From the course: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Define your profile

Define your profile

- [Instructor] Once you have a notional idea of your tier, it can be beneficial to start writing down the details of what you're doing and what you'd like to improve. This information is best captured in a profile. A profile provides a mechanism for capturing the current and target state of your business's cybersecurity capabilities. In our earlier video on leveraging the cybersecurity framework, we talked about how to start building out a target profile by evaluating and defining internal business requirements based on your cyber risks and external requirements driven by compliance, regulatory, and contractual requirements. Here I'd like to dig into creating a current state profile. There's no right or wrong way to create a profile as long as the information is helpful to you for understanding, tailoring, assessing, prioritizing, or communicating cybersecurity outcomes. Profiles can be created leveraging the framework's functions, categories, or subcategories. They can be composed of…

Contents