<\/path><\/svg><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"With a heightened threat of cyber attacks, securing digital assets and sensitive data is paramount for businesses. The NIST Framework provides guidelines for managing cyber risks effectively. This article unpacks the five core functions: Identify, Protect, Detect, Respond, and Recover, shedding light on the significance of the framework and how its implementation can be beneficial. […]<\/p>\n","protected":false},"author":2,"featured_media":3839,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8],"tags":[113,112],"uagb_featured_image_src":{"full":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework.jpg",1200,600,false],"thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework-150x150.jpg",150,150,true],"medium":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework-300x150.jpg",300,150,true],"medium_large":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework-768x384.jpg",768,384,true],"large":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework-1024x512.jpg",1024,512,true],"1536x1536":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework.jpg",1200,600,false],"2048x2048":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework.jpg",1200,600,false],"woocommerce_thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework-300x300.jpg",300,300,true],"woocommerce_single":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework-600x300.jpg",600,300,true],"woocommerce_gallery_thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/07\/5-elements-of-nist-cyber-framework-100x100.jpg",100,100,true]},"uagb_author_info":{"display_name":"John Iannarelli","author_link":"https:\/\/fbijohn.com\/author\/john-i\/"},"uagb_comment_info":0,"uagb_excerpt":"With a heightened threat of cyber attacks, securing digital assets and sensitive data is paramount for businesses. The NIST Framework provides guidelines for managing cyber risks effectively. This article unpacks the five core functions: Identify, Protect, Detect, Respond, and Recover, shedding light on the significance of the framework and how its implementation can be beneficial.…","_links":{"self":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/3821"}],"collection":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/comments?post=3821"}],"version-history":[{"count":8,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/3821\/revisions"}],"predecessor-version":[{"id":4546,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/3821\/revisions\/4546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/media\/3839"}],"wp:attachment":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/media?parent=3821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/categories?post=3821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/tags?post=3821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}