{"id":15559,"date":"2023-07-06T22:23:41","date_gmt":"2023-07-06T22:23:41","guid":{"rendered":"https:\/\/oxfordcorp.com\/?p=15559"},"modified":"2023-10-17T13:28:10","modified_gmt":"2023-10-17T13:28:10","slug":"cybersecurity-program-in-nist-800-171-framework","status":"publish","type":"post","link":"https:\/\/www.oxfordcorp.com\/en\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/","title":{"rendered":"Cybersecurity Program in NIST 800-171 Framework"},"content":{"rendered":"<p><em>Learn how we helped our client develop and structure a cybersecurity program in line with the NIST 800-171 framework.<\/em><\/p>\n<p><strong>INDUSTRY<\/strong><br \/>\nConsumer &amp; Industrial<\/p>\n<p><strong>SERVICES<\/strong><br \/>\nCybersecurity<br \/>\nProgram Management<\/p>\n<p><strong>SKILLS<br \/>\n<\/strong>AWS<br \/>\nMcAfee<br \/>\nSecurity Works<br \/>\nKnowBe4<\/p>\n<p><strong>The Challenge<\/strong> One of the largest full-service general contractors, construction management firms, and construction materials producers in the US needed help developing and structuring a cybersecurity program in line with the NIST 800-171 framework. The program would include various security initiatives, such as vulnerability management, firewall remediation, SOC\/NOC, FMA implementation, NIST, patch management, and more. They were seeking a Cybersecurity Architect and Program Manager to structure and develop the program with experience in NIST 800-171.<\/p>\n<p><strong>The Solution<\/strong> Because of our long-standing relationship with this client, they knew they could count on us to provide the right talent. We connected them to an experienced Cybersecurity Program Manager who was able to provide a roadmap and strategic plan to pursue DoD Cybersecurity Maturity Model Certification (CMMC), including the deployment of AWS services for FedRAMP Moderate authorized services. The consultant managed multiple teams, including two direct reports and three vendor teams, to cover anti-malware protections in McAfee, security incident and event management in SecureWorks, anti-phishing capabilities in KnowBe4, and security awareness programs. In addition, he managed a security operations team of two Security Engineers in expanding vulnerability and security event monitoring capabilities using Qualys, McAfee, and SecurityWorks. He also consolidated and conformed the security policy documentation to align with FAR\/DFARS regulations and NIST 800-171 security requirements. Finally, he developed monthly reporting to the CIO on security operations, CMMC progress, and anti-phishing and security awareness programs.<\/p>\n<p><strong>The Result<\/strong> Due to our assistance, the client has made considerable progress toward CMMC compliance and built a robust cybersecurity program.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how we helped our client develop and structure a cybersecurity program in line with the NIST 800-171 framework.<\/p>\n","protected":false},"author":10,"featured_media":15304,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[181],"tags":[116],"category-tag":[],"class_list":["post-15559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-study","tag-consumer-industrial"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Program in NIST 800-171 Framework - Oxford Global Resources<\/title>\n<meta name=\"description\" content=\"Learn how we helped our client develop and structure a cybersecurity program in line with the NIST 800-171 framework.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Program in NIST 800-171 Framework\" \/>\n<meta property=\"og:description\" content=\"Learn how we helped our client develop and structure a cybersecurity program in line with the NIST 800-171 framework.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Oxford Global Resources\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-06T22:23:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-17T13:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"516\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Luke Summers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luke Summers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/\"},\"author\":{\"name\":\"Luke Summers\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3\"},\"headline\":\"Cybersecurity Program in NIST 800-171 Framework\",\"datePublished\":\"2023-07-06T22:23:41+00:00\",\"dateModified\":\"2023-10-17T13:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/\"},\"wordCount\":294,\"image\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg\",\"keywords\":[\"Consumer &amp; Industrial\"],\"articleSection\":[\"Case Study\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/\",\"url\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/\",\"name\":\"Cybersecurity Program in NIST 800-171 Framework - Oxford Global Resources\",\"isPartOf\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg\",\"datePublished\":\"2023-07-06T22:23:41+00:00\",\"dateModified\":\"2023-10-17T13:28:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3\"},\"description\":\"Learn how we helped our client develop and structure a cybersecurity program in line with the NIST 800-171 framework.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#primaryimage\",\"url\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg\",\"contentUrl\":\"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg\",\"width\":1600,\"height\":430,\"caption\":\"literature searches for cer compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oxfordcorp.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Program in NIST 800-171 Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#website\",\"url\":\"https:\/\/www.oxfordcorp.com\/de\/\",\"name\":\"Oxford Global Resources\",\"description\":\"Global\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oxfordcorp.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3\",\"name\":\"Luke Summers\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g\",\"caption\":\"Luke Summers\"},\"url\":\"https:\/\/www.oxfordcorp.com\/en\/insights\/author\/lsummersthiel-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Program in NIST 800-171 Framework - Oxford Global Resources","description":"Learn how we helped our client develop and structure a cybersecurity program in line with the NIST 800-171 framework.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity Program in NIST 800-171 Framework","og_description":"Learn how we helped our client develop and structure a cybersecurity program in line with the NIST 800-171 framework.","og_url":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/","og_site_name":"Oxford Global Resources","article_published_time":"2023-07-06T22:23:41+00:00","article_modified_time":"2023-10-17T13:28:10+00:00","og_image":[{"width":1920,"height":516,"url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg","type":"image\/jpeg"}],"author":"Luke Summers","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Luke Summers","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#article","isPartOf":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/"},"author":{"name":"Luke Summers","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3"},"headline":"Cybersecurity Program in NIST 800-171 Framework","datePublished":"2023-07-06T22:23:41+00:00","dateModified":"2023-10-17T13:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/"},"wordCount":294,"image":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg","keywords":["Consumer &amp; Industrial"],"articleSection":["Case Study"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/","url":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/","name":"Cybersecurity Program in NIST 800-171 Framework - Oxford Global Resources","isPartOf":{"@id":"https:\/\/www.oxfordcorp.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#primaryimage"},"image":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg","datePublished":"2023-07-06T22:23:41+00:00","dateModified":"2023-10-17T13:28:10+00:00","author":{"@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3"},"description":"Learn how we helped our client develop and structure a cybersecurity program in line with the NIST 800-171 framework.","breadcrumb":{"@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#primaryimage","url":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg","contentUrl":"https:\/\/www.oxfordcorp.com\/wp-content\/uploads\/2019\/12\/literature_searches_for_cer_compliance.jpeg","width":1600,"height":430,"caption":"literature searches for cer compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oxfordcorp.com\/insights\/case-study\/cybersecurity-program-in-nist-800-171-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oxfordcorp.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Program in NIST 800-171 Framework"}]},{"@type":"WebSite","@id":"https:\/\/www.oxfordcorp.com\/de\/#website","url":"https:\/\/www.oxfordcorp.com\/de\/","name":"Oxford Global Resources","description":"Global","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oxfordcorp.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/e880f6edc6bcf421204f294431943cd3","name":"Luke Summers","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.oxfordcorp.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d7d4c9724f33e3a19ac78af573b29ed6164c2ceffe51f72aff7df98b279e3de?s=96&d=mm&r=g","caption":"Luke Summers"},"url":"https:\/\/www.oxfordcorp.com\/en\/insights\/author\/lsummersthiel-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/posts\/15559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/comments?post=15559"}],"version-history":[{"count":0,"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/posts\/15559\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/media\/15304"}],"wp:attachment":[{"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/media?parent=15559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/categories?post=15559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/tags?post=15559"},{"taxonomy":"category-tag","embeddable":true,"href":"https:\/\/www.oxfordcorp.com\/en\/wp-json\/wp\/v2\/category-tag?post=15559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}