Looking beyond the cyber framework

cyber attack button

With the National Institute of Standards and Technology in the final stages of putting together a formal release of an overarching federal cybersecurity framework, those in industry and government tasked with safeguarding cyber assets are looking ahead to what comes next. 

The formal framework is due in mid-February under a presidential executive order issued earlier this year, but several draft versions and ongoing dialog between stakeholders have defined the process so far. Most involved in the process are familiar with the framework’s principles, but questions are arising on some of the specifics, such as how a cybersecurity market will develop and what companies can gain from implementing.

 “We’re very much, if you will, all-in on the voluntary approach,” Michael Daniel, White House cybersecurity coordinator, said at a Dec. 5 Security Innovation Network event in Washington. “And that means that we’re in fact relying on the market being a primary driver and self-interest being a primary driver in the framework, because everybody has to manage their cyber risks.” 

The market’s role in the framework’s success continues to emerge as February draws closer, and as organizations figure out how they will integrate the guidance into current practices. Executives and officials are looking at factors such as cybersecurity insurance and government incentives, two increasingly hot-button issues. 

“There are times, particularly when protecting critical infrastructure, where the framework will need a boost,” Daniel said. “Part of that is looking at incentives.”

The development of an insurance market, the use of federal grants, process preferences, liability protections, public recognition, streamlined requirements, recovery rates and research and development all are being considered, he said.  

Daniel acknowledged that the most interest lies in liability protections, but said that is also the incentive “most fraught with peril” and most in danger of spawning unintended consequences. 

The insurance market remains largely undeveloped, except for a nascent market specifically centered on data breaches. Officials hope the framework will drive the market, and some in industry say it’s a waiting game to see what happens after February, once there is a barometer for how well organizations are protecting their cyber assets. 

“I think over time translating [metrics] into something that might be used on a broader basis would be useful. It’s the right thing to think about; it’s the next big challenge, but at the same time we don’t have the data,” Bob Butler, chief security officer of data center technology firm IO and former deputy assistant secretary of Defense for cyber policy, said Dec. 5 at the Center for Strategic and International Studies. “We haven’t figured out a good model yet to provide the heuristics to help us with insurance valuation in this space.” 

But in the government, hopes are high that the framework will take off with a combination of inherent incentives – critical protections, financial gains – and those federally provided.

 “I’d recommend focusing on this as a list of ways to build a market around investing in cybersecurity,” Phyllis Schneck, deputy undersecretary for cybersecurity for the Homeland Security Department’s National Protection and Programs Directorate, said at the SINET event. “These are ways to invest for our companies to protect themselves...ways to build new science, new innovation."  

"It’s not focused on compliance, checking off boxes in a 50-pound document you never want to read," Schneck said. It’s focused on looking at what fits your business, identifying your risks and resiliency, protecting what you need to and going out there and building stuff. And sell it.” 

Final public comments for the framework are due Dec. 13. More information can be found at

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.


  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Mon, Dec 9, 2013

Framework vs System. Frameworks tend to collapse when under pressure. Systems grow based on success. Security gains resources and adherents when proven sucessful. The NIST framework needs to be applied like a system. Otherwise managers choose not what is most needed but what is cheapest.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group