Security Line Card
  • Security Line Card
  • Key Trends
    • Security Frameworks
    • Zero Trust
    • Secure Access Service Edge
    • Secure & Protect The Cloud
    • Identity & Access Management (IAM)
    • Managed Security Services
    • Vulnerability Management
    • Security Awareness Training
    • Email & Endpoint Protection
    • Business Continuity
    • Ransomware Protection
  • Line Cards
    • Cloud Security Line Card
    • Consumer Technology ↗
    • DC/POS Line Card ↗
    • Emerging Business Group
    • Security Services (DXS) ↗
    • Smart Surveillance and Security Line Card ↗
    • UCC Line Card ↗
  • Resources
    • Business Transformation Center (BTC)
    • Digital Transformation Playbooks ↗
    • Financial Solutions ↗
    • Imagine Next ↗
      • Imagine Next Data Center ↗
      • Imagine Next Emerging Business Group ↗
      • Imagine Next Security ↗
      • Imagine Next Training ↗
    • Ingram Webinars & Events ↗
    • NIST Cybersecurity Framework
    • ONE Sales Tool ↗
    • Security Business Unit
    • Solution Design and Services
  • Login
Security Line Card
  • Security Line Card
  • Key Trends
    • Security Frameworks
    • Zero Trust
    • Secure Access Service Edge
    • Secure & Protect The Cloud
    • Identity & Access Management (IAM)
    • Managed Security Services
    • Vulnerability Management
    • Security Awareness Training
    • Email & Endpoint Protection
    • Business Continuity
    • Ransomware Protection
  • Line Cards
    • Cloud Security Line Card
    • Consumer Technology ↗
    • DC/POS Line Card ↗
    • Emerging Business Group
    • Security Services (DXS) ↗
    • Smart Surveillance and Security Line Card ↗
    • UCC Line Card ↗
  • Resources
    • Business Transformation Center (BTC)
    • Digital Transformation Playbooks ↗
    • Financial Solutions ↗
    • Imagine Next ↗
      • Imagine Next Data Center ↗
      • Imagine Next Emerging Business Group ↗
      • Imagine Next Security ↗
      • Imagine Next Training ↗
    • Ingram Webinars & Events ↗
    • NIST Cybersecurity Framework
    • ONE Sales Tool ↗
    • Security Business Unit
    • Solution Design and Services
  • Login

​SECURITY FRAMEWORKS

Security frameworks are your roadmap to a robust security posture

Want to build a security practice but aren’t sure where to get started? Enter security frameworks. Frameworks are designed to help organizations get a footing in security and provide a focus for elements to be covered within your business. We spoke with Jacob White, cybersecurity technology consultant II, to learn more. 
​

#1 - Security frameworks help you develop a starting point.
Many organizations don’t know how to get started with building a security practice—frameworks help guide the process. Starting with a framework will provide a roadmap or guiding light of the most important bases to cover, security concerns to address, controls to implement and recurring opportunities to manage with your customer base. A framework will guide technology resellers on the best areas to sell into, what products to offer and what services to champion. Standardizing to a security framework also helps introduce customers into the security sales cycle, a continuous process of selling, and evaluation and re-evaluation of the environment. 

#2 – There are various frameworks to choose from that meet your needs.
There are different frameworks, from the NIST CSF that Ingram Micro uses to frame up its security sales cycle, to CIS Top 20, COBIT, MITRE and others. There’s no wrong answer on which one you pick, so don’t get caught up in worrying about which is right. It’s all about what is the best fit for your company and culture. NIST is a great overall framework to start with as it’s very comprehensive with different levels varying from basic to more granular. The Center for Internet Security (CIS) Top 20 Security Controls is simplified and a great starter framework, and MITRE is advanced, very granular and focused on what attackers are doing. Get started by digging in and reading the available frameworks, picking one that’s right for you and then building a plan to implement. 
​

#3 - Ask for help from industry experts and consultants. 
Getting started with a framework can result in overload of information, but Ingram Micro’s consultant experts like the Cybersecurity Delta Force are here to help demystify the process. You don’t have to go it alone—using peer networks like Ingram Micro’s SMB Alliance and Trust X Alliance can offer valuable feedback and support from folks who have been there already. 
​
Learn more about each of the foremost frameworks:
  • Cybersecurity Framework | NIST 
  • The 20 CIS Controls & Resources | Center for Internet Security 
  • COBIT | ISACA 
Ingram Micro’s Cybersecurity Delta Force is here to help you determine what’s best for the environment in question. Leverage our team to help work through available options that meet your needs and maximize security posture. 

​

Using NIST to Secure Your Business


Security Frameworks 101

Get an introduction on security awareness training and how it protects businesses.

Security Frameworks 201

Take a deeper dive into the topic of security frameworks.

Case studies/examples in action:
Don’t just take it from us—hear from industry experts about the importance of
security frameworks with case studies and other media.

  • NIST Cybersecurity Framework – Aligning to the NIST CSF in the AWS Cloud  
  • Coalfire - Using the NIST CSF in the Healthcare Sector  
  • Using Cisco & the NIST CSF for Effective Cybersecurity Risk Management  
  • Finding Cyber Threats with ATT&CK-Based Analytics  
 

Recent examples:
See how a strong security framework can help avoid breaches across industries and verticals.

  • DC Disaster: Cybersecurity Fails of the U.S. Government 
  • The NIST CSF and the FTC (Discussion of CSF implementation failures in financial institutions)  
  • Health Systems Get a Failing Grade when it Comes to NIST Cybersecurity Best Practices  
 
​
Training resources:
Learn more from industry experts.

  • https://www.nist.gov/cyberframework 
  • https://www.cisecurity.org/white-papers/cis-controls-implementation-guide-for-industrial-control-systems/ 
  • https://attack.mitre.org/  
​Ingram Micro's top vendors in this space

Security Framework Specialists
Picture
Michael Wier
Contact Mike
Picture
Jerry Diedrichs
Contact Jerry
View on our Imagine Next Site
Security Services
2021 Key Trends
​Copyright © 2023 Ingram Micro.  All rights reserved.