target audience: TECH BUYER  Publication date: Jul 2020 - Document type: Tech Buyer Presentation - Doc  Document number: # US46658120

Implementing the NIST Cybersecurity Framework in the Digital Enterprise — Future Enterprise Planning Guide

By:  Meredith Whalen Loading

Content

  • 32 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

On-line Presentation

Abstract


This IDC Tech Buyer Presentation is part of IDC's Future Enterprise Planning Guide series. Each module delivers key overviews, targeted advice, and peer insights to guide users through key parts of the digital transformation (DX) process.

Digital transformation is changing the way organizations conduct business. Traditional security models are not enough. As organizations grapple with new IT architectures, it is important they incorporate a security model that aligns with this new reality.

Three out of four (74%) organizations have not yet created a security program to address their DX needs. Digital transformation forces enterprises not only to reconsider their security in terms of traditional risk management activities but also to understand how their security reputation may affect their success.

It's important to evolve security programs to align traditional practices of risk assessment and cybersecurity controls with the more fluid, dynamic needs of DX. IDC estimates that more than half of Fortune 500 companies with U.S. headquarters have adopted the NIST (National Institute of Standards and Technology) Cybersecurity Framework (CSF) as their primary control framework for cybersecurity.

Adoption of the NIST CSF as a control framework is a signal to potential business partners, customers, regulators, and the general public that the organization is serious about cybersecurity and is managing a comprehensive program.

This planning guide helps IT leaders focus on priorities with the largest return on their efforts to develop digital trust and protect the organization's vital data, applications, and infrastructure. You learn the most effective programs and projects to "move the needle" on security.



Coverage


Do you have questions about this document
or available subscriptions?