There are many rewards to being a world class cybersecurity solutions provider at a time when demand for effective solutions is exponentially greater than the existing supply – and getting greater by the minute. But, perhaps the greatest reward is to be asked to model best practices and product capabilities for the greater good of business and missions in a world class lab. Better yet, to collaborate with the most widely recognized standards body in the world to establish such a model.
Tripwire is working with the National Cybersecurity Center of Excellence (NCCoE) in the Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events Building Block Consortium to develop practical, interoperable cybersecurity approaches that address the real-world needs of complex Information Technology (IT) systems. This project will detail methods and potential tool sets that can detect, mitigate, and contain data integrity events in the components of an enterprise network. It also will identify tools and strategies to aid in a security team’s response to such an event. NIST does not evaluate commercial products under this Consortium and does not endorse any product or service used. Additional information on this Consortium can be found at: https://www.nccoe.nist.gov/projects/building-blocks/data-integrity/detect-respond.
Synchronously, we are also working in the Data Integrity: Identifying and Protecting Assets against Ransomware and Other Destructive Events Building Block Consortium: https://www.nccoe.nist.gov/projects/building-blocks/data-integrity/identify-protect.
Along with the already published “Data Integrity: Recovering” Practice Guide, this 3-part series of detailed implementation resources, centered around the Data Integrity Building Block, will provide the practical steps required to implement a cybersecurity reference design that supports each core function (Identify, Protect, Detect, Respond, Recover) as identified by NIST’s Cybersecurity Framework.
First developed by the executive order of President Obama in 2013, the Framework’s adoption became a requirement for all (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Jim Wachhaus. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/greatest-rewards-working-integrity/