How to Use This Cybersecurity Resource

The national cybersecurity landscape encompasses a dense network of federal agencies, regulatory frameworks, compliance mandates, sector-specific requirements, and workforce standards — all of which interact across public and private sector boundaries. This reference covers the structure of that landscape, from foundational statutory authorities such as FISMA to sector-level obligations in healthcare, energy, and finance. The scope is national, with an emphasis on how institutions, practitioners, and researchers can locate relevant regulatory bodies, service categories, and authoritative standards within a single structured reference. Understanding how this resource is organized is the fastest path to the specific information relevant to a given professional context.


Purpose of this resource

This reference functions as a structured index of the U.S. cybersecurity service sector — organized around regulatory authority, professional categories, compliance standards, and threat domains rather than marketing or commercial rankings. The cybersecurity directory purpose and scope section defines the full boundary of coverage.

The cybersecurity sector in the United States operates under a layered framework. At the federal level, the Cybersecurity and Infrastructure Security Agency (CISA), the National Institute of Standards and Technology (NIST), and the Department of Defense (DoD) each carry distinct mandates. NIST's Cybersecurity Framework (CSF), now in version 2.0, provides a voluntary but widely adopted baseline across 16 critical infrastructure sectors as designated under Presidential Policy Directive 21. CISA's statutory authority derives from the Cybersecurity and Infrastructure Security Agency Act of 2018 (Public Law 115-278). These are not background details — they are the structural coordinates that define which regulations apply to which organizations.

The resource catalogs both mandatory compliance domains (such as the Cybersecurity Maturity Model Certification for DoD contractors) and voluntary frameworks (such as the NIST Cybersecurity Framework), making the distinction between regulatory obligation and best-practice guidance explicit at every entry.


Intended users

Three primary professional categories navigate this resource with distinct objectives:

  1. Compliance and legal professionals — Attorneys, GRC analysts, and compliance officers searching for the regulatory instruments that apply to their organization's sector. Relevant anchors include sector-specific cybersecurity regulations, state cybersecurity laws overview, and cyber incident reporting requirements.

  2. Cybersecurity practitioners and vendors — Security engineers, managed service providers, and technology vendors assessing how federal standards such as zero-trust architecture mandates (per OMB Memorandum M-22-09) or cloud security national standards affect technical implementation or service offerings.

  3. Researchers, policy analysts, and procurement officials — Those mapping the threat environment, reviewing public-private partnership structures, or evaluating federal grant programs. Entries covering supply chain cybersecurity risks, cybersecurity public-private partnerships, and cybersecurity grants and federal programs serve this segment directly.

Academic institutions and workforce development bodies also reference the cybersecurity workforce national and cybersecurity certifications guide sections when assessing NICE Framework alignment or hiring standards.


How to navigate

The resource is organized into five functional zones, each addressing a distinct layer of the cybersecurity landscape:

  1. Regulatory and statutory framework — Covers federal law, executive orders, and agency mandates. Starting points: US cybersecurity regulatory framework, federal cybersecurity agencies, and cybersecurity executive orders.

  2. Sector-specific obligations — Covers vertical regulatory regimes including HIPAA for healthcare, NERC CIP for the energy sector, and GLBA/DORA considerations for financial institutions. See healthcare cybersecurity national, energy sector cybersecurity, and financial sector cybersecurity.

  3. Threat landscape and incident categories — Covers nation-state actors, ransomware, and supply chain vectors as classified by CISA and the Office of the Director of National Intelligence (ODNI). See national cyber threat landscape and nation-state cyber threats.

  4. Technical and architectural standards — Covers NIST SP 800-series publications, zero-trust architecture requirements, OT/ICS-specific controls, and cloud security baselines. See zero-trust architecture federal and OT/ICS cybersecurity.

  5. Workforce, certification, and awareness — Covers NICE Framework job categories, DoD 8140 certification requirements, and CISA-led awareness programs. See cybersecurity certifications guide and national cybersecurity awareness programs.

Regulatory vs. framework entries — a key distinction:
Regulatory entries (FISMA, CMMC, CIRCIA) describe mandatory obligations with enforcement mechanisms and penalty structures. Framework entries (NIST CSF, ISO/IEC 27001) describe voluntary or contractually referenced standards without direct federal enforcement authority. Conflating these two categories is one of the most common errors in compliance planning. Each entry in this reference explicitly identifies which category applies.


What to look for first

The entry point depends on organizational context:

The cybersecurity glossary resolves terminology conflicts across frameworks — a practical first stop when a term carries different definitions under NIST, CISA, and DoD usage simultaneously.

References

📜 3 regulatory citations referenced  ·  ✅ Citations verified Feb 26, 2026  ·  View update log

Explore This Site

Regulations & Safety Regulatory References
Topics (35)
Tools & Calculators Data Breach Cost Estimator