{"id":456,"date":"2016-07-30T16:01:34","date_gmt":"2016-07-30T16:01:34","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=456"},"modified":"2021-04-12T04:53:47","modified_gmt":"2021-04-12T04:53:47","slug":"nist-cybersecurity-analysis","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/","title":{"rendered":"NIST Based Cybersecurity Analysis"},"content":{"rendered":"<p><span style=\"background: white;\">ITEGRITI assisted a client in the electric power industry by performing a gap analysis of their cybersecurity program against both regulatory standards and the NIST framework.\u00a0 We provided prioritized and actionable recommendations for each identified concern with sufficient detail to direct the client team through remediation.\u00a0<\/span>Agreeing\u00a0 with all reported concerns and related activities, this client became better prepared to deal with their cybersecurity challenges.<\/p>\n<p>Due to the outcome of our initial efforts, our working engagement extended 4X to help with additional cybersecurity, compliance and process concerns.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ITEGRITI assisted a client in the electric power industry by performing a gap analysis of their cybersecurity program against both regulatory standards and the NIST framework.\u00a0 We provided prioritized and actionable recommendations for each identified concern with sufficient detail to direct the client team through remediation.\u00a0Agreeing\u00a0 with all reported concerns [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2181],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIST Based Cybersecurity Analysis - kw022024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Based Cybersecurity Analysis\" \/>\n<meta property=\"og:description\" content=\"ITEGRITI assisted a client in the electric power industry by performing a gap analysis of their cybersecurity program against both regulatory standards and the NIST framework.\u00a0 We provided prioritized and actionable recommendations for each identified concern with sufficient detail to direct the client team through remediation.\u00a0Agreeing\u00a0 with all reported concerns [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-30T16:01:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T04:53:47+00:00\" \/>\n<meta name=\"author\" content=\"Michael Sanchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Sanchez\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/\"},\"author\":{\"name\":\"Michael Sanchez\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\"},\"headline\":\"NIST Based Cybersecurity Analysis\",\"datePublished\":\"2016-07-30T16:01:34+00:00\",\"dateModified\":\"2021-04-12T04:53:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/\"},\"wordCount\":91,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"articleSection\":[\"GSD\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/\",\"name\":\"NIST Based Cybersecurity Analysis - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"datePublished\":\"2016-07-30T16:01:34+00:00\",\"dateModified\":\"2021-04-12T04:53:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST Based Cybersecurity Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\",\"name\":\"Michael Sanchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"caption\":\"Michael Sanchez\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIST Based Cybersecurity Analysis - kw022024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/","og_locale":"en_US","og_type":"article","og_title":"NIST Based Cybersecurity Analysis","og_description":"ITEGRITI assisted a client in the electric power industry by performing a gap analysis of their cybersecurity program against both regulatory standards and the NIST framework.\u00a0 We provided prioritized and actionable recommendations for each identified concern with sufficient detail to direct the client team through remediation.\u00a0Agreeing\u00a0 with all reported concerns [&hellip;]","og_url":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2016-07-30T16:01:34+00:00","article_modified_time":"2021-04-12T04:53:47+00:00","author":"Michael Sanchez","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Michael Sanchez"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/"},"author":{"name":"Michael Sanchez","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd"},"headline":"NIST Based Cybersecurity Analysis","datePublished":"2016-07-30T16:01:34+00:00","dateModified":"2021-04-12T04:53:47+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/"},"wordCount":91,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"articleSection":["GSD"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/","url":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/","name":"NIST Based Cybersecurity Analysis - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"datePublished":"2016-07-30T16:01:34+00:00","dateModified":"2021-04-12T04:53:47+00:00","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"NIST Based Cybersecurity Analysis"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd","name":"Michael Sanchez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","caption":"Michael Sanchez"},"url":"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/456"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=456"}],"version-history":[{"count":5,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/456\/revisions"}],"predecessor-version":[{"id":1088,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/456\/revisions\/1088"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}