National Institute of Standards and Technology. U.S. Department of Commerce. (2021, May 12). The five functions. https://www.nist.gov/cyberframework/online-learning/five-functions This resource takes a deeper look at the Cybersecurity Framework's five Functions: Identity, Protect, Detect, Respond, and Recover and explores the value of the functions within the framework, and what is included in each function.
Saqib, N., Germanos, V., Wen Zeng, & Maglaras, L. (2020). Mapping of the security requirements of GDPR and NISD. EAI Endorsed Transactions on Security & Safety, 7(24), 1–18. This resource investigates the security requirements of the General Data Protection Regulation (GDPR) and the Directive on security of network and information systems (NISD) and incorporates what is unique about the NISD; how it overlaps with existing frameworks; and how security requirements in the GDPR influence the NISD. This mapping of requirements can help businesses and organizations to distinguish possible difficulties that may experience while conforming to GDPR and NISD and help them create a consistent cybersecurity framework and structure new security plans.
National Institute of Standards and Technology. U.S. Department of Commerce. (2021, June 2). Introduction to the framework roadmap. https://www.nist.gov/cyberframework/online-learning/introduction-framework-roadmap This resource seeks to inform readers about what the roadmap is, how it relates to the framework for improving critical infrastructure cybersecurity, and what the roadmap areas are.
Center for Internet Security. (2021). CIS critical security controls navigator. https://www.cisecurity.org/cybersecurity-tools/mapping-compliance/ This resource highlights controls and safeguards, and how they map to other security standards.
Kwon, R., Ashley, T., Castleberry, J., Mckenzie, P., & Gupta Gourisetti, S. N. (2020). Cyber threat dictionary using MITRE ATT&CK Matrix and NIST Cybersecurity Framework Mapping. 2020 Resilience Week (RWS), Resilience Week (RWS), 2020, 106–112. (Kwon et al., 2020) This resource presents a tool called the cyber threat dictionary to create attack-defense mapped frameworks.
Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., & Mahmood, S. (2020). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 45(4), 3171–3189.
https://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=142594988&authtype=sso&custid=s1229530&site=eds-live&scope=site&custid=s1229530 This resource identifies and analyzes the common cyber security vulnerabilities by conducting a systematic mapping study, in which a total, of 78 primary studies were identified and analyzed.
Sue Wang, & Furness, Z. (2018). Practical and Actionable Cybersecurity Solutions for Securing Protected Health Information. ISSA Journal, 16(5), 12–19.
https://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=129470468&authtype=sso&custid=s1229530&site=eds-live&scope=site&custid=s1229530 This resource discusses how the National Cybersecurity Center of Excellence (NCCoE) develops practical and usable cybersecurity guidance that can be adopted across industries, including the healthcare sector.