Pondurance
Speciality: Application Security and Red Team Pentesting
Cybersecurity company specializing in Managed Detection and Response (MDR) services; offers penetration testing, application security testing, and red-team exercises; 84 employees, $8M revenue, founded 2008 in Indianapolis, Indiana; ranked #5,711,096 globally and #1,712,205 in the US.
Origin of the NIST Cybersecurity Framework
The NIST Cybersecurity Framework (CSF) was developed by the National Institute of Standards and Technology, a non-regulatory agency within the U.S. Department of Commerce. It was created in response to Executive Order 13636, signed by President Obama in February 2013, which directed NIST to develop a voluntary framework to help organizations manage cybersecurity risks. The framework was first released in February 2014 after extensive collaboration between government and private sector stakeholders across critical infrastructure sectors. Version 1.1 was released in April 2018, and the most recent version 2.0 was published in February 2024.
Industry Value and Importance
The NIST CSF is highly valued because it provides a flexible, risk-based approach to cybersecurity that organizations of any size or sector can adapt to their needs. Unlike prescriptive standards, it offers a common language for understanding and managing cybersecurity risks across organizational levels, from executives to technical staff. The framework is widely adopted both domestically and internationally because it's technology-neutral, cost-effective to implement, and aligns well with other security standards and regulations. Many organizations use it to assess their cybersecurity posture, communicate about security initiatives, and demonstrate due diligence to stakeholders, partners, and regulators.
PCI DSS Certification
Origin
The Payment Card Industry Data Security Standard (PCI DSS) was created in 2004 by the major credit card companies: Visa, Mastercard, American Express, Discover, and JCB International. These companies formed the PCI Security Standards Council in 2006 to manage and evolve the standard. PCI DSS was developed in response to increasing credit card fraud and data breaches, establishing a unified set of security requirements for all organizations that store, process, or transmit cardholder data. The goal was to create consistent security measures across the payment card industry to protect sensitive payment information.
Industry Value and Importance
PCI DSS compliance is mandatory for any business that handles credit card transactions, making it one of the most critical security standards in commerce today. The certification demonstrates that an organization has implemented robust security controls, including network protection, access management, encryption, and regular security testing. Non-compliance can result in severe consequences, including substantial fines (up to $100,000 per month), increased transaction fees, loss of payment processing privileges, and reputational damage following a breach. For IT professionals, PCI DSS expertise is highly valued as organizations across all industries need qualified personnel to implement, maintain, and audit these security controls.
Cybersecurity Maturity Model Certification (CMMC)
Origin
The Cybersecurity Maturity Model Certification (CMMC) was created by the U.S. Department of Defense (DoD) in 2020 in response to increasing cybersecurity threats targeting the Defense Industrial Base (DIB). The framework was developed to ensure that defense contractors and subcontractors adequately protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) in their systems. The DoD recognized that existing self-attestation methods were insufficient to safeguard sensitive defense-related data from sophisticated cyber attacks, particularly from nation-state adversaries, prompting the need for a more rigorous, third-party verification system.
Industry Value and Importance
CMMC certification has become essential for companies seeking to do business with the Department of Defense, as it is now a contractual requirement for defense contractors. The certification demonstrates that an organization has implemented appropriate cybersecurity practices and processes to protect sensitive government information, making it a competitive differentiator in the defense contracting marketplace. Beyond compliance, CMMC helps organizations improve their overall cybersecurity posture, reduce breach risks, and build trust with government clients and partners. The tiered certification structure allows companies to align their security investments with the sensitivity of the information they handle, making it both practical and scalable across the diverse defense supply chain.
ISO 27001: Information Security Management Certification
Origin
ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.
Industry Value and Importance
ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.
- Cummins Behavioral Health
- Hylant
- Ball State University
- Joplin School District
- Hancock Health