CISA releases cybersecurity performance goals that outline priority baseline measures businesses and critical infrastructure owners can take to protect against cyber threats

 

In accordance with the memorandum President Biden signed into effect in 2021, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) developed a set of baseline cybersecurity performance goals (CPGs). The cross-sector Cybersecurity Performance Goals are intended to help establish a standard set of fundamental cybersecurity practices to help organizations kickstart their cybersecurity efforts.

CISA releases cybersecurity performance goals that outline priority baseline measures businesses and critical infrastructure owners can take to protect against cyber threats

 

In accordance with the memorandum President Biden signed into effect in 2021, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) developed a set of baseline cybersecurity performance goals (CPGs). These cross-sector Cybersecurity Performance Goals are intended to help establish a standard set of fundamental cybersecurity practices to help organizations kickstart their cybersecurity efforts.

Why you Should Follow the Cybersecurity Performance Goals

The CPGs are a set of cybersecurity best practices that IT owners and operators can implement to reduce the likelihood and impact of known cyber threats and cybercriminal tactics. The goals were informed by existing cybersecurity frameworks and guidance, as well as the real-world threats, tactics, techniques, and procedures observed by CISA and its government and industry partners.

The Cybersecurity Performance Goals are intended to be:

A benchmark for critical infrastructure operators to measure and improve their cybersecurity maturity. 

A baseline set of cybersecurity practices broadly applicable across critical infrastructure with known risk-reduction value

Unique from other control frameworks as they consider not only the practices that address risk to individual entities, but also the aggregate risk to the nation.

A combination of recommended practices for IT and OT owners, including a prioritized set of security practices. 

Why Impact?

Even with the best protection possible, breaches can occur. What happens in the time that immediately follows is critical to managing any adverse impacts.

We pay close attention to today’s threat landscape and tailor our solutions to be adaptive to its changes. We provide a deeper level of monitoring and management focused on your network and data security to assure your data, intellectual property, and operations are compliant and secure.

With over 20 years of experience, we have built an entire suite of comprehensive protection measures made to keep you and your business protected against cybercrime. 

Find Out How your Current Cybersecurity Network Compares to the Released Cybersecurity Performance Goals

Use the form below to get started with your assessment.

Why you Should Follow the Cybersecurity Performance Goals

The CPGs are a set of cybersecurity best practices that IT owners and operators can implement to reduce the likelihood and impact of known cyber threats and cybercriminal tactics. The goals were informed by existing cybersecurity frameworks and guidance, as well as the real-world threats, tactics, techniques, and procedures observed by CISA and its government and industry partners.

The Cybersecurity Performance Goals are intended to be:

Unique from other control frameworks as they consider not only the practices that address risk to individual entities, but also the aggregate risk to the nation.

A baseline set of cybersecurity practices broadly applicable across critical infrastructure with known risk-reduction value

A benchmark for critical infrastructure operators to measure and improve their cybersecurity maturity. 

A combination of recommended practices for IT and OT owners, including a prioritized set of security practices. 

 Why Impact?

Even with the best protection possible, breaches can occur. What happens in the time that immediately follows is critical to managing any adverse impacts.

 

We pay close attention to today’s threat landscape and tailor our solutions to be adaptive to its changes. We provide a deeper level of monitoring and management focused on your network and data security to assure your data, intellectual property, and operations are compliant and secure.

With over 20 years of experience, we have built an entire suite of comprehensive protection measures made to keep you and your business protected against cybercrime. 

Find Out How your Current Cybersecurity Network Compares to the Released Cybersecurity Performance Goals

Use the form below to get started with your assessment. 

UNSURE OF YOUR BUSINESS NEEDS? GIVE US A CALL.

We will examine your current IT infrastructure and recommend a solution that fits.

Our Blog

Our Blog