Podcast
Root Causes 374: NIST Cyber Security Framework 2 Released


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 1, 2024
NIST Cyber Security Framework version 2.0 is released. It includes guidance on identity management and authentication. In this first episode of a series, we describe this framework's basic structure and its effect on industry.
Podcast Transcript
Lightly edited for flow and brevity.
Yes, it is trying to be all things to all people, you know, in a way, right? Cybersecurity framework but I've never seen NIST do such a good job at saying, hey, if you're a small, medium-sized business, if you are big enterprise, if you are, you know, critical infrastructure or whatever, here's the way of looking at CSF 2.0. And that used to be done kind of a little bit more piecemeal. They used to put out the big, humongous chunky guidance and then you had to figure it out for yourself and then they come out with guides saying, oh, by the way, here's how to interpret this gigantic thing. And I think they realized that they needed to make it a lot better to be consumable. And I don't see enough people talking about that being, you know, it's just there was obviously an enormous amount of work done to make it easier to consume and I congratulate them for doing that.
But Tim, I think this is probably going to be a series of podcasts. I don’t know. Maybe two, three more. And if you guys know anything about the Cybersecurity Framework, and how it's been used in the past, you've heard words like, govern, identify, protect, detect, respond, recover. Right?
So that's important. So you're probably a government department and you are architecting your security architecture, you're now going to be bound by this. I would say there's other areas that the US government has called on, such as critical infrastructure. Critical infrastructure will be bound to some of this, right, because they are legislated. They are regulated. So that's, you know, it's all the legislative and regulated parts of industry that have to answer to the US government.
So they have - - it says big circle. In the middle of circle is NIST Cybersecurity Framework. Around that is as a circle, and that circle is labeled as govern and then all of the other ones that I just mentioned - identify, protect, detect, respond, recover - are individual portions of a circle around govern. And I find that fascinating and I'll tell you why.

