• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • MARKETS & PRODUCTS
    • Markets


      Construction

      Cybersecurity

      Fixed Gas & Flame Detection

      General Industry

      Healthcare

      HVAC-R

      Oil & Gas

      Training

      Utilities

      Products


      Combustion Analysis

      Confined Space

      Connected Work

      Corporate

      Fall Protection

      Fixed Gas & Flame Detection

      Gas Analysis

      General

      Head Protection

      Heat Stress

      Leak Detection

      Portable Gas Detection

      Refrigerant Analysis

      Respiratory Protection

      Column
  • SUBSCRIBE

Communicating Information Security Goals

2 Min Read | Feb 1, 2024

Reading Time: 2 minutesCISA has established Cybersecurity Performance Goals (CPGs) and organized them to align with the NIST CyberSecurity Framework (CSF) functions. A result of this is an easy to read and use checklist to start to create a baseline understanding of where your program is sufficient as well as where there are gaps.

February 1, 2024 by Melina Mangino

Reading Time: 2 minutes

No one enjoys change. Wrapping our minds around protecting our organizations is hard enough for those that do it full time. Communication of the issues and challenges you face to better secure the organization is paramount.

CISA has established Cybersecurity Performance Goals (CPGs) and organized them to align with the NIST CyberSecurity Framework (CSF) functions. A result of this is the CISA CPG Checklist. An easy to read and use checklist to start to create a baseline understanding of where your program is sufficient as well as where there are gaps. This vendor agnostic checklist can help you create the story to tell. 

A key first step is focusing on shared objectives. An Information Security program that shares and supports business objectives guided by the CIA Triad of confidentiality, integrity and availability, ensures that the data the business relies on is as those words imply – protected from unauthorized access, authentic and accessible.

Maintain the positivity of the message. Improving your program will be hard work and sometimes requires additional budget spend. The goal is the return on investment by protecting the digital assets of the company.

Address the business needs during these conversations. All functions of the organization need to work together.

Tell a story. Persuade others so that they understand and value these shared objectives.

An natural extension of communicating the Information Security goals and objectives of your organization is to set those expectations with your vendors and suppliers. In the next article, we will discuss Third Party Risk Management and the crucial role it plays in protecting your data as well as understanding how the third party is ensuring critical uptime and business continuity by protecting the organization through Information Security controls. Onboarding a new vendor is a long process. Confirming they have similar objectives can ensure they will be a long term partner. 

Recommended for You

Cybersecurity

Plan for a Secure New Year

January 1, 2024
< 1 Minute Read
Cybersecurity

Building a Third Party Risk Management Program

March 1, 2024
2 Min Read
MSA Cyber Security
Cybersecurity

Securing Your Office Email Environment

April 2, 2024
2 Min Read
Cybersecurity

Social Engineering Awareness

May 1, 2024
< 1 Minute Read
Share:

Footer

MSA MISSION: That men and women may work in safety and that they, their families, and their communities may live in health throughout the world.

MSASafety.com

  • Construction
  • General Industry
  • Oil & Gas
  • HVAC-R
  • Utilities
  • Fixed Gas & Flame Detection
  • Fire Service
MSA on Facebook   MSA on X   MSA on Instagram   MSA on LinkedIn   MSA on YouTube  

Contact

  • blog@msasafety.com
  • 1-800-672-2222
  • View All Contact Info
  • Subscribe

Other MSA Blogs

  • Fire Service – The Scene
  • FieldServer – The Safety Connection

© 2024 MSA. All rights reserved.

© 2025 MSA . All rights reserved.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT