How to “So What, What’s Next?” Your NIST CSF Assessment

Table of Contents

📚 Exam Objectives

🧭 The CR-MAP Process

Introduction: Why CR-MAP Matters

Core Purpose of A/CCRP Certification

The AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) certification builds upon A/CCRF foundations to test practical knowledge of implementing the NIST Cybersecurity Framework through real-world scenarios.

The Fundamental Equation

  • NIST Cybersecurity Framework = What to do

  • Cyber Risk Management Action Plan (CR-MAP) = How to do it

Target Audience

Entry to mid-level cybersecurity professionals with 1-3 years experience in:

  • Cybersecurity operations/administration

  • Governance, Risk & Compliance (GRC)

The Five Essential Questions CR-MAP Answers

A successful CR-MAP implementation enables you to confidently answer:

  1. 🔝 What are the top five cyber risks to my organization?

  2. 💰 Am I getting the biggest return possible for my cyber risk management dollars?

  3. 👔 Do all our organization's executives and leaders understand our cybersecurity plans?

  4. ⚠ Does everyone at work know how they can help to mitigate our top cyber risks?

  5. 🗣 What do I tell our biggest customers or stakeholders when they ask, "What are you all doing about cybersecurity?"

Real World Case Study: Expeditors

Background

Expeditors - Fortune 500 logistics company operating as a global freight management provider with approximately 18,000 employees.

The Incident (February 20, 2022)

Complete global network outage lasting three weeks, with several additional weeks required for full restoration.

The Cost of the Attack

Direct Costs to Expeditors

  • $47 million - Lost due to disrupted operations and fines from accumulated shipping containers

  • $18 million - Investigation, recovery, and shipping-related claims

  • Total: $65 million (unbudgeted, no cyber insurance coverage)

iRobot Corp Sued Expeditors

Cascading Impact: The iRobot Lawsuit (April 2023)

Lawsuit Amount: $2.1 million plus interest and legal fees

iRobot's Allegations:

  • Expeditors exposed systems through inattentiveness and negligence

  • Lacked proper business continuity plans

  • Breached contractual obligations for 24-hour shipping and 4-hour system updates

Fallout

iRobot's Direct Costs:

  • $900,000 in retailer refunds

  • $23,000 in expedited shipping

  • $1.1 million in new logistics provider transition costs

  • $1 million in additional storage and back charges

  • Physical counting and transportation of 12,000 pallets on 207 rented trailers

Foreseeable?

Critical Question: Was this foreseeable?

  • iRobot argued Expeditors' own 10-K filing identified cyberattack as a foreseeable risk

  • Failure to implement risk mitigation despite known risks

  • Demonstrates the business reality: Cyber resilience is fundamentally a business problem requiring both technical AND business acumen

The Cascading Effect: Expeditors → iRobot → Retailers → End Consumers

This illustrates how cyber incidents create ripple effects throughout entire supply chains, affecting multiple stakeholders and business relationships.

🔄 Reasonable and Repeatable Cybersecurity Practices

Federal Trade Commission (FTC) Mandate

Organizations implement reasonable security measures, based on their size, sophistication, and data collection practices.

FTC Mandate

Due diligence is establishing a plan, policy, and processes to protect the interests of the organization.

Due care is practising the individual activities that maintain the due diligence effort.

In today’s business environment, prudence is mandatory. Showing due diligence and due care is the only way to disprove negligence and occurrence of loss. Senior management must show due care and due diligence to reduce their culpability and liability when a loss occurs. 

CISSP Official Study Guide, 9th Edition

Take a Systematic Approach: “Rinse and Repeat”

The NIST CSF emphasizes the need for repeatable cybersecurity practices through its iterative framework. This is not a one-time exercise but an ongoing cycle of improvement.

It’s similar to ISO27001 in this regard:

NIST CSF Fig. 3: “Repeat…”

Failure to comply with the FTC mandate, may result in:

  • Charges of unfair or deceptive acts, leading to severe consequences such as corrective orders

  • Extensive oversight of cybersecurity programs for up to two decades

  • Fines of up to $40,000 per violation.

Thrive Amidst Evolving Cyber Risks

Effective leadership lies in facilitating meaningful change

John P. Kotter

Relationship Between NIST CSF and CR-MAP

Complementary Frameworks

NIST Cybersecurity Framework:

  • Provides the "what" - outcomes to achieve

  • Framework Functions: Identify, Protect, Detect, Respond, Recover, Govern

  • Flexible, risk-based approach

  • Version 2.0 current standard

CR-MAP Process:

  • Provides the "how" - practical implementation method

  • Translates CSF outcomes into actionable steps

  • Quantifies progress using 0-10 scale

  • Contextualizes for specific organizations

The CR-MAP 0-10 Scale

Purpose: Quantifies organizational maturity against NIST CSF outcomes

How It Works:

  • Each CR-MAP question maps to specific CSF outcomes

  • Organizations rate themselves 0-10 on each question

  • Lower scores indicate less maturity

  • Higher scores indicate greater implementation

Target Score Setting:

  • Organizations establish target scores aligned with:

    • Risk tolerance

    • Industry benchmarks

    • Compliance requirements

    • Resource availability

  • Target scores drive goal setting and roadmap prioritization

  • Progress measured by improvement from current to target state

Importance of Target Scores:

  • Provides clear, measurable objectives

  • Enables progress tracking over time

  • Supports resource allocation decisions

  • Facilitates communication with stakeholders

  • Creates accountability for improvement

Risk Profile Alignment

NIST CSF Risk Profiles: Organizations must match their characteristics to appropriate CSF risk profile details:

Organizational Factors:

  • Industry sector and regulations

  • Size and complexity

  • Risk tolerance

  • Threat landscape

  • Available resources

Profile Components:

  • Current state assessment

  • Target state definition

  • Gap analysis

  • Prioritization approach

📝 Three Phases of the
 Cyber Risk Management Action Plan

Overview of the 12-Month Cycle

The CR-MAP process follows a structured three-phase approach designed to be completed within one year:

  • Phase One: 30 days - Discover Top Cyber Risks

  • Phase Two: 30 days - Create Action Plan

  • Phase Three: 10 months - Maintenance and Updates

  • The 13th Month: Repeat the cycle

Outcomes:

  • Establish a robust cyber resilience program within your organization

  • Reduce cyber risk footprint

  • Significantly enhance cyber resilience

  • Positively impacting your bottom line

  • Saving substantial time

Phases:

  1. Discover your top cyber risks

  2. Make your cyber risk management action plan

  3. Perform maintenance and updates

🔍 Phase One: Discover Your Top Cyber Risks

  • Goal: Develop a rigorous prioritization method to determine your company's most critical risks

Core challenge:

As an executive, you encounter infinite cyber risks that can impact your organization, but it is crucial to prioritize them effectively, given your limited resources.

Mastering Cyber Resilience, AKYLADE

Key Activities:

  1. Identify appropriate stakeholders

  2. Create interview lists based on:

    • Role and technical ability

    • Geographic location and branch representation

  3. Conduct interviews to gather risk data

  4. Analyze network diagrams

  5. Review both qualitative and quantitative data

  6. Generate custom questionnaires tailored to the organization

  7. Create visual representations of risk data

Deliverables:

  • Top 5 Cyber Risks Report showing:

    • Organization-wide aggregate risks

    • Risks by business unit

    • Themed contextualization

    • High-level remediation advice

  • Visual charts (radar/spider charts, bar graphs, pie charts)

  • Custom questionnaire for the target organization

Preparing for Assessment: Best Practices

Understanding the Target Organization

Pre-Assessment Research:

  • Industry sector and competitive landscape

  • Regulatory environment

  • Business model and operations

  • Technology infrastructure

  • Previous security incidents or audits

  • Organizational culture and structure

Key Questions to Answer:

  • What business are they in?

  • What are their critical assets?

  • Who are their key stakeholders?

  • What regulations apply to them?

  • What is their risk appetite?

Target Score Setting:

Establish alignment with NIST CSF using the CR-MAP 0-10 scale

📝 Phase Two: Create Your Cyber Risk Management Action Plan

  • Duration: 30 days

  • Goals:

    • Ensure that every dollar invested in cyber risk management provides maximum value in mitigating the prioritized risks.

    • Manage your risks effectively and improve your competitive advantage, by adopting reasonable cybersecurity practices.

Core elements include:

4 key dimensions of business value

Every mitigation must be evaluated against these dimensions:

  1. Financial Returns - Direct cost savings or revenue protection

  2. Technical Risk Mitigation - Reduction of technical vulnerabilities

  3. Legal Risk Mitigation - Compliance and liability reduction

  4. Reliability of Operations - Improved uptime and operational continuity

Key Components

1. Personalized Cyber Risk Management Strategy

Create tailored strategies specific to your organization's:

  • Industry sector

  • Size and complexity

  • Risk tolerance

  • Resource availability

  • Compliance requirements

Contextualizing Plans for the Target Organization

Customization Factors:

Size Considerations:

  • Small organizations: Simpler processes, fewer resources

  • Medium organizations: Growing complexity, scaling challenges

  • Large organizations: Complex environments, more stakeholders

Industry-Specific Factors:

  • Healthcare: HIPAA compliance, patient data protection

  • Financial: PCI-DSS, SOX, financial regulations

  • Retail: PCI-DSS, customer data, e-commerce

  • Manufacturing: OT/IT convergence, supply chain risks

Maturity Level:

  • Starting fresh: More foundational work needed

  • Some practices in place: Build on existing foundation

  • Mature programs: Focus on optimization and gaps

Cultural Considerations:

  • Risk-averse vs. risk-tolerant

  • Hierarchical vs. flat structure

  • Technical sophistication level

  • Change readiness

2. Prioritized Implementation Roadmap

Addresses the Top 5 Cyber Risks identified in Phase One with:

  • Specific mitigations mapped to each risk

  • Custom mitigations based on questionnaire and interview data

  • Standard Operating Procedures (SOPs) for each control

  • Cost estimates for implementation

  • Resource allocation considerations

Creating a Project Roadmap

Essential Roadmap Components:

1. Timeline and Milestones

  • Phase One: 30 days for discovery

  • Phase Two: 30 days for action plan

  • Phase Three: 10 months for maintenance

  • Key decision points and reviews

2. Resource Requirements

  • Personnel (internal and external)

  • Tools and technology

  • Budget allocation

  • Time commitments from stakeholders

3. Stakeholder Engagement Plan

  • Identification of key stakeholders

  • Interview schedules

  • Communication cadence

  • Approval processes

4. Document Requirements

  • Templates to prepare

  • Data collection tools

  • Reporting formats

  • Presentation materials

3. Resource Limitation Management

Understand and plan for constraints in:

  • Time - Implementation schedules and availability

  • Money - Budget allocations and cost justifications

  • Skilled Personnel - Availability of internal expertise

Key Activities:

  • Verify each top risk is covered by mitigation roadmap

  • Rate each mitigation using the Business Value Model

  • Create custom mitigations based on organizational context

  • Develop SOPs for mitigations and controls

  • Generate cost estimates

  • Create implementation roadmap with Gantt charts

  • Assign mitigations to specific organizational units

  • Group mitigations by owner type

Change Management Tools

Force Field Analysis

Identify and analyze:

  • Driving forces - Factors supporting change

  • Restraining forces - Factors resisting change

  • Strategies to strengthen drivers and weaken restraints

Stakeholder Analysis

Map stakeholders by:

  • Level of interest in cybersecurity initiatives

  • Level of influence over outcomes

  • Appropriate engagement strategies for each group

Coordinating with Management for Buy-In

Providing Adequate Answers to Management Questions

Common Executive Concerns:

"How much will this cost?"

  • Provide cost estimates broken down by phase

  • Show ROI through risk reduction

  • Compare to cost of potential incidents

  • Demonstrate business value dimensions

"How long will this take?"

  • Clear timeline with milestones

  • Resource requirements at each phase

  • Dependencies and critical path

  • Quick wins vs. long-term efforts

"Why should we do this now?"

  • Current threat landscape

  • Regulatory requirements

  • Competitive pressures

  • Cost of inaction (use Expeditors case study)

"How do we measure success?"

  • Clear KPIs and metrics

  • Progress against target scores

  • Risk reduction quantification

  • Business impact measures

Translating Technical Topics to Layman's Terms

Communication Strategies:

Use Analogies:

  • "Firewall is like a security guard checking IDs"

  • "Encryption is like a secret code only you can read"

  • "Backups are like insurance for your data"

Focus on Business Outcomes:

  • Instead of: "We need to patch vulnerabilities"

  • Say: "We need to fix security gaps that could let attackers in"

Quantify in Business Terms:

  • Instead of: "We have a critical zero-day"

  • Say: "We have a high-priority security issue that could cost us $X if exploited"

Tell Stories:

  • Use case studies (like Expeditors)

  • Industry examples

  • "What if" scenarios specific to the organization

Visual Communication:

  • Charts showing risk levels

  • Roadmap timelines

  • Before/after comparisons

  • Heat maps of risk areas

Change Management

Key elements:

  • Communication plans to achieve buy-in

  • Addressing management questions adequately

  • Translating complex technical topics into layman's terms

  • Demonstrating business impact of cyber incidents

Key Performance Indicators (KPIs)

Establish measurable metrics to:

  • Track implementation progress

  • Demonstrate value delivery

  • Justify continued investment

  • Support continuous improvement

Phase Three: Maintenance and updates

Duration:

  • 10 months

  • When combined with phase one and phase two of the CR-MAP process, it completes the first-year cycle of the three-phase plan

Goals:

  • Maintain and continuously improve with monthly check-ins and comprehensive quarterly reviews to monitor progress

  • Bolster cyber resilience with a comprehensive approach, and by committing to ongoing vigilance

  • Opportunity to investigate and correct gaps or challenges to regain momentum

  • Acknowledge and celebrate achievements in managing cyber risks

Review Cadence:

  • Monthly check-ins - Quick progress reviews

  • Quarterly comprehensive reviews - Detailed assessment and adjustment

“Just like everything else in GRC, rinse and repeat! I hate to make it sound so uncool-or whetever- but this is the deal.

This is how you become a baller GRC Analyst: by understanding what these [CSF subcategories] are asking and being able to convey an example.”

Dr. Gerald Auger, Simply Cyber GRC Masterclass

This 👇

Not this 👇

Ray Dalio, Principles

Key Activities:

  1. Assist leadership in assigning mitigations to internal and external parties

  2. Generate updated presentations as mitigations are implemented:

    • Review completed mitigations

    • Determine numeric scores for each

    • Update charts and risk assessments with new data

  3. Explain proposed mitigations and their accomplishments:

    • Technical controls

    • Administrative controls

    • Physical controls

    • Preventative controls

    • Detective controls

    • Corrective controls

  4. Conduct ongoing reviews of cyber resiliency:

    • Create post-assessment communication plans

    • Update roadmap based on periodic reviews

    • Adjust for changing threat landscape

    • Adapt to business changes

🗓 The Thirteenth Month: Annual Cycle Repetition

Why continuous monitoring is critical:

Dynamic Threat Landscape:

  • Adversaries continually innovate

  • New attack vectors emerge constantly

  • Previous defenses become obsolete

Business Evolution:

  • Organizations undergo significant changes

  • New systems and processes are introduced

  • Business priorities shift

Cultural Reinforcement:

  • Interview process reminds employees of cyber hygiene importance

  • Keeps reasonable cybersecurity practices top-of-mind

  • Maintains organizational awareness and engagement

Continuous Improvement Mandate: The NIST CSF explicitly calls for repetition and continuous improvement. The 13th month represents the restart of the cycle, ensuring:

  • Ongoing adaptation to evolving threats

  • Alignment with changing business dynamics

  • Sustained competitive advantage

  • Continual enhancement of cyber risk management capabilities

The Five Questions

Once you have created your cyber risk management action plan, you should be able to confidently answer the five questions we asked at the beginning:

  • 🔝 What are the top five cyber risks to my organization? 


  • 💰Am I getting the biggest return possible for my cyber risk management dollars?

  • 👔 Do all our organization’s executives and leaders understand our cybersecurity plans?

  • Does everyone at work know how they can help to mitigate our top cyber risks? 


  • 🗣 What do I tell our biggest customers or stakeholders when they ask, “What are you all doing about cybersecurity?”

Bottom-Line Perspective on CR-MAP Value

1. Cultural Transformation Shifts organizational culture toward achieving reasonable cyber resilience

  • "Culture eats strategy for breakfast" - Peter Drucker

  • Embeds cybersecurity into organizational DNA

2. Legal Protection Demonstrates due diligence and due care

  • Provides evidence of reasonable security practices

  • Protects against negligence claims

  • Supports defense in legal proceedings

3. Repeatable Process Introduces "Lather, Rinse, Repeat" approach

  • Systematic and documentable

  • Meets regulatory requirements

  • Provides consistency across cycles

4. Resource Optimization Prioritizes infinite cyber risks with limited resources

  • Maximizes four types of business value

  • Ensures efficient allocation of budget

  • Focuses effort where it matters most

5. Actionable Roadmap Answers "so what, what's next?" for top cyber risks

  • Right-sized for organizational capacity

  • Achievable and measurable

  • Clear implementation plan

6. Effective Communication Enables risk management communication throughout organization

  • Executives understand cybersecurity plans

  • Technical teams know their role

  • All employees understand how they contribute

  • Stakeholders receive confident answers

7. Competitive Advantage Enhances operational reliability and market position

  • Demonstrates security maturity to customers

  • Supports business development

  • Protects reputation and brand value

👥 Fostering Security Culture

The People Problem in Cybersecurity

Key Insight: You can’t buy security culture off the shelf and plug it in! You need these cultural elements:

1. Security Awareness

  • Regular training programs

  • Phishing simulations

  • Security reminders and communications

2. Shared Responsibility

  • Every employee understands their role

  • Security is not just IT's problem

  • Active participation expected at all levels

3. Positive Reinforcement

  • Celebrate security wins

  • Recognize good security behavior

  • Make compliance easier than non-compliance

4. Leadership Commitment

  • Executive buy-in and visibility

  • Resources allocated appropriately

  • Security integrated into business decisions

5. Continuous Learning

  • Stay current with evolving threats

  • Share lessons learned from incidents

  • Adapt practices based on feedback

Measurement Considerations: CISOs should develop metrics to measure security culture effectiveness:

  • Employee participation in training

  • Reporting rates for suspicious activity

  • Reduction in successful phishing attempts

  • Speed of incident reporting

🔒 Attorney-Client Privilege Considerations

Purpose and Benefits

Primary Advantage: Retain control over cyber risk records and navigate potential disclosure requests

How It Works:

  • Communications between client and attorney are protected

  • Covered under Federal Rules of Evidence and common law

  • May extend to work product of cyber resilience practitioners working under attorney direction

Strategic Value: If an identified cyber risk manifests as a breach:

  • Without privilege: Risk prioritization decisions may be used against you

  • With privilege: Records may be protected from discovery

  • Attorney can help navigate disclosure requests

Implementation Approach

1. Engage Legal Counsel

  • In-house counsel (if available)

  • Outside attorney with cybersecurity expertise

2. Establish Formal Relationship

  • Document attorney-client relationship

  • Ensure proper contractual arrangements

  • Define scope of privileged work

3. Work Product Protection

  • Cyber resilience practitioner follows attorney's instructions

  • Proper handling and protection of cyber risk information

  • Documentation created under attorney supervision

Disadvantages to Consider

Increased Costs:

  • Legal fees for attorney involvement

  • Additional administrative overhead

  • More complex documentation requirements

Extended Timeline:

  • Legal review processes

  • More formal approval procedures

  • Additional coordination requirements

Cost-Benefit Analysis: "Based upon over two decades of commercial and business litigation experience, one of our authors can confirm that it is almost always less expensive to retain proper legal advice from a licensed attorney up front to mitigate your liability exposure than to hire a lawyer to defend your organization against litigation later on."

Important Limitations

Not Universal:

  • Concept may vary by country

  • Some limited exceptions exist

  • May not apply in all circumstances

  • Consult licensed attorney for specifics

Not Legal Advice: This course and these notes do not constitute legal advice. Always consult with qualified legal counsel in your jurisdiction.

  Conclusion and Touchpoints

CR-MAP: 3 Phases

  • First phase: focuses on discovering and assessing the top cyber risks faced by the organization

    • This phase involves prioritizing risks to allocate limited resources effectively

  • Second phase: involves creating a personalized cyber risk management action plan that addresses the top five risks identified in phase one

    • This plan considers various dimensions of business value and aims to mitigate risks while enhancing operational reliability and competitive advantage

  • Third phase: emphasizes the importance of maintaining, updating, and continuously improving the organization’s cybersecurity posture and risk management strategy

  • The 13th month 🗓 concept was introduced to emphasize the need for an ongoing and iterative approach to cyber risk management

  • Repeat the CR-MAP process annually

  • This repetition ensures continual improvement and adaptation to evolving cyber threats and the alignment of cyber risk management efforts with changing business dynamics.

Systematic approach

  • In summary, the CR-MAP process provides organizations with a structured and comprehensive framework to strengthen their cyber resilience.

  • By systematically identifying and managing cyber risks, organizations can proactively mitigate potential incidents, safeguard valuable assets, and sustain a competitive advantage in the modern digital landscape.

  • However, it is vital to emphasize the significance of perpetual vigilance, continuous improvement, and the ingrained integration of cybersecurity practices into the organization’s culture to effectively achieve these objectives.

Keep Reading