The National Institute of Standards and Technology (NIST) released today the NIST Cybersecurity Framework (CSF) 2.0!! 🎉 😍 The #Cybersecurity Framework was first published in 2014 to help organizations reduce #cyberrisks. The second version contains new features that highlight the importance of governance and #supplychains. It reflects community feedback, the current #security landscape, and makes it easier to put the #framework into practice for organizations of all sizes and sectors, regardless of the maturity level and technical sophistication of their cybersecurity programs. #CSF V. 2.0 includes the following components: • Core: taxonomy of high-level #cyber outcomes, arranged by function (Govern, Identify, Protect, Detect, Respond, and Recover) that can help any organization manage #cyberrisks. The desired outcomes are sector, country, and technology neutral and intended to be understood by a broad audience. • Organizational Profiles: mechanism for describing an organization’s current and/or target cybersecurity posture in terms of the CSF Core’s outcomes. • Tiers (1 to 4): to be applied the Org. Profiles to characterize the rigor of an organization’s cybersecurity #riskgovernance and management practices. Some of the changes in v2.0 include: - Increased guidance on CSF implementation by providing informative references and examples of action-oriented processes to achieve CSF Subcategories. - Expanded framework profiles guidance with the addition of templates for organizations to use in creating their #profiles and action plans. Creating current and target state Organizational Profiles allows companies to implement and assess #securitycontrols faster. - "Govern" as a new function to cybersecurity #governance to cover organizational context; #riskmanagement strategy; #supplychain risk management; roles, responsibilities, and authorities; policies, processes, and procedures; and oversight. - New guidance on integrating the CSF with the #NIST #Privacy Framework and with enterprise risk management. - Updated Information on cybersecurity #assessment and clarification of tiers to focus on cybersecurity governance, risk management, and third-party considerations. The CSF’s use will vary based on an organization’s unique mission and risks. An organization may choose to handle risk in different ways — including mitigating, transferring, avoiding, or accepting negative risks and realizing, sharing, enhancing, or accepting positive risks — depending on the potential impacts and likelihoods. Regardless of its utilization, an organization may benefit from using the CSF as guidance to help it understand, assess, prioritize, and communicate cybersecurity risks and the actions that will manage those risks. The selected outcomes can be used to focus on and implement strategic decisions to improve cybersecurity postures and maintain continuity of mission-essential functions while taking priorities and available resources into account.
NIST Cybersecurity Risk Management Framework
Explore top LinkedIn content from expert professionals.
Summary
The NIST Cybersecurity Risk Management Framework (NIST CSF) is a structured guideline designed to help organizations of all sizes understand, manage, and reduce cybersecurity risks. With the release of version 2.0, the framework introduces a new "Govern" function and additional tools to support comprehensive cybersecurity governance and risk management strategies.
- Adopt a proactive stance: Shift from reactive cybersecurity measures to a continuous monitoring approach for real-time insights and better decision-making.
- Incorporate governance practices: Use the new "Govern" function to establish clear roles, responsibilities, and strategies for managing cybersecurity risks, including supply chain vulnerabilities.
- Create organizational profiles: Leverage the framework's templates to define your current and target cybersecurity postures, enabling you to assess and improve security controls efficiently.
-
-
Interesting article regarding the introduction of the Govern function is a game-changer in the field of cybersecurity management. It recognizes the evolving complexity of digital threats and the pivotal role CISOs play in an organization's defense mechanism. By providing a structured framework for comprehensive oversight, NIST CSF 2.0 empowers CISOs to transcend traditional management challenges, moving beyond piecemeal solutions to a more integrated, strategic approach. This evolution is crucial in an era where cybersecurity is not just about technical defense mechanisms but also about strategic risk management, financial planning, and executive communication. The emphasis on transparency, automation, and continuous monitoring underscores a shift towards more dynamic, responsive cybersecurity management practices. It acknowledges that in the fast-paced digital world, static spreadsheets and siloed data narratives are no longer sufficient. CISOs need real-time insights and a unified view of their cybersecurity landscape to make informed, strategic decisions. Ultimately, this development marks a significant step towards elevating the role of CISOs within the organizational hierarchy. By equipping them with the tools to provide clear, actionable insights to executive boards, NIST CSF 2.0 not only enhances the efficacy of cybersecurity measures but also reinforces the strategic importance of the CISO role in safeguarding an organization's digital future. Key Points CISOs and the Big Picture: Historically, CISOs have faced challenges in managing their operations due to a lack of oversight over their entire domain. This has made it difficult to address critical questions and ensure effective policy enforcement and progress monitoring. NIST CSF 2.0 and the Govern Function: The latest version of the NIST Cybersecurity Framework introduces a new function, "Govern", acknowledging the critical need for effective management within the CISO role. This function is designed to bridge existing gaps, allowing CISOs to adopt a more holistic management approach. Challenges in Reactive Approaches: The article outlines how current reactive approaches to cybersecurity, such as policy enforcement checks based on trending threats, are insufficient. It advocates for a proactive stance, emphasizing the need for continuous visibility into controls and program performance to anticipate and address breaches more effectively. Empowering CISOs Through Transparency and Visibility: The Govern function aims to provide a framework for effective management, stressing the importance of transparency, automated metrics, executive communication, and continuous monitoring. These elements are crucial for CISOs to gain insights into the implementation and effectiveness of security measures.
-
I respect the work of TechRepublic and I agree with many points Megan Crouse highlighted in the article linked below. Nevertheless, I disagree with the idea that CISOs have a new personal and professional risk landscape to navigate. I think the ideas I've outlined below are worthwhile for companies who are using the SolarWinds case to plan a strategy for cybersecurity in 2024 and beyond. While I have no knowledge whatsoever about the innerworkings of SolarWinds, sound security program management practices should be adopted by all organizations. ❗IMPORTANT❗ The board and executive leadership must actively engage in governance and oversight related to security program management to ensure visibility about efficiency, effectiveness, and results at appropriate levels of the organization. The CISO should never be individual solely responsible for security of the entire organization. The NIST Risk Management Framework described in SP 800-37 (and supported by the organizational hierarchy in NIST SP 800-39) has proven to be one of the best approaches to ensure everyone in the company is engaged in the security of the organization, its assets, and data. ⭐The board is responsible for defining acceptable risk for the organization. ⭐Executive management is responsible for enforcing the rules for their respective business functions. ⭐A group of people, including the CISO, work together to ensure systems, services, and applications implement the practices and controls that achieve the requirements set by the board. Organizations that invest in the people, processes, and controls required for the RMF to operate as intended will be prepared to understand and respond to the risk they face while also complying the new SEC reporting rules (the RMF addresses incident response). References: NIST SP 800-37 NIST SP 800-39 https://lnkd.in/gGzpuFHY