Painting a picture for your organization Credit: Thinkstock The cyber environment is filled with threats. It’s virtually impossible to avoid “INFRASTRUCTURE FACES IMMINENT CYBER ATTACK,” or something very similar every time you encounter online or television news. Nobody argues that there’s no threat. At the same time few people, much less experts, agree on how to solve the threat. Let’s go a step beyond acknowledging our infrastructure is in danger. How do we quantify the threat and our preparation to respond? How do you, our nation’s cybersecurity professionals, assess the readiness and agility of an organization, and more importantly how do you describe the threat and defense landscape to people outside the profession? While not advocating any particular tool, the maturity-model assessment family in general is geared to a cybersecurity program assessment as opposed to a risk or a threat assessment. Most models present a common set of industry-vetted, best practices in cybersecurity. These may go even further, matching your status to industry maturity levels.Scores are based on the organizations risk tolerance for multiple domains. These can include cybersecurity approach, management objectives, and operational and technical practices. After a facilitated assessment or self-assessment tool is completed, a score is assigned. Scores then are compared within and possibly between industry sectors to categorize your organization in relation to your peers. [ ALSO ON CSO: What’s in a security score? ]Why go through all this work? Maturity models can help you to paint a clear and compelling picture of the gap between threat and preparation — not only for infrastructure defenders, but for you management when it’s time to request resources. Return on investmentWhy wouldn’t you use a tool like this? After all, you’ve already paid for it! That’s right; one of the most functional and popular tools within the Natural Gas Subsector is the Department of Energy’s Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2). The ONG-C2M2 includes the generic C2M2 assessment and adds additional reference material and implementation guidance specifically tailored for the oil and natural gas subsector. The ONG-C2M2 comprises the aforementioned maturity model, an evaluation tool, and DOE- facilitated self-evaluations.Generic Cybersecurity Maturity ModelAs I prepare this blog I’m sitting in a live, two-day, facilitated ONG-C2M2 session to observe an experienced facilitator, industry partners, and the evaluation process. Active facilitation simplifies everything by clarification and guidance that increases the accuracy and provides interpretation of the final results. The C2M2 models are publicly available and, while designed for the energy sector, still can be used as a foundation by any organization to enhance its cybersecurity capabilities.Electric Subsector ModelWhile not mandatory, compliance with and measured maturity within a government-authored assessment tool can go a long way to assure stakeholders of your commitment to cybersecurity. It might offset potential liability as well. Real-world experiencesYour feedback is not only appreciated by me but will certainly be well-regarded by your sector and sub-sector partners. You are encouraged to comment on this blog!What impresses me may not impress you. Cyber defender peers, have you encountered any of these tools? Have you found them useful? Cumbersome? What alternatives have worked for you?What, if any, positive or negative effects have the results had within your organization? How does the C-suite regard the results of the tool? Did the evaluation result in a clear, usable picture of your threat and defense landscape? Did it help your department get more resources?Nobody stands alone in defending our critical cyber infrastructure. Everybody depends on somebody for resources. Maturity models/evaluation tools such as the ONG-C2M2 can turn cyber-speak into a story that compels your leadership to action. Related content opinion Toe-to-toe with the Roosskies Russia is hardly, if at all, deterred by sanctions. Until Uncle Sam puts his kinetic foot down, Russian Intrusions and campaigns will continue and most likely increase. By John Bryk Mar 19, 2018 5 mins Cyberattacks Government Technology Industry opinion The next wave? Modular component malware against industrial control safety systems While there exist no imminent, specific, directly attributable credible threats against energy infrastructure in North America, attacks against Ukraine’s energy sector have occurred each December since 2015. By John Bryk Dec 15, 2017 3 mins Cyberattacks Energy Industry Technology Industry opinion Eugene Kaspersky and the terrible, horrible, no good, very bad day When a crime is committed, who should go to jail? By John Bryk Oct 11, 2017 4 mins Technology Industry Cyberattacks Cybercrime opinion Global cyber reconnaissance against the energy sector The sky is not falling, at least not today. By John Bryk Jul 12, 2017 4 mins Cyberattacks Energy Industry Technology Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe