NIST cybersecurity framework

GPTKB entity

Statements (65)
Predicate Object
gptkbp:instance_of gptkb:Company
gptkbp:bfsLayer 4
gptkbp:bfsParent gptkb:National_Cybersecurity_Strategy
gptkbp:adapted_into different organizational needs
gptkbp:aims_to improve cybersecurity risk management
gptkbp:based_on existing standards and guidelines
gptkbp:collaborated_with academic institutions
industry experts
gptkbp:consists_of five core functions
gptkbp:developed_by gptkb:Research_Institute
gptkbp:encourages collaboration among stakeholders
gptkbp:facilitates communication about cybersecurity risks
https://www.w3.org/2000/01/rdf-schema#label NIST cybersecurity framework
gptkbp:includes Protect
Recover
Identify
Detect
Respond
gptkbp:is_adopted_by non-profit organizations
international organizations
various industries
critical infrastructure sectors
gptkbp:is_aligned_with international standards
national security objectives
gptkbp:is_designed_for organizations of all sizes
gptkbp:is_documented_in gptkb:NIST_Special_Publication_800-171
gptkb:NIST_Special_Publication_800-37
gptkbp:is_evaluated_by third-party assessments
cybersecurity assessments
cybersecurity audits
cybersecurity maturity assessments
cybersecurity benchmarks
gptkbp:is_incorporated_in cybersecurity policies
gptkbp:is_influenced_by gptkb:ISO/_IEC_27001
gptkbp:is_informed_by cybersecurity research
gptkbp:is_integrated_with business continuity plans
other risk management frameworks
gptkbp:is_part_of gptkb:NIST_Special_Publication_800-53
gptkbp:is_promoted_by government initiatives
workshops and seminars
publications
cybersecurity conferences
cybersecurity organizations
gptkbp:is_referenced_in executive orders
cybersecurity legislation
gptkbp:is_related_to cybersecurity best practices
gptkbp:is_reviewed_by stakeholders
gptkbp:is_supported_by online resources
training resources
government funding
cybersecurity frameworks
NIST Cybersecurity Framework Toolkit
gptkbp:is_used_by government agencies
private sector organizations
gptkbp:is_used_for compliance purposes
gptkbp:is_used_to assess cybersecurity posture
gptkbp:is_utilized_in incident response planning
cybersecurity training programs
risk assessment processes
gptkbp:provides guidance for organizations
a common language for cybersecurity
gptkbp:published_by gptkb:2014
gptkbp:supports risk management
gptkbp:updates gptkb:2020
gptkbp:volunteer_opportunities gptkb:theorem