Cybersecurity

GPTKB entity

Statements (184)
Predicate Object
gptkbp:instance_of gptkb:Cybersecurity
gptkb:software_framework
gptkbp:aims_to improve cybersecurity risk management
gptkbp:aims_to_improve cybersecurity risk management
gptkbp:applies_to gptkb:organization
organizations of all sizes
gptkbp:collaborated_with academic institutions
industry stakeholders
government entities
gptkbp:consists_of gptkb:Graphics_Processing_Unit
gptkb:Inspector
Implementation Tiers
gptkbp:developed_by gptkb:National_Academy_of_Sciences
gptkbp:encourages gptkb:collaboration
Self-Assessment
continuous improvement
collaboration among stakeholders
gptkbp:facilitates gptkb:communication
communication about cybersecurity risks
https://www.w3.org/2000/01/rdf-schema#label Cybersecurity
gptkbp:includes gptkb:Risk_Management
best practices
Assessment Procedures
five core functions
Detect Function
Identify Function
Protect Function
Recover Function
Respond Function
Cybersecurity Controls
gptkbp:is_adopted_by gptkb:educational_institutions
Small Businesses
government agencies
non-profit organizations
international organizations
private sector organizations
critical infrastructure sectors
Critical Infrastructure Sectors
gptkbp:is_aligned_with gptkb:NIST_SP_800-53
gptkb:ISO/_IEC_27001
gptkbp:is_based_on existing standards
Risk Management Principles
existing standards and guidelines
gptkbp:is_compliant_with gptkb:NIST_SP_800-53
gptkb:ISO/_IEC_27001
CIS Controls
gptkbp:is_designed_for organizations of all sizes
All Organizations
cybersecurity improvement
gptkbp:is_enhanced_by stakeholder feedback
gptkbp:is_evaluated_by Performance Metrics
Surveys
Stakeholders
effectiveness
Case Studies
efficiency
Feedback Mechanisms
incident reports
risk assessments
adaptability
performance indicators
audit results
self-assessments
third-party assessments
cybersecurity assessments
cybersecurity metrics
organizations' cybersecurity posture
gptkbp:is_guided_by gptkb:Risk_Management
gptkbp:is_influenced_by gptkb:Executive_Order_13636
gptkb:Presidential_Policy_Directive_21
gptkbp:is_often_used_in international organizations
gptkbp:is_part_of gptkb:Cybersecurity
NIST Cybersecurity Program
NIST's Cybersecurity Program
U. S. federal policy
gptkbp:is_promoted_by gptkb:NIST_Cybersecurity_Center_of_Excellence
gptkb:U._S._government
gptkb:NIST
government initiatives
academic institutions
consulting firms
professional associations
industry associations
industry groups
cybersecurity organizations
gptkbp:is_promoted_through gptkb:Workshops
gptkb:Publications
Conferences
Webinars
training programs
workshops
conferences
webinars
gptkbp:is_recognized_as internationally
gptkbp:is_referenced_in gptkb:legislation
industry standards
cybersecurity regulations
executive orders
various cybersecurity regulations
gptkbp:is_reviewed_by gptkb:military_personnel
cybersecurity experts
gptkbp:is_supported_by gptkb:assessment_tools
gptkb:NIST_Cybersecurity_Framework_for_Chemical_Sector
gptkb:NIST_Cybersecurity_Framework_for_Communications_Sector
gptkb:NIST_Cybersecurity_Framework_for_Financial_Services
gptkb:NIST_Cybersecurity_Framework_for_Io_T
gptkb:NIST_Cybersecurity_Framework_for_Water_Sector
gptkb:Federal_Government
gptkb:NIST_Cybersecurity_Framework_Manufacturing_Profile
gptkb:NIST_Special_Publications
International Organizations
Industry Partners
Training Resources
training resources
Implementation Guides
implementation guides
NIST Cybersecurity Framework for Small Business
NIST Cybersecurity Framework for Supply Chain Risk Management
NIST Cybersecurity Framework Cybersecurity Framework for Small Business
NIST Cybersecurity Framework for Energy Sector
NIST Cybersecurity Framework for Healthcare
NIST Cybersecurity Framework for Transportation Sector
NIST Cybersecurity Framework for Critical Infrastructure
NIST Cybersecurity Framework for Cloud Computing
NIST Cybersecurity Framework for Privacy
gptkbp:is_updated_by gptkb:NIST
gptkb:2020
periodically
gptkbp:is_used_by small businesses
organizations
gptkbp:is_used_for gptkb:Compliance_Management
gptkb:administration
gptkb:training
Policy Development
compliance with regulations
incident response planning
Awareness Programs
cybersecurity training
cyber risk assessment
security program development
gptkbp:is_used_in critical infrastructure sectors
gptkbp:is_utilized_in training programs
incident response planning
policy development
strategic planning
risk assessments
compliance audits
business continuity planning
cybersecurity assessments
security program development
gptkbp:operational_use different industries
to different types of organizations
gptkbp:promotes gptkb:Best_Practices
gptkbp:provides Flexibility
Common Language
a common language for cybersecurity
a framework for managing cybersecurity risk
guidance for managing cybersecurity risk
gptkbp:provides_guidance_on gptkb:Risk_Management
Incident Response
Continuous Monitoring
identifying risks
responding to incidents
protecting assets
detecting incidents
recovering from incidents
gptkbp:published_in gptkb:2014
February 12, 2014
gptkbp:purpose to provide a policy framework of computer security guidance
Improve cybersecurity risk management
to provide a policy framework of computer security guidance for how private sector organizations can assess and improve their ability to prevent, detect, and respond to cyber attacks
gptkbp:released_on February 12, 2014
gptkbp:supports gptkb:Risk_Management
risk management
risk management processes
Cyber Risk Management
gptkbp:updates April 2018
gptkbp:used_by Government Agencies
Non-Profit Organizations
Private Sector
organizations
gptkbp:volunteers for organizations
gptkbp:bfsParent gptkb:Massachusetts_Institute_of_Technology
gptkbp:bfsLayer 2