The Cybersecurity Coalition unveiled this “Building a National Cybersecurity Strategy Voluntary Flexible Frameworks White Paper” at the inaugural CyberNext DC.
This paper begins with an overview of the cyber threat landscape. It is important to understand harmful consequences of cyberattacks as well as how the prevalence of new technologies, including the “Internet of Things,” has increased the number of opportunities for cyberattacks. The volume and diversity of cyber threats underscores the importance of developing a framework that is voluntary, flexible, and broadly adopted across organizations of all sizes, and stakeholders at all levels.
Understanding the challenges of effective cyber risk management, it is instructive to consider international models of a national cyber risk management framework to determine which practices have been successful. This paper examines the United States, Italy, the United Kingdom, and Australia as case studies that highlight the most critical components of an effective cybersecurity framework.
Read the White Paper here: CyberNextDC Voluntary, Flexible Frameworks White Paper (cybersecuritycoalition.org)
Author: Cyber Threat Alliance
Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable
Cyberattacks are frequently becoming ‘cyber events’ with systemic impact. How can governments and businesses respond?
Preparing for New Incident Reporting Requirements
Mandatory cyber incident reporting is being extended to many more organizations. Those already subject to these regulations face new, more stringent, requirements. Engaging proactively with government agencies and your own incident response and legal partners will make mandatory incident reporting as frictionless as [...]
An Update on the State of the SEC’s Approach to Cyber Risk
This update follows the March 2021 State of Cyber-Risk Disclosures of Public Companies. Recent cyber-related comments and enforcement actions by the U.S. Securities and Exchange Commission made clear that the SEC has escalated its scrutiny of the cybersecurity disclosures of [...]