target audience: TECH BUYER Publication date: Jul 2020 - Document type: Tech Buyer Presentation - Doc Document number: # US46658120
Implementing the NIST Cybersecurity Framework in the Digital Enterprise — Future Enterprise Planning Guide
Content
- 32 slides
Get More
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.
Related Links
Abstract
This IDC Tech Buyer Presentation is part of IDC's Future Enterprise Planning Guide series. Each module delivers key overviews, targeted advice, and peer insights to guide users through key parts of the digital transformation (DX) process.
Digital transformation is changing the way organizations conduct business. Traditional security models are not enough. As organizations grapple with new IT architectures, it is important they incorporate a security model that aligns with this new reality.
Three out of four (74%) organizations have not yet created a security program to address their DX needs. Digital transformation forces enterprises not only to reconsider their security in terms of traditional risk management activities but also to understand how their security reputation may affect their success.
It's important to evolve security programs to align traditional practices of risk assessment and cybersecurity controls with the more fluid, dynamic needs of DX. IDC estimates that more than half of Fortune 500 companies with U.S. headquarters have adopted the NIST (National Institute of Standards and Technology) Cybersecurity Framework (CSF) as their primary control framework for cybersecurity.
Adoption of the NIST CSF as a control framework is a signal to potential business partners, customers, regulators, and the general public that the organization is serious about cybersecurity and is managing a comprehensive program.
This planning guide helps IT leaders focus on priorities with the largest return on their efforts to develop digital trust and protect the organization's vital data, applications, and infrastructure. You learn the most effective programs and projects to "move the needle" on security.