Cybertrust America

From OpenCommons
Revision as of 06:42, February 10, 2022 by Pinfold (talk | contribs) (Created page with "{{Organization |logo=Cybertrust America600.jpg |sector=Cybersecurity and Privacy |industry=Commercial & Professional Services |type=Nonprofit |foundation=2020 |founder=Lan Jen...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search


Cybertrust America
Cybertrust America600.jpg
NIST Sector Cybersecurity and Privacy
GICS Industrial Commercial & Professional Services
Smart Tag(s)
Business type Nonprofit
Year Founded 2020
Founder(s) Lan Jenson
City, State San Jose CA
Country United States
Region Served State
Executives Lan Jenson
Revenue
Number of employees 12
Sponsorship Level Sponsor
Members

Damien Thwaites.pngLan Jenson.jpegSushmitaSenmajumdar.jpg

{{{description}}}

Activities

ActionClusterImage.png Cybersecurity Risk Assessment and Mitigation
Empower municipalities with cybersecurity risk assessment methodology and resources to enable timely understanding of their risk levels and appropriate mitigation against cyberrisks.

The risk assessment methodology is adapted from NIST Cybersecurity Framework with a Technical Risk Rating component and an Expert Assessment. The daunting resource shortage is addressed by a unique volunteer matching mechanism based on public-private partnerships.

Service Guide.jpg Risk Assessment and Prioritization in the Smart City Cyber Resilience Planning Process
This use case summarizes an engagement between a GCTC Action Cluster member, Adaptable Security Corp (ADA), and a California municipality, focusing on how the risk management process, with a particular focus on risk assessment and prioritization, played a critical role in the overall cyber resilience planning process. The content covered in this use case primarily aligns with the Prepare, Select, Assess, and Monitor steps of the RMF.
San Mateo Vuln map.jpg Risk Assessment in the County of San Mateo, California
This use case describes how risk assessment has been implemented in the County of San Mateo, California, and identifies activities that align most closely with the Step 0: Prepare and Step 6: Monitor steps of the risk management process. However, the assessment process and the outputs from the assessment also involve elements from and inform all of the other risk management steps (i.e., Step 1: Categorize, Step 2: Select, Step 3: Implement, Step 4: Assess, Step 5: Authorize). Refer to Appendix B of this Guidebook for an example of the risk assessment questionnaire and its application.
Phases-of-risk-image.png Risk Management in a Privacy-Specific Context
This use case describes how the risk management concepts and processes presented in this Guidebook apply in privacy-specific applications. Given the overlapping relationship of cybersecurity and privacy, much of the information in this use case may sound similar to, or even identical to, aspects of cybersecurity risk management. This reinforces the notion that cybersecurity and privacy are closely related and should generally be considered in tandem.

Details