NIST CSF – Protect | Cybersecurity Insights #6

August 5, 2019 posted by

Hey! It’s me again, Josh from Absolute. This week’s episode is fully dedicated to the “Protect” pillar of the
NIST Cybersecurity Framework. [MUSIC] Although everyone wants to describe
their data devices apps and users as safe, the label is only true when we take
deliberate steps to make it that way. Which is why the NIST Cybersecurity
Framework focuses on those actions we can take to have safe devices, safe data,
safe apps, and safe users. The second law of thermodynamics
tells us that everything in our universe Everything! goes from order to disorder, unless something (or someone) acts to reverse the drag of entropy. Without action, devices and
data will naturally lead to disorder. They’ll degrade and and fall to shipwreck. But the NIST “Protect” pillar gives us guidance for VPN access, blocking cloud
storage apps, persisting endpoint visibility, and regenerating security apps
like encryption or anti-malware: all hallmarks of good cyber hygiene. With a keen eye on endpoint hygiene,
you can bolster the entire device population. All put into service to protect data. These attributes can be
measured with a unique score: The Endpoint Hygiene Coefficient. When no single device aligns
with my picture of hygiene, my Endpoint Hygiene Coefficient is “0”. This is rare.
So rare, that we can rule it out. But just as rare is an
Endpoint Hygiene Coefficient of “1”. If only our devices remained that pristine. So imagine an Endpoint Hygiene Coefficient of “0.81”. This means that some, if not all, devices are pulling us away, to some degree,
from where they need to be. Some devices are unencrypted, others are encrypted but
have sensitive data in cloud storage apps. Still others have outdated AV tools. The reasons can vary,
but by examining the device population AND quantifying the drift, you can
get ahead of mishaps that put data at-risk. We all have data to protect. But when you fortify data
and avoid unwitting user hazards by probing for sensitive information,
blocking unauthorized software, monitoring hygiene and
recruiting your users to join your epic quest you can safeguard our most
valuable raw material: information. The world is far from perfect. But in the next episode, we’ll accept that reality that we don’t live in a Utopia, and
explore the techniques for finding trouble. So make sure you subscribe,
and we’ll see you next time!


2 Replies to “NIST CSF – Protect | Cybersecurity Insights #6”

  1. Absolute says:

    0:12 – Skip the Intro

  2. sneha priya says:

    The global cybersecurity market was valued at $142.67 Billion in 2017 and is estimated to reach $290.09 by 2024, at a CAGR of 11.3% during the forecast period 2019-2024.

    Request a sample @

Leave a Comment

Your email address will not be published. Required fields are marked *