For a list of cybersecurity resources, including tools and guides, please visit www.comparitech.com

For more on cybersecurity in the IP video market, check out SourceSecurity.com’s Exclusive Technology Report: Meeting the Cybersecurity Challenge of IP Video Systems, available here.

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...