CYBER SECURITY FRAMEWORK

WITH THREAT PROTECT

LEVERAGE THE FRAMEWORK THAT’S BEEN GUIDING US FOR YEARS

We can help businesses reap the numerous benefits of the NIST framework – an initiative that’s been helping protect businesses and government organisations for years.

EFFECTIVE, MULTI-FACETED CYBERSECURITY

MOVE FORWARD WITH A PRIORITISED, FLEXIBLE, REPEATABLE, PERFORMANCE-BASED, AND COST-EFFECTIVE APPROACH TO CYBERSECURITY RISKS.

FOUNDED BY
GOVERNMENT THINKTANKS

Your network is a rich source of data. It's also an ever-expanding source of risk. WE HELP IMPROVE THE SPEED FOR REMEDIATION, NOT ONLY DO WE DETECT AND RESPOND TO THREATS, WE PREVENT THEM.

WHEN THREAT PROTECT IMPLEMENTS THIS CYBERSECURITY FRAMEWORK AT YOUR BUSINESS, YOU’LL JOIN THE RANKS OF GOVERNMENT ORGANISATIONS AND CORPORATE GIANTS THAT HAVE BEEN LEVERAGING NIST FOR THEIR LONG-TERM PEACE OF MIND.

JOIN
THE ELITE

SECTION ONE: THE FRAMEWORK CORE

The core is "a set of activities to achieve specific cybersecurity outcomes, and references examples of guidance to achieve those outcomes." It is further broken down into four elements: functions, categories, subcategories, and informative references.

Identify

An understanding of the cyber security risks in relation to systems, assets, data, and capabilities.

Protect

Measures to protect and maintain critical infrastructure services.

Detect

Processes to identify the occurrence of a cyber security event.

Respond

Arrangements to act regarding the detection of a possible cyber security event.

Recover

Plans and restoration procedures to reinstate capabilities or services impaired due to a cybersecurity event.

SECTION TWO: THE PROFILES

Profiles are both outlines of an organisation's current cybersecurity status and roadmaps toward CSF goals. NIST said having multiple profiles both current and goal can help an organisation find weak spots in its cybersecurity implementations and make moving from lower to higher tiers easier.

Profiles also help connect the functions, categories, and subcategories to business requirements, risk tolerance, and resources of the larger organisation it serves. Think of profiles as an executive summary of everything done within the CSF.

CURRENT PROFILE

A true reflection of your business security posture

TARGET PROFILE

How your business could use the Framework to create a new cybersecurity position

SECTION THREE: IMPLEMENTATION TIERS

There are four tiers of implementation, and while CSF documents don't consider them maturity levels, the higher tiers are considered more complete implementation of CSF standards.

Tier 1: Partial

Risk Management Process, Integrated Risk Management Program, External Participation, Cyber Supply Chain Risk Management

Tier 2: Risk Informed

Risk Management Process, Integrated Risk Management Program, External Participation

Tier 3: Repeatable

Risk Management Process, Integrated Risk Management Program, External Participation

Tier 4: Adaptive

Risk Management Process, Integrated Risk Management Program, External Participation

ACHIEVE CYBER RESILIENCE

PROTECT AND SURVIVE THE GROWING THREAT LANDSCAPE

WANT TO RECEIVE NEWS ON THE LASTEST THREATS AND TRENDS

Sign up to receive the latest developments and news in the industry.

For information about how we handle your data, please read our privacy notice

TOP