U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

NIST IR 8286 (2nd Public Draft)

Integrating Cybersecurity and Enterprise Risk Management (ERM)

Date Published: July 2020
Comments Due: August 21, 2020 (public comment period is CLOSED)
Email Questions to: nistir8286@nist.gov

Planning Note (08/06/2020):

See Supplemental Material for JSON files representing the Cybersecurity Risk Register and Enterprise Risk Register that are detailed in the Draft NISTIR. For each risk register, there is a short form and long form file, and an example file.

 


Author(s)

Kevin Stine (NIST), Stephen Quinn (NIST), Gregory Witte (Huntington Ingalls Industries), Robert Gardner (New World Technology Partners)

Announcement

All enterprises should ensure cybersecurity risk gets the appropriate attention within their enterprise risk management (ERM) programs, which address all types of risk. Individual organizations within an enterprise can improve the cybersecurity risk information they provide as inputs to their enterprise's ERM processes. By doing so, enterprises and their component organizations can better identify, assess, and manage their cybersecurity risks in the context of their broader mission and business objectives.
 
Draft (2nd) NISTIR 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM) promotes greater understanding of the relationship between cybersecurity risk management and ERM, and the benefits of integrating those approaches. This second public draft of NISTIR 8286 contains the same main concepts as the initial public draft, but their presentation has been revised to clarify the concepts and address other comments from the public.

NOTE: A call for patent claims is included on page v of this draft.  For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.

Abstract

Keywords

cybersecurity risk management; cybersecurity risk measurement; cybersecurity risk profile; cybersecurity risk register; enterprise risk management (ERM); enterprise risk profile
Control Families

None selected