EEF IMPACT VECTORS

The Extended Enterprise Framework Impact Vectors worksheet maps causal chain threats that plague that EEF category. Understanding Cybersecurity attack causal chains can help provide additional insight to your vulnerabilities. 

Review and Download

Additional Compliance and Security info

National Institute of Standards and Technology (NIST)

 

NIST is an organization with strong values, reflected both in our history and our current work.  NIST leadership and staff will uphold these values to ensure a high performing environment that is safe and respectful of all.

  • Perseverance: We take the long view, planning the future with scientific knowledge and imagination to ensure continued impact and relevance for our stakeholders.
  • Integrity: We are ethical, honest, independent, and provide an objective perspective.
  • Inclusivity:  We work collaboratively to harness the diversity of people and ideas, both inside and outside of NIST, to attain the best solutions to multidisciplinary challenges.  
  • Excellence: We apply rigor and critical thinking to achieve world-class results and continuous improvement in everything we do

Find out more

National Conference of State Legislatures (NCSL)

 Security breach laws typically have provisions regarding who must comply with the law (e.g., businesses, data/ information brokers, government entities, etc); definitions of “personal information” (e.g., name combined with SSN, drivers license or state ID, account numbers, etc.); what constitutes a breach (e.g., unauthorized acquisition of data); requirements for notice (e.g., timing or method of notice, who must be notified); and exemptions (e.g., for encrypted information)   All 50 US states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private or governmental entities to notify individuals of security breaches of information involving personally identifiable information. 

US Breach Compliance Requirements