- cyberframework Expand or Collapse
- Framework Expand or Collapse
- New to Framework Expand or Collapse
- Perspectives Expand or Collapse
- Success Stories Expand or Collapse
- Online Learning Expand or Collapse
- Evolution Expand or Collapse
- Frequently Asked Questions Expand or Collapse
- Events and Presentations
- Related Efforts (Roadmap)
- Informative References Expand or Collapse
- Resources Expand or Collapse
- Newsroom Expand or Collapse
This voluntary Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk. The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security.
In just four months since its April 2018 release, V1.1 of the Cybersecurity Framework already has been downloaded over 129,000 times. That compares with approximately 262,000 total downloads of V1.0 over four years!
Registration for the 2018 NIST Cybersecurity Risk Management Conference -- to be held November 7-9, 2018, at the Renaissance Baltimore Harborplace Hotel, in Baltimore, Maryland -- is now open and speaker nominations are being accepted (submit to firstname.lastname@example.org). The new deadline for nominations is August 7, 2018. NIST will make decisions and notify nominators by August 31, 2018. Sponsored by NIST, the three-day conference is expected to attract leaders from industry, academia, and government at all levels, including international attendees.
A recording of the July 9th webcast: 'Lessons Learned in Using the Baldrige Cybersecurity Excellence Builder with the Cybersecurity Framework' is now available. It can be found HERE.
Version 1.1 of the Framework was published on April 16, 2018. The document has evolved to be even more informative, useful, and inclusive for all kinds of organizations. Version 1.1 is fully compatible with Version 1.0 and remains flexible, voluntary, and cost-effective. Among other refinements and enhancements, the document provides a more comprehensive treatment of identity management and additional description of how to manage supply chain cybersecurity.
To see more Latest Updates click here