If all organizations utilize all three components of Framework’s system, they minimize their chances of experiencing security breaches and assessing their risks and data management more efficiently. Specifically, by developing a Target Profile using the Tiers scale, it will “influence prioritization within a Target Profile and assessments of progress in addressing gaps,” (Cybersecurity Framework, pg….