Recognized Security Practices Resources
[/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.8.0″ custom_padding=”15px|0px|0|0px|false|false”][et_pb_row _builder_version=”3.25″ custom_padding=”44px|0px|42px|0px|false|false”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”recsec heading” _builder_version=”4.8.2″ text_font=”||||||||” header_font=”||||||||” header_text_align=”center” text_orientation=”center” custom_margin=”|||”]
Recognized Security Practices Resources
Get the guides and links to sites with more tools to implementation with these recognized security practices resources.
The recognized security practices resources the amendment mentions specifically are the NIST Framework (CSF) and the 405d HICP tools. The links to those current implementation guides are included below. Following the guides are links to other sites with resources related to the recognized security practices for NIST and 405d that you may find helpful.
Kardon services have been designed to use these NIST and 405d practices for years. As a member of the working group to help direct the 405d resource development and tools we have a long term committed to developing those tools for the community’s benefit. Kardon was thrilled to see those efforts recognized in this amendment.
What are recognized security practices?
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.8.2″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.8.2″ _module_preset=”default”][et_pb_text _builder_version=”4.8.2″ _module_preset=”default”][/et_pb_text][et_pb_filterable_portfolio fullwidth=”off” include_categories=”172,173″ show_title=”off” show_categories=”off” show_pagination=”off” admin_label=”Project pages with guides” _builder_version=”4.8.2″ _module_preset=”default” hover_enabled=”0″ border_width_all=”1px” border_color_all=”#3059A4″ box_shadow_style=”preset2″ custom_margin=”|||0px|false|false” custom_padding=”2px|14px|12px|10px|false|false” sticky_enabled=”0″][/et_pb_filterable_portfolio][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.8.2″ _module_preset=”default”][et_pb_column type=”4_4″ admin_label=”below guide images” _builder_version=”4.8.2″ _module_preset=”default”][et_pb_text _builder_version=”4.8.2″ _module_preset=”default”][/et_pb_text][et_pb_text admin_label=”check back paragraph” _builder_version=”4.8.2″ _module_preset=”default”]Check back regularly. As the information is updated we will provide more direct links to guides here as well as additional site links below.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Other Sites section” _builder_version=”4.8.2″ custom_padding=”0|0px|4px|0px|false|false” custom_css_main_element=”background-color: white!important;”][et_pb_row admin_label=”other sites header” _builder_version=”4.8.2″ custom_padding=”44px|0px|31px|0px|false|false”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.8.2″ text_font=”||||||||” header_font=”||||||||” header_text_align=”center” text_orientation=”center” custom_margin=”|||”]
Other Sites
Additional recognized security practices content pages.
National Institute of Standards and Technology
NIST developed and maintains the Cybersecurity Framework for Critical Infrastructure Industries
[/et_pb_text][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://kardonhq.com/wp-content/uploads/2021/01/HC3-and-405d-logo-scaled.jpg” alt=”405d Recognized Security Practices” title_text=”Healthcare & Public Health Sector Council – Logo” url=”https://www.phe.gov/Preparedness/planning/405d/Pages/default.aspx” url_new_window=”on” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” admin_label=”Healthcare and Public Health Sector” _builder_version=”4.8.2″ hover_enabled=”0″ show_bottom_space=”off” custom_margin=”35px||||false|false” sticky_enabled=”0″][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.8.2″ text_font=”Raleway||||||||” text_text_color=”#000000″ text_font_size=”15px” header_font=”||||||||” header_2_font=”||||||||” header_2_font_size=”21px” text_orientation=”justified” hover_enabled=”0″ sticky_enabled=”0″]CSA 405d Healthcare Industry Cybersecurity Practices
The public private partnership that advises the sector on cybersecurity improvements.
Many different publications are offered including the bimonthly newsletter The 405d Post.
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ module_class=”dct-main-client-logo” _builder_version=”3.25″][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://kardonhq.com/wp-content/uploads/2021/01/SBC-logo.png” alt=”Federal Trade Commission: SBC – Logo” title_text=”Federal Trade Commission: SBC – Logo” url=”https://www.ftc.gov/tips-advice/business-center/small-businesses/cybersecurity” url_new_window=”on” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” admin_label=”FTC Small Business Cyber” _builder_version=”4.8.2″ custom_margin=”30px||||false|false”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.8.2″ text_font=”Raleway||||||||” text_text_color=”#000000″ text_font_size=”15px” header_font=”||||||||” header_2_font=”||||||||” header_2_font_size=”21px” text_orientation=”justified”]
FTC Small Business Cyber Resources
Specifically designed to assist small business in developing and managing cybersecurity controls.
[/et_pb_text][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://kardonhq.com/wp-content/uploads/2021/01/FTC-Logo-300×66.png” alt=”Federal Trade Commission – Logo” title_text=”Federal Trade Commission – Logo” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” admin_label=”FTC” _builder_version=”4.8.2″ custom_padding=”30px||||false|false”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.8.2″ text_font=”Raleway||||||||” text_text_color=”#000000″ text_font_size=”15px” header_font=”||||||||” header_2_font=”||||||||” header_2_font_size=”21px” text_orientation=”justified”]Federal Trade Commission
FTC security guide for business based on FTC cases.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Kardon Global Footer” module_id=”dct-footer-7″ _builder_version=”3.26.3″ background_color=”rgba(234,234,234,0.88)” custom_padding=”11px|0px|54px|0px|false|false” global_module=”216028″ saved_tabs=”all”][et_pb_row _builder_version=”3.25″ min_height=”145px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://kardonhq.com/wp-content/uploads/2020/02/Kardon_logo_COLOR_72.png” align=”center” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” admin_label=”Footer logo” module_class=”dct-img” _builder_version=”4.3.2″ background_color=”rgba(0,0,0,0)” max_width=”33%” custom_padding=”|0px||||” animation_style=”fold”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ admin_label=”Contact Info Line” module_class=”et_pb_row_19.et_pb_row” _builder_version=”3.26.3″ min_height=”56px” animation_style=”zoom” animation_intensity_zoom=”5%”][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%109%%” icon_color=”#000000″ icon_placement=”left” disabled_on=”off|off|off” admin_label=”info email” module_class=”dct-footer-contact” _builder_version=”3.25.3″ header_font=”|||on|||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”20px” header_line_height=”1.6em” body_font=”||||||||” body_text_align=”left” body_text_color=”#bababa” header_font_size_tablet=”” header_font_size_phone=”15px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”13px” body_font_size_last_edited=”on|phone”]info@kardonhq.com
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%264%%” icon_color=”#000000″ icon_placement=”left” disabled_on=”off|off|off” admin_label=”phone” module_class=”dct-footer-contact” _builder_version=”3.25.3″ header_font=”|||on|||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”20px” header_line_height=”1.6em” body_font=”||||||||” body_text_align=”left” body_text_color=”#bababa” header_font_size_tablet=”” header_font_size_phone=”15px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”13px” body_font_size_last_edited=”on|phone”](678) 292-5001
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%122%%” icon_color=”#000000″ icon_placement=”left” disabled_on=”off|off|off” admin_label=”po box address” module_class=”dct-footer-contact” _builder_version=”3.25.3″ header_font=”|||on|||||” header_text_align=”left” header_text_color=”#ffffff” header_font_size=”20px” header_line_height=”1.6em” body_font=”||||||||” body_text_align=”left” body_text_color=”#bababa” header_font_size_tablet=”” header_font_size_phone=”15px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”13px” body_font_size_last_edited=”on|phone”]PO Box 2790, Tucker, GA 30085
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section]