NIST Cybersecurity Framework Adoption Hampered By Costs, Survey FindsNIST Cybersecurity Framework Adoption Hampered By Costs, Survey Finds
Security pros consider the NIST framework an industry best practice, yet half of its adopters say its complete implementation involves a high level of investment.
March 30, 2016
US organizations say the major investment required in fully implementing the NIST Cybersecurity Framework is hampering their full adoption of it, according to a survey report released by Tenable Network Security.
The Trends in Security Framework Adoption Survey, which includes responses from around 300 US IT and security pros, was conducted to determine patterns in the adoption of various security frameworks. A majority of organizations (84%) have at least one security framework in place.
While the survey data reveals that 70% organizations view NIST's framework as a security best practice, 50% see the high level of investment that it requires as a barrier to adoption. The NIST framework was the most popular choice of security frameworks to be implemented over the next year, the study found.
Some 64% of organizations are using part of the NIST framework and not all of the recommended controls due to the cost and lack of regulatory pressures. Also, 83% of those planning to adopt the NIST framework in the coming year say they will take a similar approach--adopting some and not all of the CSF controls.
"Historically, CISOs have been hesitant to take full advantage of the NIST Cybersecurity Framework because of a high investment requirement and a lack of regulatory mandate," said Ron Gula, CEO of Tenable. "This is changing as organizations begin to shift their mindset from moment-in-time compliance with frameworks like PCI DSS to continuous conformance with the NIST Cybersecurity Framework."
Read more from the report here.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023