Start by establishing a foundation and strengthening cybersecurity assessments for effective and efficient operations and risk management.
Start by establishing a foundation and strengthening cybersecurity assessments for effective and efficient operations and risk management.
By Mary Ruddy | October 16, 2024
Effective cybersecurity programs aren't just technical. Organizations that use them as part of a proactive approach increase their ability to secure assets and prevent disruptions as digital assets grow in both number and type and cyber threats continue to evolve rapidly.
It takes the right vision and technology to align cybersecurity efforts with business objectives. A cybersecurity framework that adheres to international standards, such as those of the National Institute of Standards and Technology (NIST), includes defining a clear risk-management vision and deployment of security tools. This helps ensure organizational protection and further business growth over the long term.
Jumpstart your cybersecurity optimization program by leveraging the best practices embedded in frameworks.
Some cybersecurity frameworks help CISOs and other IT professionals develop a strategy to manage cyber risk. The strategy encompasses components relevant to implementing an effective cybersecurity program.
Gartner recommends that you:
Align your cybersecurity strategy to your organization’s business goals. Choose security products and services designed to suitably mitigate cybersecurity risks for your organization.
Focus on attracting, developing and nurturing cybersecurity talent who remain loyal to the organization.
A robust cybersecurity framework goes beyond merely managing cyber risk. It must address a number of critical areas and evolving security challenges.
Empower teams to mitigate cyber risks (including third-party risks) related to privacy, safety and reliability by conducting a cybersecurity risk assessment. Foundational approaches like business continuity management foster resilience amid increasing threats. Leverage artificial intelligence (AI) and optimize programs on cloud-based platforms.
The latest version of NIST Cybersecurity Framework (CSF), which provides guidance and best practices for private sector organizations to improve information security and cybersecurity risk management, was published in February 2024.
There are several key changes:
Govern is now a core function, realigning categories from other areas, including organizational context, risk management strategy and oversight.
Supply chain risk management is emphasized.
There is an increased focus on privacy considerations.
Scope has expanded to all types and sizes of organizations, lowering the barriers to entry for new adopters.
To prepare your organization to adopt NIST CSF 2.0:
Ensure your cybersecurity program considers governance and risk as a core function, and aligns these priorities to business objectives and outcomes, including supply chain risk management.
Develop a roadmap for updating the cybersecurity function, using NIST’s updated resources to assess the function’s current state.
Decide to execute an action plan to reach the target profile objectives, considering risk, resources and business impact.
See how your peers are navigating AI adoption, vendor decisions and evolving business demands — with tools tailored to your role:
Explore our resources for midsize enterprises
Check out a curated list of Gartner’s most popular research being utilized by your peers
Cybersecurity frameworks are structured sets of guidelines, standards and best practices designed to manage risk. Frameworks help organizations reduce exposure to weaknesses and vulnerabilities that hackers and cybercriminals may exploit. National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) and ISO 27001 are two of the most commonly used and recognized frameworks in cybersecurity.
Cybersecurity framework mapping evaluates an organization’s existing security measures against established frameworks like NIST or ISO 27001. By comparing existing efforts to known best practices, mapping helps identify gaps and weaknesses. This process ensures security controls cover all key risks and supports long-term compliance with regulations.
A cybersecurity assessment provides an in-depth look into an organization’s network of devices, systems and processes. It identifies areas of weakness along with an organization’s ability to protect its infrastructure. Performing an assessment helps prevent threats, strengthen defenses and protect sensitive data.
Attend a Conference
Experience IT Security and Risk Management conferences
With exclusive insight from Gartner experts on the latest trends, sessions curated for your role and unmatched peer networking, Gartner conferences help you accelerate your priorities.
Gartner Identity & Access Management Summit
Grapevine, TX
Drive stronger performance on your mission-critical priorities.