Summary is AI-generated, newsdesk-reviewed
  • NIST provides a cybersecurity framework with five key functions: Identify, Protect, Detect, Respond, Recover.
  • Homeland Security offers resources for reducing cybersecurity risk and promoting information sharing.
  • Visit Comparitech for a comprehensive list of cybersecurity resources, tools, and guides.

There are resources to help guide an organization’s management of cybersecurity risks, most prominently from the National Institute of Standards and Technology (NIST) and the U.S. Department of Homeland Security.

NIST defines cybersecurity as "the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.”

NIST has developed a framework to provide voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk. The NIST Framework Core consists of five concurrent and continuous functions:

  • Identify. Understand how to manage cybersecurity risks.

  • Protect. Put safeguards in place to protect assets and deter threats.

  • Detect. Monitor continuously.

  • Respond. Devise an action plan to react promptly in case of a cyberattack.

  • Recover. Maintain resilience and recover capabilities after a cyber-breach.

In addition to helping organizations manage and reduce risks, the framework was designed to foster communications about risk and cybersecurity management among both internal and external organizational stakeholders.

The Department of Homeland Security offers a wealth of resources to guide businesses to minimize cybersecurity risk, to promote information sharing, and to develop new and innovative solutions to cybersecurity problems.

For a list of cybersecurity resources, including tools and guides, please visit www.comparitech.com

For more on cybersecurity in the IP video market, check out SourceSecurity.com’s Exclusive Technology Report: Meeting the Cybersecurity Challenge of IP Video Systems, available here.

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...