CISA releases cybersecurity performance goals that outline priority baseline measures businesses and critical infrastructure owners can take to protect against cyber threats
In accordance with the memorandum President Biden signed into effect in 2021, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) developed a set of baseline cybersecurity performance goals (CPGs). The cross-sector Cybersecurity Performance Goals are intended to help establish a standard set of fundamental cybersecurity practices to help organizations kickstart their cybersecurity efforts.
CISA releases cybersecurity performance goals that outline priority baseline measures businesses and critical infrastructure owners can take to protect against cyber threats
In accordance with the memorandum President Biden signed into effect in 2021, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) developed a set of baseline cybersecurity performance goals (CPGs). These cross-sector Cybersecurity Performance Goals are intended to help establish a standard set of fundamental cybersecurity practices to help organizations kickstart their cybersecurity efforts.
Why you Should Follow the Cybersecurity Performance Goals
The CPGs are a set of cybersecurity best practices that IT owners and operators can implement to reduce the likelihood and impact of known cyber threats and cybercriminal tactics. The goals were informed by existing cybersecurity frameworks and guidance, as well as the real-world threats, tactics, techniques, and procedures observed by CISA and its government and industry partners.
The Cybersecurity Performance Goals are intended to be:
A benchmark for critical infrastructure operators to measure and improve their cybersecurity maturity.
A baseline set of cybersecurity practices broadly applicable across critical infrastructure with known risk-reduction value
Unique from other control frameworks as they consider not only the practices that address risk to individual entities, but also the aggregate risk to the nation.
A combination of recommended practices for IT and OT owners, including a prioritized set of security practices.
Why Impact?
Even with the best protection possible, breaches can occur. What happens in the time that immediately follows is critical to managing any adverse impacts.
We pay close attention to today’s threat landscape and tailor our solutions to be adaptive to its changes. We provide a deeper level of monitoring and management focused on your network and data security to assure your data, intellectual property, and operations are compliant and secure.
With over 20 years of experience, we have built an entire suite of comprehensive protection measures made to keep you and your business protected against cybercrime.
Find Out How your Current Cybersecurity Network Compares to the Released Cybersecurity Performance Goals
Use the form below to get started with your assessment.
Why you Should Follow the Cybersecurity Performance Goals
The CPGs are a set of cybersecurity best practices that IT owners and operators can implement to reduce the likelihood and impact of known cyber threats and cybercriminal tactics. The goals were informed by existing cybersecurity frameworks and guidance, as well as the real-world threats, tactics, techniques, and procedures observed by CISA and its government and industry partners.
The Cybersecurity Performance Goals are intended to be:
Unique from other control frameworks as they consider not only the practices that address risk to individual entities, but also the aggregate risk to the nation.
A baseline set of cybersecurity practices broadly applicable across critical infrastructure with known risk-reduction value
A benchmark for critical infrastructure operators to measure and improve their cybersecurity maturity.
A combination of recommended practices for IT and OT owners, including a prioritized set of security practices.
Why Impact?
Even with the best protection possible, breaches can occur. What happens in the time that immediately follows is critical to managing any adverse impacts.
We pay close attention to today’s threat landscape and tailor our solutions to be adaptive to its changes. We provide a deeper level of monitoring and management focused on your network and data security to assure your data, intellectual property, and operations are compliant and secure.
With over 20 years of experience, we have built an entire suite of comprehensive protection measures made to keep you and your business protected against cybercrime.
Find Out How your Current Cybersecurity Network Compares to the Released Cybersecurity Performance Goals
Use the form below to get started with your assessment.
UNSURE OF YOUR BUSINESS NEEDS? GIVE US A CALL.
We will examine your current IT infrastructure and recommend a solution that fits.
Our Blog
Protecting Your Personal Data: Lessons from a Major Breach
Genetic Testing Breach Raises Alarming Privacy ConcernsIn today’s world, data breaches are unfortunately becoming a common occurrence. Yet, when the...
The SEC Ramps Up Enforcement on Off-Channel Communications—Is Your Firm Compliant?
The Securities and Exchange Commission (SEC) is ramping up enforcement efforts this September, continuing its focus on off-channel communication...
Understanding Pretexting in Phishing Scams: What You Need to Know
Pretexting attacks are growing more sophisticated, and it's important to stay informed on how they work and how to protect yourself. In the...
Our Blog
Protecting Your Personal Data: Lessons from a Major Breach
Genetic Testing Breach Raises Alarming Privacy ConcernsIn today’s world, data breaches are unfortunately becoming a common occurrence. Yet, when the...
The SEC Ramps Up Enforcement on Off-Channel Communications—Is Your Firm Compliant?
The Securities and Exchange Commission (SEC) is ramping up enforcement efforts this September, continuing its focus on off-channel communication...
Understanding Pretexting in Phishing Scams: What You Need to Know
Pretexting attacks are growing more sophisticated, and it's important to stay informed on how they work and how to protect yourself. In the...