If all organizations utilize all three components of Framework’s system, they minimize their chances of experiencing security breaches and assessing their risks and data management more efficiently. Specifically, by developing a Target Profile using the Tiers scale, it will “influence prioritization within a Target Profile and assessments of progress in addressing gaps,” (Cybersecurity Framework, pg. 9).
If I were to use this Framework for my future workplace, I would identify my companies cybersecurity goals, missions, and potential outcomes with the Core categories and subcategories and make a Current and Target Profile to track the company’s progress while prioritizing the Tiers scale to set an overall tone for the company’s cybersecurity goals.