Before I get into the details of Cybersecurity, I must inform you of my personal biases about definitions and processes. I have been immersed in Information Technology terminology and associated definitions for over 40 years. Most definitions suffer from several problems.
The first problem is they are seldom written in plain, simple language; instead, they need a dictionary or glossary to further define the words within the definition. Some definitions even contain made up or undefined terms, making the use of a glossary or dictionary impractical, if not impossible.
The second problem is many definitions contain not only what we are trying to specify, but also how we intend to achieve our goals. Mixing the two results in a conundrum when the ‘how we intend to do something’ opens up the issue of changing the definition. I was taught—and achieved great success in—writing policy documents that clearly separated the definition from the goals, allowing for the core meaning to remain stable while allowing flexibility in the approach used to provide the solutions.
The third problem is the irresistible desire of some people to amend even approved definitions or create different “frameworks” that repackage the definition, all under the guise of unique requirements. I have often described this as “creating the façade of uniqueness.”
Cybersecurity is an opportunity-rich environment that has led to the creation of several different definitions which create conflict within various communities. One of the most recent reports from the GAO (GAO-25-108436) highlighted a number of concerns with Cybersecurity to include comments such as:
When I recently became aware of a discussion on LinkedIn with the challenge to define Cybersecurity without using the words risk, attack or threat, I jumped at the opportunity to submit a proposed definition - at which time the discussion paused.
The proposed definition follows but please note: the Generative AI tool did much more than provide a simple definition; it expanded the definition to include key aspects. In my words, the definition of Cybersecurity was simplified but, including an initial set of key aspects, exposed the complexity of what we are trying to achieve. However, this is not the final definition or set of key aspects.
Cybersecurity is the practice of safeguarding computers, servers, mobile devices, electronic systems, networks, and information from harmful intrusions and unauthorized access. It encompasses the methods, technologies, and processes designed to protect the confidentiality, integrity, and availability of computing assets and online resources.
Key aspects of cybersecurity include:
I submitted this proposal to two other Generative AI tools and got positive feedback except for some minor suggested word changes. Even AI seems to be hooked on creating the facade of uniqueness.
I initially hesitated to use one of the NIST definitions because there are seven in the NIST glossary, but the glossary pointed out another path. I followed up on the following definition to find it is included in at least nine other sources. Thank you, NIST.
Since it is IDENTICAL in multiple places (NIST Glossary, CNSSI 4009, DoW Directive 8830.01, AND OMB Circular A-130), I will refer to this definition just as ‘the OMB definition.’
OMB Circular A-130, page 28:
‘Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.’
Yes, this definition may require use of a glossary to explain some of the words, but it is still extremely useful as a potential STANDARD DEFINITION.
I searched FISMA, CIS and SANS, only to discover they all differ. CIS and SANS (as of 23 September 2025) do not have formal definitions but address cybersecurity from a “framework” perspective. However, CIS suggested we think of “controls” as “best practices” to make the concept more understandable. FISMA uses an approach that is found in A-130 but from more of a programmatic way of doing business. Remember that word (programmatic) when I get to the end of this blog.
Because the definition differs slightly from my original LinkedIn proposal, I went back to my Generative AI tool, substituted this different definition, and asked if this would change any of the aspects. Based on how I asked the question, I got two different responses, both adding new aspects. It also said that the “new” definition, while more formal and infrastructure-centric, would NOT fundamentally change the core cybersecurity domains, but it would shift the emphasis and expand the scope in a few key ways.
The two new aspects based on the OMB definition are Security Architecture (includes resilience) and Security Awareness and Training. I was then asked if I wanted the aspects prioritized, and after some adjustments, I was provided the following list with explanations.
The list can be tailored to suit specific user environments, plus more than one aspect can be addressed concurrently. BUT I recognized the pattern of prioritization from various PROJECT MANAGEMENT and other analytical efforts I have made over the past four decades.
So, I asked two of my favorite Generative AI tools: Would PROJECT MANAGEMENT be the best way to address Cybersecurity, supported by risk management?
Both responded with almost the same verbiage:
“That’s a sharp observation and one that aligns with how mature organizations operationalize cybersecurity. Treating cybersecurity as a project management discipline, with risk management as its analytical backbone, shifts it from reactive firefighting to proactive governance.
Why it works:
Example: Implementing a new endpoint detection system becomes a scoped project with milestones: vendor selection → pilot deployment → full rollout → training → metrics review.
Why it is essential:
One of the tools identified a paper in the January 2025 edition of Project Management World Journal that goes into excruciating detail on Integrating Cybersecurity into Project Management. The document can be found at Integrating Cybersecurity into Project Management: Best Practices, Emerging Trends, and Strategic Approaches.
So, the burning questions I feel MUST be asked are:
Perhaps it is because Risk Management and Project management TOGETHER provide the key but neither tool alone does it completely.
A Risk Identification Template that specifically links each risk to a Performance Work Statement (PWS) might look like this (subject to a LOT of editing):
|
Risk ID |
Risk Description |
Linked PWS Task/Section |
Impact Area |
Likelihood |
Impact |
Risk Score |
Mitigation Strategy |
Responsible Party |
Status |
|
R-001 |
Legacy system lacks multi-factor authentication |
PWS §3.2.1 – Identity Management Modernization |
Access Control |
High |
High |
9 |
Deploy federated IAM with MFA |
IAM Lead |
In Progress |
|
R-002 |
Flat network architecture allows lateral movement |
PWS §3.3.4 – Network Segmentation |
Network Security |
Medium |
High |
7 |
Implement VLANs and micro-segmentation |
Network Architect |
Planned |
|
R-003 |
Sensitive data stored without encryption |
PWS §3.4.2 – Data Protection Requirements |
Data Confidentiality |
High |
High |
9 |
Apply AES-256 encryption and key rotation |
Data Steward |
In Progress |
I recommend we begin to evaluate and consider Cybersecurity using the OMB definition - and address Cybersecurity as an integrated project management/risk management effort.
P.S. If you use a generative AI tool and ask if CIS and SANS support project management, you will get an excellent discussion as to how both implicitly support the project management discipline along with a mapping of their respective approaches.