Skip to main content

We are waiving Fall 2023 application fees! Apply by July 31.

Responding to Cyberattacks: Policy Frameworks for Rapid Incident Response

Cyberspace has no borders, prompting government agencies and industry peers to develop collaborative strategies and frameworks to protect data and networks and detect and recover from breaches. However, according to IBM, adopting those frameworks presents a challenge to cybersecurity leadership, as “organizations struggle to develop and maintain the necessary cybersecurity talent to detect, prevent and respond to advanced attacks.”

The talent-gap impact is reflected in a recent study that found nearly 3 out of 4 companies surveyed reported cyberbreaches in 2019. The same survey found that almost 70% attributed the security failures to their inability to recruit, hire and retain security professionals.

How Do Professionals Prepare for Future-proof Careers in Cybersecurity?

Implementing cybersecurity frameworks (CSF) at the organizational level requires security professionals who understand concepts and principles of threats, vulnerabilities and controls. An advanced degree program that provides foundational cybersecurity skills helps professionals meet industry demand.

The University of Illinois Springfield (UIS) online Master of Science (MS) Cybersecurity Management program offers an Information Security course that provides this foundational expertise. The program dives into evolving issues surrounding governance and strategic policy creation, risk management and contingency planning. Graduates are equipped for top-level roles such as chief information security officer and cybersecurity management consultant.

Who Develops Collaborative Strategies for Mitigating Cyber Risks?

Dozens of global private-public partnerships establish CSF blueprints and provide organizations with best practices to assess their current security policies and processes, measure their effectiveness and identify vulnerabilities and opportunities for improvement. Framework adoption is voluntary, however.

Some governments — notably the European Union, North Korea and the People’s Republic of China — have stringent internet regulations separate from CSF. The National Institute of Standards and Technology (NIST), an agency within the U.S. Department of Commerce, recently released an update to its existing framework. The new CSF 2.0 comprises a library of reference material that organizations can tailor to suit their cybersecurity needs. The adaptability also helps prepare for compliance and other IT audits.

“The new 2.0 edition is designed for all audiences, industry sectors and organization types, from the smallest schools and nonprofits to the largest agencies and corporations — regardless of their degree of cybersecurity sophistication,” NIST notes.

The agency emphasizes how the advanced framework strengthens its existing recommendations to enable organizations to:

  • Identify, assess and prioritize cybersecurity risks more effectively
  • Allocate resources more efficiently to optimize risk management processes
  • Build dynamic threat-detection, response to breaches and recovery from them
  • Communicate within the organization and with business partners
  • Improve stakeholder understanding and engagement
  • Drive ongoing optimization by leveraging its flexible, adaptive structure

The shift to NIST CSF 2.0 “can be transformative for organizations of various sizes and sectors. It highlights the need for a strong cybersecurity stance in line with contemporary challenges and technological advancements,” according to Drata.

Why Are Organizations Adopting Proactive Incident Response and Cyberattack Preparedness Policies?

Cybercriminals’ global reach and success in exploiting targeted vulnerabilities have meant security professionals consider breaches inevitable. Frameworks, therefore, are placing additional emphasis on detecting and recovering from attacks on databases, networks, system files, configurations, user files, application code and customer data.

For instance, the National Cybersecurity Center of Excellence (NCCoE) collaborated with private sector enterprises to test data integrity challenges and model the NIST framework’s potential for detecting, mitigating and containing intrusions. The model provides guidance for establishing preparedness and incident response policies that:

  • Develop an enterprise-wide understanding of reducing cyber risk to systems, assets, data and people
  • Implement safeguards that ensure delivery of critical digital services
  • Establish policies and procedures at all organizational levels to identify breaches
  • Educate all personnel on channels for reporting cybersecurity incidents
  • Develop and implement strategies for business continuity in the aftermath of a breach

“Applying the Cybersecurity Framework to data integrity, this practice guide informs organizations of how to quickly detect and respond to data integrity attacks by implementing appropriate activities that immediately inform about the data integrity events,” the NCCOE explains.

The online MS Cybersecurity Management program from UIS gives students the detection and response skills to protect their organizations from cyberthreats.

Learn more about the University of Illinois Springfield’s online Master of Science Cybersecurity Management program.

Our Commitment to Content Publishing Accuracy

Articles that appear on this website are for information purposes only. The nature of the information in all of the articles is intended to provide accurate and authoritative information in regard to the subject matter covered.

The information contained within this site has been sourced and presented with reasonable care. If there are errors, please contact us by completing the form below.

Timeliness: Note that most articles published on this website remain on the website indefinitely. Only those articles that have been published within the most recent months may be considered timely. We do not remove articles regardless of the date of publication, as many, but not all, of our earlier articles may still have important relevance to some of our visitors. Use appropriate caution in acting on the information of any article.

Report inaccurate article content:

Request more information

Submit this form, and an Enrollment Specialist will contact you to answer your questions.

  • This field is for validation purposes and should be left unchanged.

Or call 888-905-1171

Begin Application Process

Start your application today!
or call 888-905-1171 888-905-1171
for help with any questions you may have.