{"id":3038,"date":"2021-10-25T14:23:03","date_gmt":"2021-10-25T14:23:03","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3038"},"modified":"2021-10-26T12:33:25","modified_gmt":"2021-10-26T12:33:25","slug":"nist-releases-guidelines-for-managing-the-ransomware-risk","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/","title":{"rendered":"NIST Releases Guidelines for Managing the Ransomware Risk"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>The National Institute of Standards and Technology (NIST) has released the <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8374\/draft\" target=\"_blank\" rel=\"noopener\">revised draft of NISTIR 8374<\/a> that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events. The Ransomware Profile is intended for a general audience. Organizations such as small to medium-sized businesses (SMBs) and operators of industrial control systems (ICS) or operational technologies (OT) may also leverage this guidance and the Cybersecurity Framework.<\/p>\n<h2>The Need for Concise Guidelines<\/h2>\n<p>This publication comes at a time when cybersecurity incidents and ransomware attacks against critical infrastructures are at all-time high. As <a href=\"https:\/\/industrialcyber.co\/article\/nist-cybersecurity-framework-prescribes-ransomware-risk-management-across-ics-ot-environments\/\" target=\"_blank\" rel=\"noopener\">Anna Ribeiro reported<\/a>, ransomware attacks have targeted the food sector, while another incident affected the Port of Houston.\u00a0 In the wake of these increased number of attacks targeting U.S. critical infrastructures, the Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly <a href=\"https:\/\/www.hsgac.senate.gov\/imo\/media\/doc\/Testimony-Easterly-2021-09-23.pdf\" target=\"_blank\" rel=\"noopener\">told the Senate<\/a> that \u201cwe are working to address our nation\u2019s shared cybersecurity risk. We must collectively and with great urgency strengthen our nation\u2019s cyber defenses, invest in new capabilities, and reimagine how we think about cybersecurity to recognize that all organizations are at risk and our efforts must focus on ensuring the resilience of essential services.\u201d<\/p>\n<p>This guidance is yet another indication that ransomware is the emerging leader in the rise of cyberattacks, and that your organization must take action to keep your data safe. Creating an effective security risk management program requires staying current with the latest threats, and then planning accordingly.<\/p>\n<p>As NIST notes in the draft publication \u201corganizations can follow recommended steps to prepare for and reduce the potential for successful ransomware attacks. This includes identifying and protecting critical data, systems, and devices; detecting ransomware events as early as possible (preferably before the ransomware is deployed); and preparing for responses to and recovery from any ransomware events that do occur.\u201d<\/p>\n<h2>The Five Functions<\/h2>\n<p>The publication establishes the Ransomware Profile which serves as a guide to help organizations assess the state of their own readiness for a ransomware attack. The profile maps security objectives from the NIST Cybersecurity Framework (CSF) to security capabilities. Informed by NIST CSF, the Ransomware Profile is divided into five categories: identify, protect, detect, respond, and recover.<\/p>\n<ul>\n<li><strong>Identify<\/strong>. Develop an organization-wide understanding of cybersecurity risks to focus and prioritize efforts, consistent with organizational risk management strategy and business needs.<\/li>\n<li><strong>Protect<\/strong>. Implement security systems and safeguards that prevent the disruption of critical services.<\/li>\n<li><strong>Detect<\/strong>. Develop and implement appropriate activities to enable the timely discovery of cybersecurity events.<\/li>\n<li><strong>Respond<\/strong>. Act regarding a detected cybersecurity incident to contain the impact this event.<\/li>\n<li><strong>Recover<\/strong>. Maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.<\/li>\n<\/ul>\n<p>The security capabilities and measures in the NIST Ransomware Profile support a detailed approach to preventing and mitigating ransomware events.<\/p>\n<h2>Preventing a Ransomware Attack<\/h2>\n<p>The publication outlines some basic preventative steps that an organization can take now to protect against the ransomware threat. These include:<\/p>\n<ul>\n<li><strong>Always use antivirus software<\/strong>. Set your software to automatically scan emails and flash drives.<\/li>\n<li><strong>Keep computers fully patched<\/strong>. Run scheduled checks to identify available patches and install these as soon as feasible.<\/li>\n<li><strong>Segment networks<\/strong>. Segment internal networks to prevent malware and threat actors from pivoting among critical systems.<\/li>\n<li><strong>Continuously monitor<\/strong> directory services and access management platforms for indicators of abnormal behavior or active attack.<\/li>\n<li><strong>Block access to potentially malicious web resources<\/strong>. Use products or services that block access to server names, IP addresses, or ports and protocols that are known to be malicious or suspected to be indicators of malicious system activity.<\/li>\n<li><strong>Allow only authorized apps<\/strong>. Configure operating systems and\/or third-party software to run only authorized applications. Establish processes for whitelisting or blacklisting apps.<\/li>\n<li><strong>Use standard user accounts<\/strong> versus accounts with administrative privileges whenever possible.<\/li>\n<li><strong>Restrict personally owned devices<\/strong> on business and ICS networks.<\/li>\n<li><strong>Avoid using personal apps<\/strong>\u2014like email, chat, and social media\u2014on any business computer.<\/li>\n<li><strong>Educate employees<\/strong> about social engineering and phishing attacks.<\/li>\n<li><strong>Assign and manage credential authorization<\/strong> for all enterprise assets and software, and periodically verify that each account has the appropriate access only.<\/li>\n<\/ul>\n<h2>Mitigating a Ransomware Attack<\/h2>\n<p>To help organizations recover from future ransomware events, the NIST publication suggests the following steps:<\/p>\n<ul>\n<li><strong>Make an incident recovery plan<\/strong>. You should develop and implement an incident recovery plan with defined roles and strategies for decision making. This can be part of a business continuity plan.<\/li>\n<li><strong>Backup and restore<\/strong>. Carefully plan, implement, and test a data backup and restoration strategy. Secure and isolate backups of important data, too.<\/li>\n<li><strong>Keep your contacts<\/strong>. Maintain an up-to-date list of internal and external contacts that can help with ransomware attacks, including law enforcement.<\/li>\n<\/ul>\n<h2>How ITEGRITI can help you<\/h2>\n<p>Cybersecurity threats are evolving, footprints are expanding, and attackers have become even more sophisticated. Organizations must now consider the impact from service disruption, data destruction and ransomware, and erosion of customer confidence in terms of operational cost, regulatory penalties, and brand or reputational damage.<\/p>\n<p>To operate, organizations require the reliability of their information technology systems and IT\/OT managed assets. Well-designed cybersecurity programs defend against and withstand most attacks but, despite best efforts, a motivated adversary will break into a system they target.<\/p>\n<p>ITEGRITI <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\">designs and implements programs<\/a> that help companies avoid hacks, detects breaches when they occur, minimize business disruption during a cybersecurity event, and reduce incident recovery time. The first step to building your cybersecurity program is to understand your cyber risk baseline.<\/p>\n<p>Take the free <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity-risk-baseline\/\">ITEGRITI assessment<\/a> available via our secure portal.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.<\/p>\n","protected":false},"author":10,"featured_media":3042,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIST Releases Guidelines for Managing the Ransomware Risk - kw022024<\/title>\n<meta name=\"description\" content=\"The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Releases Guidelines for Managing the Ransomware Risk\" \/>\n<meta property=\"og:description\" content=\"The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-25T14:23:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-26T12:33:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"NIST Releases Guidelines for Managing the Ransomware Risk\",\"datePublished\":\"2021-10-25T14:23:03+00:00\",\"dateModified\":\"2021-10-26T12:33:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/\"},\"wordCount\":1181,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg\",\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/\",\"name\":\"NIST Releases Guidelines for Managing the Ransomware Risk - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg\",\"datePublished\":\"2021-10-25T14:23:03+00:00\",\"dateModified\":\"2021-10-26T12:33:25+00:00\",\"description\":\"The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST Releases Guidelines for Managing the Ransomware Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIST Releases Guidelines for Managing the Ransomware Risk - kw022024","description":"The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/","og_locale":"en_US","og_type":"article","og_title":"NIST Releases Guidelines for Managing the Ransomware Risk","og_description":"The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-10-25T14:23:03+00:00","article_modified_time":"2021-10-26T12:33:25+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_description":"The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"NIST Releases Guidelines for Managing the Ransomware Risk","datePublished":"2021-10-25T14:23:03+00:00","dateModified":"2021-10-26T12:33:25+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/"},"wordCount":1181,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg","articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/","name":"NIST Releases Guidelines for Managing the Ransomware Risk - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg","datePublished":"2021-10-25T14:23:03+00:00","dateModified":"2021-10-26T12:33:25+00:00","description":"The National Institute of Standards and Technology (NIST) has released the revised draft of NISTIR 8374 that defines a Ransomware Profile, which identifies security objectives from the NIST Cybersecurity Framework that support preventing, responding to, and recovering from ransomware events.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_ransomware.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/nist-releases-guidelines-for-managing-the-ransomware-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"NIST Releases Guidelines for Managing the Ransomware Risk"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3038"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3038"}],"version-history":[{"count":2,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3038\/revisions"}],"predecessor-version":[{"id":3041,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3038\/revisions\/3041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3042"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}