At this very moment someone, somewhere in the world may be plotting to hack into an organization’s critical network infrastructure.
Creativity, time and investment are never in short supply when determined attackers are intent on gaining access to networks. It’s created an environment whereby solutions to prevent attacks are being developed just after new hacking tactics are deployed. To solve this divergence, we need to focus on “cyber at machine speed” — implementing new tools simultaneously with or even before hackers.
In short, getting the basics right is no longer enough. Adversaries now have the tools, the motivation and certainly the persistence to overcome current standards and compliance protocols.
Simply put, adequacy is no longer adequate.
Keep reading this article at: https://www.nextgov.com/ideas/2018/12/new-rules-cybersecurity/153714/
See GTPAC’s video, template and other resources designed to help contractors comply with the DoD/NIST cybersecurity rules at: http://gtpac.org/cybersecurity-training-video/