Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Tag Archives: What steps illustrate how an organization could use the Cybersecurity Framework to create or improve a cybersecurity program?

November 6, 2025
November 6, 2025

CSF Program Steps

What kind of steps would you take to illustrate how an organization could use the Cybersecurity Framework to create a new cybersecurity program or improve an existing program. What are some of the key messages and ideas that you will take away from this course? What surprised you about the class? In your opinion, what has changed? How might that move forward into your professional practice?

Course Textbook(s) Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley. https://online.vitalsource.com/#/books/9781119614562

CSF Program Steps

  • • What steps illustrate how an organization could use the Cybersecurity Framework to create or improve a cybersecurity program,

  • • What are key messages and ideas taken away from this course,

  • • What surprised you about the class,

  • • What has changed in your opinion,

  • • How might that move forward into your professional practice


Comprehensive General Answer

The NIST Cybersecurity Framework (CSF) provides organizations with a structured approach to building or improving cybersecurity readiness. To create or enhance a cybersecurity program, the following practical steps can be applied:


Steps to Use the Cybersecurity Framework

  1. Identify Current State

    • Conduct a risk assessment and inventory systems, data, and critical infrastructure.

    • Understand business context and asset dependencies.

    • As Lewis (2020) emphasizes, understanding interdependencies in critical infrastructure is essential for national and organizational resilience.

  2. Define Target State

    • Set security goals using CSF’s functions:
      Identify, Protect, Detect, Respond, Recover

    • Determine acceptable risk and compliance requirements.

  3. Gap Analysis

    • Compare current capabilities against the desired future state.

    • Prioritize gaps that pose the most significant operational or national security risks.

  4. Develop and Implement Action Plans

    • Allocate resources, define responsibilities, and apply layered defenses.

    • This aligns with best practices for defending networked systems against cascading failures (Lewis, 2020).

  5. Monitor, Measure, and Improve

    • Continuously assess controls and update based on evolving threats.

    • Conduct incident response exercises and recovery planning validation.

These steps allow organizations to mature their cybersecurity posture in a structured and repeatable way.


🌟 Key Messages & Ideas from the Course

  • Critical infrastructure is deeply interconnected, meaning a failure in one system can trigger multidomain consequences (Lewis, 2020).

  • Cybersecurity requires both technical and strategic decision-making, not just firewalls and encryption.

  • Public-private collaboration is essential to defend a networked nation.

  • Threats evolve rapidly—security programs must be adaptive and ongoing.


😮 What Surprised Me

  • The extent to which non-technical elements (policy, human behavior, economic incentives) influence cybersecurity success.

  • How a single weak link in infrastructure can impact national security, not just a single business.

  • The massive role of homeland security agencies in supporting private-sector defense.


🔄 What Has Changed

  • I now view cybersecurity not only as an IT function but as strategic risk management.

  • My perspective shifted from reactive approaches to proactive resilience.

  • I recognize cybersecurity as a shared responsibility across sectors and personnel levels.


🚀 Impact on Professional Practice

Going forward, I will:

✔ Promote adoption of structured frameworks like NIST CSF
✔ Emphasize risk-based prioritization instead of checklist compliance
✔ Advocate for layered defenses and incident readiness
✔ Encourage organizational culture that treats cybersecurity as mission-critical

This course has reinforced the importance of cybersecurity in protecting national assets and sustaining operational resilience.

October 30, 2025
October 30, 2025
Cybersecurity Framework Reflection
  • What steps illustrate how an organization could use the Cybersecurity Framework to create or improve a cybersecurity program?,

  • What key messages and ideas will you take away from this course?,

  • What surprised you about the class?,

  • What has changed in your opinion?,

  • How might that move forward into your professional practice?,


✅ Comprehensive General Answer

The NIST Cybersecurity Framework (CSF) provides organizations with a structured method to build or enhance their cybersecurity posture. To illustrate implementation, I would take the following steps:

1️⃣ Identify Current State
Assess existing cybersecurity capabilities and risks, including assets, data sensitivity, and critical infrastructure dependencies (Lewis, 2020).
2️⃣ Determine Target State
Define where the organization aims to be based on industry standards, threats, and regulatory requirements.
3️⃣ Gap Analysis & Prioritization
Compare current conditions to target goals and prioritize actions by likelihood and impact of threats.
4️⃣ Develop & Implement Action Plans
Apply appropriate controls across the framework’s core functions—Identify, Protect, Detect, Respond, Recover.
5️⃣ Monitor, Evaluate, Improve
Cybersecurity needs continuous review, updating policies, training, and technologies as threats evolve.


🔹 Key Messages & Ideas Taken from the Course

A major takeaway is the recognition that critical infrastructure is deeply interconnected, meaning a vulnerability in one sector can cascade into others. The course emphasized that cybersecurity is not solely a technical function—it requires organizational policy, leadership engagement, and risk-informed decision-making (Lewis, 2020).

Another key message is the importance of defense in depth, integrating multiple layers of security to reduce single points of failure.


🔹 What Surprised Me

I was surprised by how much human behavior and organizational culture impact cybersecurity success. Technical controls alone are not enough — training and awareness are vital.


🔹 What Has Changed in My Perspective

I now better understand cybersecurity as a national security issue, not just an IT concern. Threats to power grids, healthcare networks, and communication systems can disrupt the entire nation.


🔹 Application to Professional Practice

Going forward, I would adopt a risk-driven mindset in my cybersecurity work. I plan to:

  • Incorporate NIST CSF into organizational planning

  • Promote continuous monitoring and improvement

  • Advocate for stronger employee security awareness programs

This course reinforced that protecting critical infrastructure requires collaboration, vigilance, and proactive planning.


✅ Reference — APA 7 Format

Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley.