In the 1990s, government agencies, industry groups, and cybersecurity researchers started creating cybersecurity standards, and these standards led to cybersecurity regulations and laws that dictate to organizations what they must do to protect their data. Today, there are dozens of standards dictating thousands of cybersecurity controls that organizations can consider when building their cybersecurity plans. Every year more standards are released, and the confusion grows. To make the problem even more challenging, no two standards are the same, nor do they even cover the same scope of defenses.
This reality has led to confusion and frustration for organizations seeking to build comprehensive cybersecurity programs. What should we do, what can we do, or what must we do to protect our information systems? Until recently, there has not been a Cyber Rosetta Stone for security and privacy professionals to use to compare these standards. Most organizations have limited resources and must choose which controls to implement and which to ignore. We haven't had risk or threat models to demonstrate why specific cybersecurity controls are essential and what should be prioritized.
In this webcast, James Tarala, Senior Faculty at the SANS Institute and Principal Consultant at Enclave Security, will explain the state of cybersecurity standards in 2023 with a scorecard comparison of popular standards based on specific, measurable research. This presentation is an annual report which will focus primarily on the changes to the cybersecurity standards space over the past year. He will also introduce a Cyber Rosetta Stone that simplifies building cybersecurity control libraries across all the standards. Attendees will leave this webcast with a clear understanding of the differences and gaps in cybersecurity standards that will support their informed decisions about which standards to use when building their cybersecurity programs.
Learning Objectives:
The content of this webcast supports materials and concepts from LDR419: Performing a Cybersecurity Risk Assessment, and SEC566: Implementing and Auditing CIS Controls.