Geoff Hancock, Deputy CEO and CISO for Access Point Consulting, discusses the NIST CSF versions 1.1 and 2.0. Highlights of the conversation include the role of frameworks in cybersecurity, the changes in CSF 2.0, the addition of the GV function, overdue implementation examples, and the focus on supply chain. The chapter also explores starting small with a lightweight framework, the difference between compliance and security, and the importance of supply chain risk management.
The new version of CSF introduces the governance category, emphasizing the need for cybersecurity alignment with business objectives and context.
CSF 2.0 highlights the importance of maturity in cybersecurity, prompting organizations to continuously improve their security posture to match evolving business goals and risk landscape.
Deep dives
The importance of governance in cybersecurity
The new version of the cybersecurity framework (CSF) introduces the governance category, highlighting the significance of managing and overseeing cybersecurity efforts in organizations. This category emphasizes the need for a business-to-technology handshake, where cybersecurity aligns with the overall business objectives and context. It encourages organizations to identify stakeholders, establish criteria for determining critical capabilities and services, and track legal and compliance issues. By implementing a governance framework, organizations can effectively prioritize investments, resources, and resilience strategies that align with their unique risks and mission.
Maturity as a key aspect of cybersecurity frameworks
The inclusion of the 'Identify Improvement' category in CSF 2.0 emphasizes the importance of maturity in cybersecurity. It recognizes that organizations must continuously improve their security posture to match their evolving business goals and risk landscape. This category prompts organizations to adopt a maturity model that aligns with their context and enables them to assess, measure, and communicate their progress. By embracing a maturity-based approach, businesses can demonstrate resilience, better respond to regulatory requirements like SEC reporting, and align their security practices with their future growth and protection needs.
Addressing supply chain risks
CSF 2.0 places a significant focus on supply chain risk management, recognizing the potential vulnerabilities introduced through third-party suppliers. It calls for the development of a robust supply chain risk management program that includes clear strategies, objectives, policies, and mechanisms for alignment across various organizational functions. This category encourages organizations to establish oversight and coordination mechanisms to ensure cybersecurity alignment throughout the supply chain. By addressing supply chain risks, organizations can mitigate the potential impact of breaches caused by vulnerabilities in interconnected networks and systems.
Contributing to the evolution of CSF
To actively contribute to the ongoing evolution of CSF, individuals and organizations are encouraged to provide feedback and suggestions to NIST. This input can help shape future versions of the framework and ensure its relevance and effectiveness in addressing emerging cybersecurity challenges. Suggestions for potential enhancements such as proactive cyber operations and cyber intelligence can be submitted through the NIST website, allowing the cybersecurity community to actively participate in shaping the future of CSF.
Howdy, y’all, and welcome to The Cyber Ranch Podcast! Our guest is Geoff Hancock, Deputy CEO and CISO for Access Point Consulting, Former Global Director and CISO over at World Wide Technology. He’s also a Senior Fellow and Adjunct Professor at George Washington University and has held various C-suite and executive roles at Verizon, CGI Federal Advanced Technology, Microsoft, and Advanced Cybersecurity Group. Yup! Another well-established guest. But wait! There’s more! Geoff has been involved in the creation and maintenance of the NIST CSF – the cybersecurity framework whose current version (1.1) dictates more security programs on Planet Earth than any other framework, and whose new version (2.0) will soon be ratified and finalized. 2.0 DRAFT and request for comments have already come out and the comments period is now closed. I asked Geoff to join us here at the ‘Ranch to talk CSF 2.0 with us:
Tell us about your history and relationship with NIST CSF
Let’s talk briefly about the role of frameworks in cybersecurity. I’m thinking of the “compliance != security” mantra here.
0 vs 1.1 – what are the highlights?
GV (Govern) Function added
Implementation Examples (Long overdue IMHO!)
What else?
Changes to categories – 2 less overall, but other changes as well…
I was glad to see supply chain called out in specific. That was overdue. What else was overdue?
What should have been in there that is not?
Describe the process if you would for generating a CSF – we have already seen draft and call for public feedback. What’s next?
Y'all be good now!
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode