Cyberscecurity: A Step-by-Step Self-Assessment Is Necessary (A Review)

Share:
Cybersecurity
Image Source: PYMNTS.com
 
Cybersecurity is a hot topic in technology today as it affects virtually every aspect of technology as it interplays with different industries and sectors.

With data breaches and privacy concerns becoming major concerns for companies, enterprises, governments and individuals, having a self-assessment of one's cybersecurity status is of utmost importance.

Gratefully, cybersecurity expert Gerard Blokdijk has done an awesome job in putting together a step-by-step process and tool that can help any organization or individual develop a detailed vision of all areas impacted by a Cybersecurity implementation.

Gerard's Cybersecurity guide is something that many organizations that have experienced breaches and data loses would wish they had it when they needed it! It is a very useful tool for scoring readiness and implementation quality.

It highlights what's important now and in the future for the reader and delivers a Cybersecurity roadmap to instantly understand and move forward in the right direction, based on verifiable data.

Recommended Reading:

5 Key Aspects To Cybersecurity For Enterprises and Organizations

 
Cybersecurity Self-Assessment Guidebook

Just to give an insight into what you can expect to get from Gerard's Cybersecurity Self-Assessment book, here is an excerpt of 10 key standard cybersecurity requirements that must be on your checklist:

1. Industry standards enforce legislation that utilities must meet, and these standards do not come cheaply. Standards require additional resources in the form of employees, hours, and technology, all of which increases the cost of providing reliable electricity to the customer. Therefore, the standards of Cybersecurity that protect the customer are then ultimately paid by the customer. So what are these standards and who sets them?

2. There are two philosophical approaches to implementing Cybersecurity on an intelligent, networked grid: create a checklist of actions to take that address known security problems or prioritize actions based on continually refreshing the answer to the question, ñWhat makes my system more secure? Which approach do wo take?

3. What collaborative organizations or efforts has your company interacted with or become involved with to improve its Cybersecurity posture (such as NESCO, NESCOR, Fusion centers, Infragard, US-CERT, ICS-CERT, E-ISAC, SANS, HSIN, the Cross-Sector Cyber Security Working Group of the National Sector Partnership, etc.)?

4. Not all cyber-connected assets are essential to protect at all cost. Some assets, however, are "crown jewels" worth protecting at all costs. Other assets may be more like paperclips where the expense of protection exceeds the benefit. How do you tell the difference?

5. Does your organization perform vulnerability assessment activities as part of the acquisition cycle for products in each of the following areas: Cybersecurity, SCADA, smart grid, internet connectivity, and website hosting?

Recommended Reading: 

Basic Cybersecurity Rules to Ensure Online Safety for Internet Users


6. What is the framework we use for general Cybersecurity certifications that integrate both knowledge and skill while predicting constraints of innate abilities on performance, and do we need specific certifications?

7. Describe the company's current practices that are used to protect proprietary information and customer privacy and personal information. Does the company have an information classification and handling policy?

8. What domains of knowledge and types of Cybersecurity-associated skills and abilities are necessary for engineers involved in operating industrial processes to achieve safe and reliable operating goals?

9. Are you aware of anyone attempting to gain information in person, by phone, mail, email, etc., regarding the configuration and/or cyber security posture of your website, network, software, or hardware?

10. Describe your organization's policies and procedures governing risk generally and Cybersecurity risk specifically. How does senior management communicate and oversee these policies and procedures?


Gerard's new book is available at Amazon, Barnes and Noble and all major retailers later this month, the full info can be found at https://store.theartofservice.com/Cybersecurity-standard-requirements/ right now.


The Art of Service's Cybersecurity Standard Requirements Excel Dashboard and accompanying eBook is for managers, advisors, consultants, specialists, professionals and anyone interested in Cybersecurity assessment. 


Connect with Gerard Blokdijk, CEO,The Art of Service on LinkedIn here: https://www.linkedin.com/in/gerardblokdijk

Visit his blog at: 
https://theartofservice.com

Reach him via Email:
gerard.blokdijk@theartofservice.com