Matthew Smith
Seattle, Washington, United States
735 followers
500+ connections
About
I live, sleep, eat, and breath cybersecurity risk management. As a vCISO I provide my…
Services
Articles by Matthew
Activity
-
Big week for cybersecurity workforce development at the National Institute of Standards and Technology (NIST)! We've got: 📝 Updates to the NICE…
Big week for cybersecurity workforce development at the National Institute of Standards and Technology (NIST)! We've got: 📝 Updates to the NICE…
Liked by Matthew Smith
-
What goes through my head when writing an email.
What goes through my head when writing an email.
Liked by Matthew Smith
-
NICE is excited to announce the release of Version 2.0.0 of the #NICEFramework Components. This update adds a new Work Role focused on Operational…
NICE is excited to announce the release of Version 2.0.0 of the #NICEFramework Components. This update adds a new Work Role focused on Operational…
Liked by Matthew Smith
Experience
-
Seemless Transition LLC
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Publications
-
ISO/IEC 27110 - Cybersecurity framework development guidelines
International Standards Organization
This document specifies guidelines for developing a cybersecurity framework. It is applicable to cybersecurity framework creators regardless of their organizations' type, size or nature.
-
NIST SP 181r1 - Workforce Framework for Cybersecurity (NICE Framework)
National Institute of Standards and Technology
This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses that work as Task statements and describes Knowledge and Skill statements that provide a foundation for learners including students, job seekers, and employees. The use of these statements helps students to develop skills, job seekers to…
This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses that work as Task statements and describes Knowledge and Skill statements that provide a foundation for learners including students, job seekers, and employees. The use of these statements helps students to develop skills, job seekers to demonstrate competencies, and employees to accomplish tasks. As a common, consistent lexicon that categorizes and describes cybersecurity work, the NICE Framework improves communication about how to identify, recruit, develop, and retain cybersecurity talent. The NICE Framework is a reference source from which organizations or sectors can develop additional publications or tools that meet their needs to define or provide guidance on different aspects of cybersecurity education, training, and workforce development.
Other authorsSee publication -
NISTIR 8278 National Cybersecurity Online Informative References (OLIR) Program: Guidelines for OLIR Users and Developers
National Institute of Standards and Technology
In a general sense, an informative reference indicates how one document relates to another document. The National Cybersecurity Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts defining standardized online informative references (OLIRs) between elements of their documents and elements of other documents like the NIST Cybersecurity Framework. The OLIR Program provides a standard format for expressing OLIRs and a centralized location for hosting…
In a general sense, an informative reference indicates how one document relates to another document. The National Cybersecurity Online Informative References (OLIR) Program is a NIST effort to facilitate subject matter experts defining standardized online informative references (OLIRs) between elements of their documents and elements of other documents like the NIST Cybersecurity Framework. The OLIR Program provides a standard format for expressing OLIRs and a centralized location for hosting them. This report describes the OLIR Program, focusing on explaining what OLIRs are and what benefits they provide, how anyone can search and access OLIRs, and how subject matter experts can contribute OLIRs.
Other authorsSee publication -
NISTIR 8259 Recommendations for IoT Device Manufacturers: Foundational Activities and Core Device Cybersecurity Capability Baseline
National Institute of Standards and Technology
Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT devices they make are, meaning the devices provide functionality that their customers need to secure them within their systems and environments, and manufacturers can also help their customers by providing them with the cybersecurity-related…
Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT devices they make are, meaning the devices provide functionality that their customers need to secure them within their systems and environments, and manufacturers can also help their customers by providing them with the cybersecurity-related information they need. This publication describes voluntary, recommended activities related to cybersecurity that manufacturers should consider performing before their IoT devices are sold to customers. These activities can help manufacturers lessen the cybersecurity-related efforts needed by IoT device customers, which in turn can reduce the prevalence and severity of IoT device compromises and the attacks performed using compromised IoT devices.
Other authorsSee publication -
NISTIR 8204 Cybersecurity Framework Online Informative References (OLIR) Submissions Specification for Completing the OLIR Template
National Institute of Standards and Technology
This document provides instructions and definitions for completing the Cybersecurity Framework (CSF) Online Informative References (OLIR) spreadsheet template available for download at https://www.nist.gov/cyberframework/informative-references. This document is intended to assist developers of References as they complete the spreadsheet template. Definitions are provided for column and row headings in addition to a discussion of expected values.
-
Using the NIST Cybersecurity Framework in an International Setting
CISO Compass
Matthew is a featured author among the top 75 CISOs and cybersecurity leaders. The article highlights how companies, national governments, and international bodies use and leverage the NIST Cybersecurity Framework to organize and communicate cybersecurity activities.
-
SP 800-184 Guide for Cybersecurity Event Recovery
National Institute of Standards and Technology
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents when they occur and helps to minimize the impact on the organization and its constituents. Additionally, continually improving recovery planning…
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents when they occur and helps to minimize the impact on the organization and its constituents. Additionally, continually improving recovery planning by learning lessons from past events, including those of other organizations, helps to ensure the continuity of important mission functions. This publication provides tactical and strategic guidance regarding the planning, playbook developing, testing, and improvement of recovery planning. It also provides an example scenario that demonstrates guidance and informative metrics that may be helpful for improving resilience of information systems.
Other authorsSee publication -
A Brief Look into the Cybersecurity Framework
AFCEA Signal Magazine Online
An overview of the Cybersecurity Framework as well as a look towards implementation.
More activity by Matthew
-
On Tuesday, March 4th, the Right to Repair (HB 1483) was successfully voted out of Washington’s House of Representatives by a near-unanimous vote of…
On Tuesday, March 4th, the Right to Repair (HB 1483) was successfully voted out of Washington’s House of Representatives by a near-unanimous vote of…
Liked by Matthew Smith
-
DDoS attacks almost always originate from hacked devices. The country/countries that the traffic originates from has never been an indicator of who's…
DDoS attacks almost always originate from hacked devices. The country/countries that the traffic originates from has never been an indicator of who's…
Liked by Matthew Smith
-
As an introvert in the design industry, self-doubt can be a constant companion. Even with two decades of experience, questions like "Am I good…
As an introvert in the design industry, self-doubt can be a constant companion. Even with two decades of experience, questions like "Am I good…
Liked by Matthew Smith
-
I wondered if this would be possible and it turns out it is! 1. Downloaded 360GB of elevation data from NASA Earth Data, utilizing the ASTER…
I wondered if this would be possible and it turns out it is! 1. Downloaded 360GB of elevation data from NASA Earth Data, utilizing the ASTER…
Liked by Matthew Smith
-
I suspect the reason a lot of people support DOGE is due to the flawed logic of trying to approach government as if it were a business. When a…
I suspect the reason a lot of people support DOGE is due to the flawed logic of trying to approach government as if it were a business. When a…
Liked by Matthew Smith
-
Anybody interested in Cybersecurity Risk Management? In #NIST's latest blog post celebrating 1-year of #CSF 2.0, they highlighted updates to their…
Anybody interested in Cybersecurity Risk Management? In #NIST's latest blog post celebrating 1-year of #CSF 2.0, they highlighted updates to their…
Liked by Matthew Smith
-
Huge congratulations, Reva! This kind of approach is needed more than ever!
Huge congratulations, Reva! This kind of approach is needed more than ever!
Liked by Matthew Smith
-
I’m so delighted to see that one of the last publications I worked on at NIST – SP 800-226, Guidelines for Evaluating Differential Privacy Guarantees…
I’m so delighted to see that one of the last publications I worked on at NIST – SP 800-226, Guidelines for Evaluating Differential Privacy Guarantees…
Liked by Matthew Smith
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Matthew Smith in United States
-
Matthew Smith
-
Matthew Smith
-
Matthew Smith
Vice President of Forest Operations at Finite Carbon
-
Matthew Smith
-
Matthew Smith
9602 others named Matthew Smith in United States are on LinkedIn
See others named Matthew Smith