New Cybersecurity Guidelines Released by White House, Part 2

New Cybersecurity Guidelines Released by White House, Part 2

Framework Implementation Tier selection considers the following about your business:

  • Current risk management practices;
  • Threat environment;
  • Legal requirements;
  • Business objectives; and
  • Organizational constraints.

New Cybersecurity Guidelines Released by White House, Part 2I suggest the executive team of the company meeting with key employees and identifying the 5 characteristics above. The more your company identifies up front with accuracy, the easier it will be to identify the correct tier.

To choose the correct tier, be sure that the level you select meets your organization’s goals, that your organization can implement it and that it reduces risks to critical assets and resources. It is recommended to leverage guidance from governmental departments and agencies, Information Sharing and Analysis Centers (ISAC), existing models and other sources to help in determining the correct tier.

Progression to higher tiers is encouraged when it would be cost effective and reduce cybersecurity risk for your organization.

Tier 1: Partial

Your company belongs here if:

  • No cybersecurity risk management practices are identified;
  • Risk is managed reactively;
  • There is a limited awareness of cybersecurity risk;
  • Cybersecurity risk management is implemented on situation by situation basis;
  • Organization has no processes in place to collaborate with others.

Tier 2: Risk Informed

Your company belongs here if:

  • Risk management practices are approved by management but not established as a company policy;
  • Company-wide approach to managing cybersecurity risk is not established;
  • Process and procedures are defined;
  • Employees has resources to perform cybersecurity tasks;
  • Cybersecurity information is shared within organization informally; and
  • Knows organization knows its role but is not capable of sharing information externally.

Tier 3: Repeatable

Your company belongs here if:

  • Cybersecurity risk management practices are identified, expressed as policy and updated regularly;
  • Have a company-wide approach to managing cybersecurity risk;
  • Policies, processes and procedures are defined, implemented and reviewed;
  • Methods in place to respond effectively to risk changes;
  • Employees know how to performed roles; and
  • Organization collaborates with others in risk management decisions.

Tier 4: Adaptive

Your company belongs here if:

  • Adapts cybersecurity practices based on lessons learned and predictive analysis;
  • Actively adapts to changing cybersecurity risks;
  • Effectively responds to threats in a timely manner;
  • Uses company-wide risk-informed policies, processes and procedures to address potential cyber threats;
  • Cybersecurity risk management is part of company’s culture;
  • Cybersecurity risk management evolves from awareness of previous events, information shared by other sources and continuous awareness of own systems and networks; and
  • Actively shares risk management information with partners.

By no means is this meant as a complete “how-to” guide to the cybersecurity framework; however, I believe that it gives a brief overview and identifies how effective this framework can be if organizations will take the time to identify their characteristics and use those details to accurately determine the company’s sense of cybersecurity management.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.