Matthew Smith

Matthew Smith

Seattle, Washington, United States
735 followers 500+ connections

About

I live, sleep, eat, and breath cybersecurity risk management. As a vCISO I provide my…

Services

Articles by Matthew

See all articles

Activity

Join now to see all activity

Experience

  • Seemless Transition LLC

  • -

  • -

    United States

  • -

  • -

  • -

  • -

    HQ

  • -

  • -

Education

  • University of Maryland Global Campus Graphic
  • -

    Activities and Societies: Founder and 1st President of the Nano and Emerging Technology Club (NExT), UPC Greeter Glee Club Member, Intra Mural Sports Participant

Publications

  • ISO/IEC 27110 - Cybersecurity framework development guidelines

    International Standards Organization

    This document specifies guidelines for developing a cybersecurity framework. It is applicable to cybersecurity framework creators regardless of their organizations' type, size or nature.

    See publication
  • NIST SP 181r1 - Workforce Framework for Cybersecurity (NICE Framework)

    National Institute of Standards and Technology

    This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses that work as Task statements and describes Knowledge and Skill statements that provide a foundation for learners including students, job seekers, and employees. The use of these statements helps students to develop skills, job seekers to…

    This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses that work as Task statements and describes Knowledge and Skill statements that provide a foundation for learners including students, job seekers, and employees. The use of these statements helps students to develop skills, job seekers to demonstrate competencies, and employees to accomplish tasks. As a common, consistent lexicon that categorizes and describes cybersecurity work, the NICE Framework improves communication about how to identify, recruit, develop, and retain cybersecurity talent. The NICE Framework is a reference source from which organizations or sectors can develop additional publications or tools that meet their needs to define or provide guidance on different aspects of cybersecurity education, training, and workforce development.

    Other authors
    See publication
  • NISTIR 8278 National Cybersecurity Online Informative References (OLIR) Program: Guidelines for OLIR Users and Developers

    National Institute of Standards and Technology

    In a general sense, an informative reference indicates how one document relates to another document. The National Cybersecurity Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts defining standardized online informative references (OLIRs) between elements of their documents and elements of other documents like the NIST Cybersecurity Framework. The OLIR Program provides a standard format for expressing OLIRs and a centralized location for hosting…

    In a general sense, an informative reference indicates how one document relates to another document. The National Cybersecurity Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts defining standardized online informative references (OLIRs) between elements of their documents and elements of other documents like the NIST Cybersecurity Framework. The OLIR Program provides a standard format for expressing OLIRs and a centralized location for hosting them. This report describes the OLIR Program, focusing on explaining what OLIRs are and what benefits they provide, how anyone can search and access OLIRs, and how subject matter experts can contribute OLIRs.

    Other authors
    See publication
  • NISTIR 8259 Recommendations for IoT Device Manufacturers: Foundational Activities and Core Device Cybersecurity Capability Baseline

    National Institute of Standards and Technology

    Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT devices they make are, meaning the devices provide functionality that their customers need to secure them within their systems and environments, and manufacturers can also help their customers by providing them with the cybersecurity-related…

    Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT devices they make are, meaning the devices provide functionality that their customers need to secure them within their systems and environments, and manufacturers can also help their customers by providing them with the cybersecurity-related information they need. This publication describes voluntary, recommended activities related to cybersecurity that manufacturers should consider performing before their IoT devices are sold to customers. These activities can help manufacturers lessen the cybersecurity-related efforts needed by IoT device customers, which in turn can reduce the prevalence and severity of IoT device compromises and the attacks performed using compromised IoT devices.

    Other authors
    See publication
  • NISTIR 8204 Cybersecurity Framework Online Informative References (OLIR) Submissions Specification for Completing the OLIR Template

    National Institute of Standards and Technology

    This document provides instructions and definitions for completing the Cybersecurity Framework (CSF) Online Informative References (OLIR) spreadsheet template available for download at https://www.nist.gov/cyberframework/informative-references. This document is intended to assist developers of References as they complete the spreadsheet template. Definitions are provided for column and row headings in addition to a discussion of expected values.

    See publication
  • Using the NIST Cybersecurity Framework in an International Setting

    CISO Compass

    Matthew is a featured author among the top 75 CISOs and cybersecurity leaders. The article highlights how companies, national governments, and international bodies use and leverage the NIST Cybersecurity Framework to organize and communicate cybersecurity activities.

    See publication
  • SP 800-184 Guide for Cybersecurity Event Recovery

    National Institute of Standards and Technology

    In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents when they occur and helps to minimize the impact on the organization and its constituents. Additionally, continually improving recovery planning…

    In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents when they occur and helps to minimize the impact on the organization and its constituents. Additionally, continually improving recovery planning by learning lessons from past events, including those of other organizations, helps to ensure the continuity of important mission functions. This publication provides tactical and strategic guidance regarding the planning, playbook developing, testing, and improvement of recovery planning. It also provides an example scenario that demonstrates guidance and informative metrics that may be helpful for improving resilience of information systems.

    Other authors
    See publication
  • A Brief Look into the Cybersecurity Framework

    AFCEA Signal Magazine Online

    An overview of the Cybersecurity Framework as well as a look towards implementation.

    See publication

More activity by Matthew

View Matthew’s full profile

  • See who you know in common
  • Get introduced
  • Contact Matthew directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Matthew Smith in United States

Add new skills with these courses