Enhancing Security: NIST CSF/ISO 27001 Assessment

Enhancing Security: NIST CSF/ISO 27001 Assessment

Case Study: How refreshing a fast-paced technology company’s Security Scorecard lead improved adherence to NIST CSF 2 and ISO 27001

Introduction: In today’s lightning fast digital ecosystem, technological advancement brings with it an ever growing array of cybersecurity threats. For a leading technology company in Palo Alto, California, this has presented an ongoing challenge to assess their security posture in order to safeguard their assets and maintain the trust of their stakeholders. Recognizing this challenge, the business embraced a proactive approach to cybersecurity and made the decision to have an updated security assessment performed.

For a period of eight weeks, the Infoedge Team reviewed the previous ISO 27001 and NIST CSF assessment. We then conducted our own evaluation of their controls and mandatory requirements, analyzing each category and domain. We crafted a comprehensive assessment report, highlighting average maturity levels and showcasing the improvements in a board-friendly security scorecard. Our efforts continued as we documented areas for improvements and summarized observations in an executive report that adhered to our established “scorecards” approach.

Assessment: We collaborated closely with the software company and its C-level executives, and during this time, we reviewed the company’s security controls, documentation and security practices. Building on previous evaluations, we reviewed security controls, documentation, and security practices. Leveraging the ISO 27001 and NIST CSF standards, we were able to analyze each category and domain, mapping out the strengths and weaknesses.

Results: The culmination of the assessment process gave valuable insights into the company’s security posture. Through detailed reports and user friendly scorecards, we highlighted areas of excellence and identified areas that needed enhancement. From improving risk management practices to updating security training programs, the recommendations provided a roadmap to assist the business in improving its security posture.

Scorecard: We updated the security scorecard to assess how well the company’s defenses are working. These scorecards not only assessed compliance with industry standards, but also measured the functionality of security measures in place. With this information the company could prioritize resources effectively, mitigating risks and proactively addressing emerging threats.

Conclusion: By embracing a proactive approach to security, the business can now more effectively navigate their digital landscape with confidence. The recent refinements to the scorecard significantly improved its credibility and effectiveness, lending greater authority to its findings and recommendations. Presenting these insights to the Board of Directors was an important step, and they were well received. The refined scorecard, along with the updated outputs, clearly highlighted both the areas of significant progress and those needing improvement. This reaffirmed the importance of their ongoing efforts to strengthen their security measures.

Author

Taking the Temperature on AI’s Impact on Cybersecurity in 2024

A cornucopia of infosec insights to chew on these Holidays. In this episode, we carve up concerns around increased specialization and silos forming between red, SecOps, and compliance teams. How can we foster collaboration across the table? What creative recipes can blend different tools into a unified platform? And how can enterprises and SMBs alike ensure all voices are heard before the tryptophan kicks in? 

Please pull up a chair and fill your plate with our expert insights from Mark Holtz (Software Engineering at Socotra) and Jeremy Embalabala (CISO at Hub International Limited).

Continue reading

Giving Thanks for Collaboration: Stuffing Your Infosec Turkey

A cornucopia of infosec insights to chew on these Holidays. In this episode, we carve up concerns around increased specialization and silos forming between red, SecOps, and compliance teams. How can we foster collaboration across the table? What creative recipes can blend different tools into a unified platform? And how can enterprises and SMBs alike ensure all voices are heard before the tryptophan kicks in? 

Please pull up a chair and fill your plate with our expert insights from Mark Holtz (Software Engineering at Socotra) and Jeremy Embalabala (CISO at Hub International Limited).

Continue reading

Stranger Rules: The Upside Down of SECurity Cyber Materiality

In the evolving digital landscape, information security has never been more paramount. With the recent unveiling of the SEC’s updated information security rules, leaders in the field must recalibrate their strategies and adapt. We are honored to have Elwin Wong, Senior Vice President & Chief Information Security Officer (CISO) at Ross Stores, Inc., as our distinguished speaker for this session. Join us on Oct 25th for an enlightening webcast that delves deep into these changes, presented by a leader in the realm of information security. Gain insights and understand how to not only comply but also enhance your organization’s overall security posture.

Continue reading

Securing the Machine Learning Lifecycle

Machine learning models have powered web applications and various services for years, offering recommendations to end users or helping to automate business process decisions for backend corporate analysts. With the current Generative AI hype, enterprises have directed more focus and attention to how they can employ machine learning (ML) and artificial intelligence (AI) more broadly to introduce greater efficiencies and improve customer experiences.

Continue reading

Impacts of Generative AI on Information Security

This field is young and rapidly evolving. GPT-4, which was only made available in March 2023, is a major advancement over ChatGPT’s engine. New insights on these reverberating impacts are being discovered all the time and will continue to come to light as we move forward. That being said, there are some emerging concepts to be aware of and help shape your specific and our collective approach to managing risk.

Continue reading