SlideShare a Scribd company logo
1 of 22
Download to read offline
The NIST Cybersecurity Framework (CSF):
The journey from CSF 1.1 to 2.0
by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001
www.patreon.com/AndreyProzorov
1.0, 08.08.2023 (CSF 2.0 draft)
Agenda
2
1. What is the Framework (CSF 1.1)?
2. Components of the Framework (CSF 1.1)
3. Why is NIST deciding to update the
Framework now toward CSF 2.0?
4. Timeline
5. The NIST Cybersecurity Framework 2.0
(draft)
6. Significant Updates
7. New title and Scope
8. Purpose (CSF 2.0 draft)
9. The new function (Govern) and
changes in Categories and Subcategories
10. Implementation Examples and
Informative References
11. Framework Profiles
12. New criteria for TIERs
13. Cybersecurity and Privacy
14. What is next?
3
What is the Framework?
”Framework for Improving Critical Infrastructure Cybersecurity”
The Framework is voluntary guidance, based on existing
standards, guidelines, and practices for organizations to better
manage and reduce cybersecurity risk.
In addition to helping organizations manage and reduce risks, it
was designed to foster risk and cybersecurity management
communications amongst both internal and external
organizational stakeholders.
www.nist.gov/cyberframework
Current revision: CSF 1.1, April 16, 2018
Draft: CSF 2.0, August 08, 2023
NIST expects to publish CSF 2.0 early in 2024
4
Components of the
Framework
(CSF 1.1)
The Cybersecurity Framework consists of three main components: the
Core, Implementation Tiers, and Profiles.
The Framework Core provides a set of desired cybersecurity activities
and outcomes using common language that is easy to understand. The
Core guides organizations in managing and reducing their cybersecurity
risks in a way that complements an organization’s existing cybersecurity
and risk management processes.
The Framework Implementation Tiers assist organizations by
providing context on how an organization views cybersecurity risk
management. The Tiers guide organizations to consider the appropriate
level of rigor for their cybersecurity program and are often used as a
communication tool to discuss risk appetite, mission priority, and
budget.
Framework Profiles are an organization’s unique alignment of their
organizational requirements and objectives, risk appetite, and resources
against the desired outcomes of the Framework Core. Profiles are
primarily used to identify and prioritize opportunities for improving
cybersecurity at an organization.
5
Why is NIST deciding to
update the Framework
now toward CSF 2.0?
The NIST Cybersecurity Framework was intended to be a living
document that is refined, improved, and evolves over time.
These updates help the Framework keep pace with technology and
threat trends, integrate lessons learned, and move best practice to
common practice.
NIST initially produced the Framework in 2014 and updated it in April
2018 with CSF 1.1. Based on stakeholder feedback, in order to reflect
the ever-evolving cybersecurity landscape and to help organizations
more easily and effectively manage cybersecurity risk, NIST is working
on a new, more significant update to the Framework: CSF 2.0.
www.nist.gov/cyberframework/updating-nist-cybersecurity-framework-
journey-csf-20
6
We are here!
7
csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-20/ipd
8
Significant Updates
1. Recognition of the broad use of the Framework
(New Title and Wider scope)
2. New Function, Govern, and changes in the Categories
and Subcategories
3. Increased guidance on CSF implementation
(Profiles and Examples)
4. Emphasized cybersecurity supply chain risk management
(C-SCRM) (see also NIST SP 800-161r1)
5. Clarified understanding of cybersecurity measurement
and assessment (see also NIST SP 800-55)
6. Alignment (and integration) with other Frameworks and
standards. New references will be added later.
(see also Cybersecurity and Privacy Reference Tool
(CPRT) - https://csrc.nist.gov/Projects/cprt)
9
New title and Scope
CSF 1.1 CSF 2.0 (draft)
“Framework for Improving
Critical Infrastructure
Cybersecurity”
“The NIST Cybersecurity
Framework 2.0”
The Framework (2.0) is designed to be used by organizations of all
sizes and sectors, including industry, government, academia, and
non-profit organizations.
The Framework’s taxonomy and referenced standards, guidelines,
and practices are not country-specific, and previous versions of the
Framework have been successfully leveraged by many
governments and other organizations outside of the United States.
10
Purpose
(CSF 2.0 draft)
The framework (2.0) can be used to understand, assess, prioritize, and communicate
about cybersecurity risks.
Understand and Assess:
• Describe an organization’s current or target cybersecurity posture within and across
organizations, sectors, or business units.
• Determine where an organization may have cybersecurity gaps, including with respect
to existing or emerging threats or technologies, and assess progress toward
addressing those gaps.
• Align policy, business, and technological approaches to managing cybersecurity risks
across an entire organization or in a more focused area, such as a portion of the
organization, a specific technology, or technology suppliers.
Prioritize:
• Prioritize opportunities to improve cybersecurity risk management.
• Identify, organize, and prioritize actions for reducing cybersecurity risks that align with
the organization’s mission, legal and regulatory requirements, and risk management
and governance expectations.
• Inform decisions about cybersecurity-related workforce needs and capabilities.
Communicate:
• Provide a common language for communicating with internal and external parties
about cybersecurity risks, capabilities, needs, and expectations.
• Complement an organization’s risk management process by presenting a concise way
for executives and others to distill the fundamental concepts of cybersecurity risk so
that they express at a high level risks to be managed and how their organization uses
cybersecurity standards, guidelines, and practices.
11
The new function
(Govern) and changes
in Categories and
Subcategories
12
CSF 1.1 CSF 2.0 (draft)
- Govern (GV): Establish and monitor the
organization’s cybersecurity risk management
strategy, expectations, and policy
Identify (ID): Develop an organizational
understanding to manage cybersecurity risk to
systems, people, assets, data, and capabilities.
Identify (ID): Help determine the current
cybersecurity risk to the organization.
Protect (PT): Develop and implement appropriate
safeguards to ensure delivery of critical services.
Protect (PT): Use safeguards to prevent or
reduce cybersecurity risk.
Detect (DE): Develop and implement appropriate
activities to identify the occurrence of a cybersecurity
event.
Detect (DE): Find and analyze possible
cybersecurity attacks and compromises.
Respond (RS): Develop and implement appropriate
activities to take action regarding a detected
cybersecurity incident.
Respond (RS): Take action regarding a
detected cybersecurity incident.
Recover (RC): Develop and implement appropriate
activities to maintain plans for resilience and to restore
any capabilities or services that were impaired due to
a cybersecurity incident.
Recover (RC): Restore assets and operations
that were impacted by a cybersecurity incident.
13
CSF 1.1 CSF 2.0 draft
5 Functions 6 Functions
23 Categories 22 Categories
108 Subcategories ?106 Subcategories
(will be changed)
14
Implementation
Examples and
Informative References
Informative References are standards, guidelines, regulations, and other
resources to help inform how an organization achieves the Functions,
Categories, and Subcategories.
Implementation Examples provide notional examples of concise, action-
oriented steps to help achieve the outcomes of the Subcategories in addition
to the guidance provided by Informative References. The examples are not a
comprehensive list of all actions that could be taken by an organization to
achieve an outcome, nor do they represent a baseline of required actions to
address cybersecurity risk.
15
Implementation
Examples (≈360)
(used as controls)
16
Framework Profiles
The Framework’s mechanism for describing an organization’s
current or target cybersecurity posture in terms of the Core’s
outcomes is called a Framework Profile (Profile).
A Current Profile covers the Core’s outcomes that an organization is
currently achieving (or attempting to achieve) and characterizes how or to
what extent each outcome is being achieved.
A Target Profile covers the desired outcomes that an organization has
selected and prioritized from the Core for achieving its cybersecurity risk
management objectives.
17
Steps for Creating and
Using Profiles
Replaced 3.2 Establishing or Improving a Cybersecurity Program (CSF 1.1)
18
New criteria for TIERs
CSF 1.1 CSF 2.0 draft
Tier 1: Partial
Tier 2: Risk Informed
Tier 3: Repeatable
Tier 4: Adaptive
• Risk Management Process
• Integrated Risk Management
Program
• External Participation
• Cybersecurity Risk Governance
• Cybersecurity Risk Management
• Third-Party Cybersecurity Risks
19
20
Cybersecurity and
Privacy
21
What is next?
The public draft and Examples are here:
https://www.nist.gov/cyberframework/updating-nist-
cybersecurity-framework-journey-csf-20
Feedback on this CSF 2.0 Public Draft, as well as the related
Implementation Examples draft, may be submitted to
cyberframework@nist.gov by Friday, November 4, 2023
This draft will be discussed at the third CSF workshop, which
will be held this fall.
NIST does not plan to release another draft of CSF 2.0 for
comment. Feedback on this draft will inform development of
the final CSF 2.0 to be published in early 2024.
Thanks, and good luck!
www.linkedin.com/in/andreyprozorov
www.patreon.com/AndreyProzorov
22

More Related Content

What's hot

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
Carl Bradley Pate
 

What's hot (20)

NIST CSF Overview
NIST CSF OverviewNIST CSF Overview
NIST CSF Overview
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Steer Cyber Security with Only One KPI: The Cyber Risk ResilienceHow to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
ISO/IEC 27001:2022 Transition Arragements
ISO/IEC 27001:2022 Transition ArragementsISO/IEC 27001:2022 Transition Arragements
ISO/IEC 27001:2022 Transition Arragements
 

Similar to From NIST CSF 1.1 to 2.0.pdf

Framework for Improving Critical Infrastructure Cyber.docx
Framework for Improving  Critical Infrastructure Cyber.docxFramework for Improving  Critical Infrastructure Cyber.docx
Framework for Improving Critical Infrastructure Cyber.docx
budbarber38650
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
ebonyman0007
 
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
OllieShoresna
 
Analyze1. Foreign Stocka. Samsung Electronics LTD. (Korean St.docx
Analyze1. Foreign Stocka. Samsung Electronics LTD. (Korean St.docxAnalyze1. Foreign Stocka. Samsung Electronics LTD. (Korean St.docx
Analyze1. Foreign Stocka. Samsung Electronics LTD. (Korean St.docx
justine1simpson78276
 

Similar to From NIST CSF 1.1 to 2.0.pdf (20)

National Institute of Standards and Technology (NIST) Cybersecurity Framework...
National Institute of Standards and Technology (NIST) Cybersecurity Framework...National Institute of Standards and Technology (NIST) Cybersecurity Framework...
National Institute of Standards and Technology (NIST) Cybersecurity Framework...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
CIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfCIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdf
 
cybersecurity_framework_webinar_2017.pptx
cybersecurity_framework_webinar_2017.pptxcybersecurity_framework_webinar_2017.pptx
cybersecurity_framework_webinar_2017.pptx
 
INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK Sultan
INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK SultanINFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK Sultan
INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK Sultan
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
Framework for Improving Critical Infrastructure Cyber.docx
Framework for Improving  Critical Infrastructure Cyber.docxFramework for Improving  Critical Infrastructure Cyber.docx
Framework for Improving Critical Infrastructure Cyber.docx
 
Framework for Improving Critical Infrastructure Cybersecurity - Nist.cswp.041...
Framework for Improving Critical Infrastructure Cybersecurity - Nist.cswp.041...Framework for Improving Critical Infrastructure Cybersecurity - Nist.cswp.041...
Framework for Improving Critical Infrastructure Cybersecurity - Nist.cswp.041...
 
Ssdf nist
Ssdf nistSsdf nist
Ssdf nist
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdfMicrosoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
Microsoft_Cyber_Offerings_Mapped_to_Security_Frameworks_EN_US.pdf
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
 
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
 
framework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptxframework_update_report-yer20170301.pptx
framework_update_report-yer20170301.pptx
 
Analyze1. Foreign Stocka. Samsung Electronics LTD. (Korean St.docx
Analyze1. Foreign Stocka. Samsung Electronics LTD. (Korean St.docxAnalyze1. Foreign Stocka. Samsung Electronics LTD. (Korean St.docx
Analyze1. Foreign Stocka. Samsung Electronics LTD. (Korean St.docx
 

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001

More from Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 (20)

pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
 
ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)ISO Survey 2022: ISO 27001 certificates (ISMS)
ISO Survey 2022: ISO 27001 certificates (ISMS)
 
12 Best Privacy Frameworks
12 Best Privacy Frameworks12 Best Privacy Frameworks
12 Best Privacy Frameworks
 
Cybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdfCybersecurity Frameworks for DMZCON23 230905.pdf
Cybersecurity Frameworks for DMZCON23 230905.pdf
 
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesMy 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
ISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdfISO Survey 2021: ISO 27001.pdf
ISO Survey 2021: ISO 27001.pdf
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
Supply management 1.1.pdf
Supply management 1.1.pdfSupply management 1.1.pdf
Supply management 1.1.pdf
 
Employee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdfEmployee Monitoring and Privacy.pdf
Employee Monitoring and Privacy.pdf
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdfGDPR EU Institutions and bodies.pdf
GDPR EU Institutions and bodies.pdf
 
Data protection RU vs EU
Data protection RU vs EUData protection RU vs EU
Data protection RU vs EU
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

From NIST CSF 1.1 to 2.0.pdf

  • 1. The NIST Cybersecurity Framework (CSF): The journey from CSF 1.1 to 2.0 by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001 www.patreon.com/AndreyProzorov 1.0, 08.08.2023 (CSF 2.0 draft)
  • 2. Agenda 2 1. What is the Framework (CSF 1.1)? 2. Components of the Framework (CSF 1.1) 3. Why is NIST deciding to update the Framework now toward CSF 2.0? 4. Timeline 5. The NIST Cybersecurity Framework 2.0 (draft) 6. Significant Updates 7. New title and Scope 8. Purpose (CSF 2.0 draft) 9. The new function (Govern) and changes in Categories and Subcategories 10. Implementation Examples and Informative References 11. Framework Profiles 12. New criteria for TIERs 13. Cybersecurity and Privacy 14. What is next?
  • 3. 3 What is the Framework? ”Framework for Improving Critical Infrastructure Cybersecurity” The Framework is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders. www.nist.gov/cyberframework Current revision: CSF 1.1, April 16, 2018 Draft: CSF 2.0, August 08, 2023 NIST expects to publish CSF 2.0 early in 2024
  • 4. 4 Components of the Framework (CSF 1.1) The Cybersecurity Framework consists of three main components: the Core, Implementation Tiers, and Profiles. The Framework Core provides a set of desired cybersecurity activities and outcomes using common language that is easy to understand. The Core guides organizations in managing and reducing their cybersecurity risks in a way that complements an organization’s existing cybersecurity and risk management processes. The Framework Implementation Tiers assist organizations by providing context on how an organization views cybersecurity risk management. The Tiers guide organizations to consider the appropriate level of rigor for their cybersecurity program and are often used as a communication tool to discuss risk appetite, mission priority, and budget. Framework Profiles are an organization’s unique alignment of their organizational requirements and objectives, risk appetite, and resources against the desired outcomes of the Framework Core. Profiles are primarily used to identify and prioritize opportunities for improving cybersecurity at an organization.
  • 5. 5 Why is NIST deciding to update the Framework now toward CSF 2.0? The NIST Cybersecurity Framework was intended to be a living document that is refined, improved, and evolves over time. These updates help the Framework keep pace with technology and threat trends, integrate lessons learned, and move best practice to common practice. NIST initially produced the Framework in 2014 and updated it in April 2018 with CSF 1.1. Based on stakeholder feedback, in order to reflect the ever-evolving cybersecurity landscape and to help organizations more easily and effectively manage cybersecurity risk, NIST is working on a new, more significant update to the Framework: CSF 2.0. www.nist.gov/cyberframework/updating-nist-cybersecurity-framework- journey-csf-20
  • 8. 8 Significant Updates 1. Recognition of the broad use of the Framework (New Title and Wider scope) 2. New Function, Govern, and changes in the Categories and Subcategories 3. Increased guidance on CSF implementation (Profiles and Examples) 4. Emphasized cybersecurity supply chain risk management (C-SCRM) (see also NIST SP 800-161r1) 5. Clarified understanding of cybersecurity measurement and assessment (see also NIST SP 800-55) 6. Alignment (and integration) with other Frameworks and standards. New references will be added later. (see also Cybersecurity and Privacy Reference Tool (CPRT) - https://csrc.nist.gov/Projects/cprt)
  • 9. 9 New title and Scope CSF 1.1 CSF 2.0 (draft) “Framework for Improving Critical Infrastructure Cybersecurity” “The NIST Cybersecurity Framework 2.0” The Framework (2.0) is designed to be used by organizations of all sizes and sectors, including industry, government, academia, and non-profit organizations. The Framework’s taxonomy and referenced standards, guidelines, and practices are not country-specific, and previous versions of the Framework have been successfully leveraged by many governments and other organizations outside of the United States.
  • 10. 10 Purpose (CSF 2.0 draft) The framework (2.0) can be used to understand, assess, prioritize, and communicate about cybersecurity risks. Understand and Assess: • Describe an organization’s current or target cybersecurity posture within and across organizations, sectors, or business units. • Determine where an organization may have cybersecurity gaps, including with respect to existing or emerging threats or technologies, and assess progress toward addressing those gaps. • Align policy, business, and technological approaches to managing cybersecurity risks across an entire organization or in a more focused area, such as a portion of the organization, a specific technology, or technology suppliers. Prioritize: • Prioritize opportunities to improve cybersecurity risk management. • Identify, organize, and prioritize actions for reducing cybersecurity risks that align with the organization’s mission, legal and regulatory requirements, and risk management and governance expectations. • Inform decisions about cybersecurity-related workforce needs and capabilities. Communicate: • Provide a common language for communicating with internal and external parties about cybersecurity risks, capabilities, needs, and expectations. • Complement an organization’s risk management process by presenting a concise way for executives and others to distill the fundamental concepts of cybersecurity risk so that they express at a high level risks to be managed and how their organization uses cybersecurity standards, guidelines, and practices.
  • 11. 11 The new function (Govern) and changes in Categories and Subcategories
  • 12. 12 CSF 1.1 CSF 2.0 (draft) - Govern (GV): Establish and monitor the organization’s cybersecurity risk management strategy, expectations, and policy Identify (ID): Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities. Identify (ID): Help determine the current cybersecurity risk to the organization. Protect (PT): Develop and implement appropriate safeguards to ensure delivery of critical services. Protect (PT): Use safeguards to prevent or reduce cybersecurity risk. Detect (DE): Develop and implement appropriate activities to identify the occurrence of a cybersecurity event. Detect (DE): Find and analyze possible cybersecurity attacks and compromises. Respond (RS): Develop and implement appropriate activities to take action regarding a detected cybersecurity incident. Respond (RS): Take action regarding a detected cybersecurity incident. Recover (RC): Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. Recover (RC): Restore assets and operations that were impacted by a cybersecurity incident.
  • 13. 13 CSF 1.1 CSF 2.0 draft 5 Functions 6 Functions 23 Categories 22 Categories 108 Subcategories ?106 Subcategories (will be changed)
  • 14. 14 Implementation Examples and Informative References Informative References are standards, guidelines, regulations, and other resources to help inform how an organization achieves the Functions, Categories, and Subcategories. Implementation Examples provide notional examples of concise, action- oriented steps to help achieve the outcomes of the Subcategories in addition to the guidance provided by Informative References. The examples are not a comprehensive list of all actions that could be taken by an organization to achieve an outcome, nor do they represent a baseline of required actions to address cybersecurity risk.
  • 16. 16 Framework Profiles The Framework’s mechanism for describing an organization’s current or target cybersecurity posture in terms of the Core’s outcomes is called a Framework Profile (Profile). A Current Profile covers the Core’s outcomes that an organization is currently achieving (or attempting to achieve) and characterizes how or to what extent each outcome is being achieved. A Target Profile covers the desired outcomes that an organization has selected and prioritized from the Core for achieving its cybersecurity risk management objectives.
  • 17. 17 Steps for Creating and Using Profiles Replaced 3.2 Establishing or Improving a Cybersecurity Program (CSF 1.1)
  • 18. 18 New criteria for TIERs CSF 1.1 CSF 2.0 draft Tier 1: Partial Tier 2: Risk Informed Tier 3: Repeatable Tier 4: Adaptive • Risk Management Process • Integrated Risk Management Program • External Participation • Cybersecurity Risk Governance • Cybersecurity Risk Management • Third-Party Cybersecurity Risks
  • 19. 19
  • 21. 21 What is next? The public draft and Examples are here: https://www.nist.gov/cyberframework/updating-nist- cybersecurity-framework-journey-csf-20 Feedback on this CSF 2.0 Public Draft, as well as the related Implementation Examples draft, may be submitted to cyberframework@nist.gov by Friday, November 4, 2023 This draft will be discussed at the third CSF workshop, which will be held this fall. NIST does not plan to release another draft of CSF 2.0 for comment. Feedback on this draft will inform development of the final CSF 2.0 to be published in early 2024.
  • 22. Thanks, and good luck! www.linkedin.com/in/andreyprozorov www.patreon.com/AndreyProzorov 22