{"id":291,"date":"2025-09-22T03:26:20","date_gmt":"2025-09-22T03:26:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/davidkenon\/?p=291"},"modified":"2025-09-22T03:26:20","modified_gmt":"2025-09-22T03:26:20","slug":"discussion-board-the-nist-cyber-security-framework","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/davidkenon\/2025\/09\/22\/discussion-board-the-nist-cyber-security-framework\/","title":{"rendered":"Discussion Board: The NIST Cyber Security Framework"},"content":{"rendered":"\n<p>When I delved into pages 1\u201321 of the NIST Cybersecurity Framework, a key insight emerged: the framework transcends mere security\u2014it emphasizes structure and communication. It distills the vast and daunting realm of cybersecurity into five straightforward functions: Identify, Protect, Detect, Respond, and Recover. This simplification is a significant advantage for organizations, as it provides a unified language. Executives, managers, and IT staff can align on risk assessments, avoiding miscommunication.<\/p>\n\n\n\n<p>Another notable benefit is the framework\u2019s flexibility. It isn\u2019t a rigid checklist but rather a dynamic guideline that organizations can customize to suit their specific needs. This adaptability is crucial because a large corporation and a small business face different risk levels and possess varying resources. Nonetheless, both can evaluate themselves against the same standard using NIST.<\/p>\n\n\n\n<p>However, I must consider a potential downside: frameworks like this may appear flawless on paper, yet real-world workplaces can be chaotic. Steps might be overlooked, budgets slashed, and leadership might declare security a \u201cpriority\u201d while prioritizing convenience over protection. In such cases, the framework risks becoming merely a decorative poster rather than an actionable practice. The challenge lies in ensuring it doesn\u2019t remain confined to a binder.<\/p>\n\n\n\n<p>In my future workplace, I aspire to utilize NIST not just as a guideline but as a culture-builder. For instance, I would focus on training employees in simple terms, illustrating how their daily actions\u2014such as reporting phishing emails or locking devices\u2014connect to those five functions. When individuals see themselves reflected in the framework, it is more likely to resonate. If it resonates, people are more inclined to recognize its success in their work and environment. Beyond that, I\u2019d advocate for leadership accountability, ensuring executives live by the same standards they expect from staff. A framework only works when everyone, from the top down, commits to it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I delved into pages 1\u201321 of the NIST Cybersecurity Framework, a key insight emerged: the framework transcends mere security\u2014it emphasizes structure and communication. It distills the vast and daunting realm of cybersecurity into five straightforward functions: Identify, Protect, Detect, Respond, and Recover. This simplification is a significant advantage for organizations, as it provides a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/davidkenon\/2025\/09\/22\/discussion-board-the-nist-cyber-security-framework\/\">Read More<\/a><\/div>\n","protected":false},"author":31510,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/users\/31510"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/davidkenon\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}