www.govtech.com Open in urlscan Pro
18.238.243.86  Public Scan

Submitted URL: https://content.erepublic.com/e3t/Ctc/UB+113/d2qthN04/VWVrPR5ddMJmW4GPkbV4Qq2mSW6y9Q6952ZhZyN8cZm3M5nR32W69t95C6lZ3q4W6LWMXZ7F...
Effective URL: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/whats-new-in-the-nist-cybersecurity-framework-2-0-draft?utm_camp...
Submission: On September 05 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/20544071/65ed2cb9-d1ef-4f39-b681-fb4e91129663

<form id="hsForm_65ed2cb9-d1ef-4f39-b681-fb4e91129663" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/20544071/65ed2cb9-d1ef-4f39-b681-fb4e91129663"
  class="hs-form-private hsForm_65ed2cb9-d1ef-4f39-b681-fb4e91129663 hs-form-65ed2cb9-d1ef-4f39-b681-fb4e91129663 hs-form-65ed2cb9-d1ef-4f39-b681-fb4e91129663_ac7b058d-9dbf-4653-b3af-50bf1c8554f2 hs-form stacked"
  target="target_iframe_65ed2cb9-d1ef-4f39-b681-fb4e91129663" data-instance-id="ac7b058d-9dbf-4653-b3af-50bf1c8554f2" data-form-id="65ed2cb9-d1ef-4f39-b681-fb4e91129663" data-portal-id="20544071" data-hs-cf-bound="true">
  <div>
    <div class="hs-richtext hs-main-font-element">
      <div class="List-header-title">Stay on top of the latest state &amp; local government technology trends.</div>
      <p>Sign up for GovTech Today. Delivered daily to your inbox.</p>
    </div>
  </div>
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-65ed2cb9-d1ef-4f39-b681-fb4e91129663" class="" placeholder="Enter your " for="email-65ed2cb9-d1ef-4f39-b681-fb4e91129663"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-65ed2cb9-d1ef-4f39-b681-fb4e91129663" name="email" required="" placeholder="Email Address*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="FREE NEWSLETTER SIGN UP"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1693918379147&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1686250074497&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;disableCookieSubmission&quot;:&quot;true&quot;,&quot;clonedFromForm&quot;:&quot;4b63ba82-f400-4842-b2e3-adbb676d735c&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.140 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;What’s New in the NIST Cybersecurity Framework 2.0 Draft?&quot;,&quot;pageUrl&quot;:&quot;https://www.govtech.com/blogs/lohrmann-on-cybersecurity/whats-new-in-the-nist-cybersecurity-framework-2-0-draft?utm_campaign=Newsletter%20-%20GT%20-%20GovTech%20Today&amp;utm_medium=email&amp;_hsmi=272697005&amp;_hsenc=p2ANqtz-9OOvc8J110p-QGldZL1OuWFMR7suuB9XeYma1GsxYm3gbOXyVe8vvS1vPqh840YUpA1T3mYJqfh_oT0jJUJpC_naDQL2ZziISofvXn3Y43w6JB9IE&amp;utm_content=272698739&amp;utm_source=hs_email&quot;,&quot;urlParams&quot;:{&quot;utm_campaign&quot;:&quot;Newsletter - GT - GovTech Today&quot;,&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;272697005&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz-9OOvc8J110p-QGldZL1OuWFMR7suuB9XeYma1GsxYm3gbOXyVe8vvS1vPqh840YUpA1T3mYJqfh_oT0jJUJpC_naDQL2ZziISofvXn3Y43w6JB9IE&quot;,&quot;utm_content&quot;:&quot;272698739&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;80b7509bddeade94b3f4abc09cdac0c1&quot;,&quot;__hsfp&quot;:1966805734,&quot;__hssc&quot;:&quot;59400946.1.1693918380494&quot;,&quot;__hstc&quot;:&quot;59400946.80b7509bddeade94b3f4abc09cdac0c1.1693918380493.1693918380493.1693918380493.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-ac7b058d-9dbf-4653-b3af-50bf1c8554f2&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1693918380508,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;20544071&quot;,&quot;formId&quot;:&quot;65ed2cb9-d1ef-4f39-b681-fb4e91129663&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-ac7b058d-9dbf-4653-b3af-50bf1c8554f2&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;ac7b058d-9dbf-4653-b3af-50bf1c8554f2&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.3611&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.3611&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;3611&quot;,&quot;_debug_allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1693918379309,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;What’s New in the NIST Cybersecurity Framework 2.0 Draft?\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.govtech.com/blogs/lohrmann-on-cybersecurity/whats-new-in-the-nist-cybersecurity-framework-2-0-draft?utm_campaign=Newsletter%20-%20GT%20-%20GovTech%20Today&amp;utm_medium=email&amp;_hsmi=272697005&amp;_hsenc=p2ANqtz-9OOvc8J110p-QGldZL1OuWFMR7suuB9XeYma1GsxYm3gbOXyVe8vvS1vPqh840YUpA1T3mYJqfh_oT0jJUJpC_naDQL2ZziISofvXn3Y43w6JB9IE&amp;utm_content=272698739&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.140 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_campaign\&quot;:\&quot;Newsletter - GT - GovTech Today\&quot;,\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;272697005\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz-9OOvc8J110p-QGldZL1OuWFMR7suuB9XeYma1GsxYm3gbOXyVe8vvS1vPqh840YUpA1T3mYJqfh_oT0jJUJpC_naDQL2ZziISofvXn3Y43w6JB9IE\&quot;,\&quot;utm_content\&quot;:\&quot;272698739\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1693918379310,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1693918380503,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;80b7509bddeade94b3f4abc09cdac0c1\&quot;}&quot;}]}"><iframe
    name="target_iframe_65ed2cb9-d1ef-4f39-b681-fb4e91129663" style="display: none;"></iframe>
</form>

Text Content

 * Newsletters
 * Webinars
 * Events
 * Magazine
 * Papers

 * AI
 * Computing
 * Experience
 * Safety
 * Transportation
 * Workforce
 * More
   
    * Topics
    * Center for Digital Education
    * Center for Digital Government
    * Emergency Management
    * FutureStructure
    * Special Districts
    * Digital Communities
    * Digital States
    * GovTech Top 25
    * GovTech 100

 * Search

Menu

 * AI
 * Computing
 * Experience
 * Safety
 * Transportation
 * Workforce
 * More
   
    * Topics
    * Center for Digital Education
    * Center for Digital Government
    * Emergency Management
    * FutureStructure
    * Special Districts
    * Digital Communities
    * Digital States
    * GovTech Top 25
    * GovTech 100

 * Search

CONTINUE TO SITE
✕


IE 11 NOT SUPPORTED

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.
 * Special: Communities
 * Constituents
 * Grants
 * HHS
 * Higher Ed
 * Local
 * Open Cloud
 * Network
 * Payments


Lohrmann on Cybersecurity


WHAT’S NEW IN THE NIST CYBERSECURITY FRAMEWORK 2.0 DRAFT?


NIST HAS RELEASED A DRAFT VERSION 2.0 OF THE CYBERSECURITY FRAMEWORK. HERE’S
WHAT YOU NEED TO KNOW AND HOW TO GET YOUR RECOMMENDATIONS INCLUDED.

August 27, 2023 • 
Dan Lohrmann
 * Facebook
 * LinkedIn
 * Twitter
 * Print
 * Email

Shutterstock/BEST-BACKGROUNDS
The National Institute of Standards and Technology (NIST) is seeking feedback on
their draft Cybersecurity Framework (CSF) 2.0. The release of this public draft
is an important milestone for organizations in order to provide input on the
framework before NIST finalizes it for publication sometime in 2024.

But before we summarize the draft CSF 2.0 changes, why should you care?




NIST CYBERSECURITY FRAMEWORK IS THE STANDARD



As articulated by the U.S. Federal Trade Commission (FTC), “The NIST
Cybersecurity Framework helps businesses of all sizes better understand, manage,
and reduce their cybersecurity risk and protect their networks and data. The
Framework is voluntary. It gives your business an outline of best practices to
help you decide where to focus your time and money for cybersecurity protection.
…

“You can put the NIST Cybersecurity Framework to work in your business in these
five areas: Identify, Protect, Detect, Respond, and Recover.”

As described by Vanta, “the NIST CSF compliance framework is only mandatory for
federal agencies; however, if your company plans on doing business with the
government as a contractor, partner, or vendor, you will likely need to comply
with NIST CSF.

“Outside of federal compliance, the NIST framework is voluntarily adopted by
many private sector organizations. Especially useful to small businesses, NIST
CSF helps mitigate and respond to cybersecurity threats. The NIST framework can
be customized to the individual needs and goals of each organization’s
infrastructure.”



In my experience, most state and local governments adopt CSF as their framework
of choice. There are many reasons for this, but state and local governments are
often custodians of federal data. Following NIST makes sense and works.




WHAT’S DIFFERENT IN NIST CSF 2.0?  


‍The NIST Cybersecurity Framework 2.0 initial public draft was released on Aug.
8. You can learn more details about that release and comments since version 1.1
here.

Dark Reading offered this article describing what’s different about this new
draft:

“The new version 2.0 of the popular NIST Cybersecurity Framework has expanded
beyond the original framework’s five functions of an effective cybersecurity
program — identify, protect, detect, respond, and recover — and added a sixth,
govern.

“‘It emphasizes that cybersecurity is a major source of enterprise risk, ranking
alongside legal, financial and other risks as considerations for senior
leadership,’ NIST’s new guidelines — still in the draft phase — said.

“The new framework is also intended to help support organizations of all sizes,
the agency said.

“‘With this update, we are trying to reflect current usage of the Cybersecurity
Framework, and to anticipate future usage as well,’ NIST’s lead developer of the
framework, Cherilyn Pascoe, said in the CSF 2.0 release on Aug. 8. ‘The CSF was
developed for critical infrastructure like the banking and energy industries,
but it has proved useful everywhere from schools and small businesses to local
and foreign governments.’”

Infosecurity Magazine offered this article, “NIST’s Cybersecurity Framework 2.0:
Shaping the Future of Cyber Resilience.” Here’s an excerpt:

“The inclusion of the ‘Govern’ pillar as a new function is a very important
addition and rounds out the previous core functions (Identify, Protect, Detect,
Respond and Recover).

“Larry Whiteside Jr., CISO at RegScale and President of Cyversity, told
Infosecurity that this pillar is the most significant change to the framework,
with governance increasingly underpinning all aspects of cybersecurity.

“‘An organization can set all the policies it wants, but without a mandate and
focus on governing those policies and the actions performed to enable and
perform the functions that support the policies, none of it matters. Elevating
governance to a CSF function will also promote alignment of cybersecurity
activities with enterprise risks and legal requirements,’ he explained.”

I also like this description of the new changes from JD Supra. Read their full
article, but here is one section:

 * Additional guidance on CSF implementation and tailoring for risk.
   
   * The draft provides improved and expanded guidance on implementing the CSF,
     especially for creating profiles, which tailor the CSF for particular
     situations.
   * The draft also includes implementation examples for each function’s
     subcategories to help organizations, especially smaller firms, use the CSF
     effectively.
   * One theme in both the revised and new controls is that CSF 2.0 features
     “risk acceptance” explicitly stated and greater discussion of “risk
     prioritization” and using safeguards “commensurate with risk.”
 * Additional information on cybersecurity measurement and assessment.
   
   * Version 2.0 clarifies the Framework implementation tiers to focus on
     cybersecurity governance, risk management, and third-party considerations.
   * The importance of continuous improvement is emphasized through a new
     Improvement Category in the Identify Function, as well as improvements in
     guidance on developing and updating Profiles and action plans.


This YouTube video further defines what’s new in CSF 2.0:



In addition, you can attend this free online workshop from NIST to learn more in
September.




FINAL THOUGHTS


The deadline for submitting comments is Nov. 4, 2023. I urge interested parties
to get engaged and here’s how to submit comments to this draft.

In closing, I want to point out that NIST has been doing more international
collaboration, and this CSF 2.0 has more of an international focus with global
participation. See this July 2023 article on NIST international engagement.
Here’s an excerpt:

“In the update to NIST CSF 2.0, NIST continues to work with the international
community. At NIST’s February 2023 virtual workshop on the CSF 2.0 update,
participants from Italian and New Zealand governments and Mexican industry spoke
on panels. In addition, participants joined from several countries. We are
continuing to learn and benefit from international use cases and look forward to
hearing even more in the months to come as we release our full draft 2.0!”

I applaud this international focus on cybersecurity best practices, as our
online worlds have never been more interconnected and cooperation and
collaboration are vital to defeating cyber crime.
 * Facebook
 * LinkedIn
 * Twitter
 * Print
 * Email


TAGS:

Cybersecurity
Dan Lohrmann
Daniel J. Lohrmann is an internationally recognized cybersecurity leader,
technologist, keynote speaker and author.
See More Stories by Dan Lohrmann

Dan Lohrmann

Building effective virtual government requires new ideas, innovative thinking
and hard work. From cybersecurity to cloud computing to mobile devices, Dan
discusses what’s hot and what works.

BIO / CONTACT / RSS


Latest Blog Posts
Ransomware and Data Breaches: Impacts Continue to Grow Louder
2023 Cybersecurity Awareness Month Appeal: Make Online Security Easier
Highlights from the 16th Annual MS-ISAC Meeting
Are You a Real Person? Proving You're Human Online
Book Review: Cybersecurity Threats, Malware Trends and Strategies

Stay on top of the latest state & local government technology trends.

Sign up for GovTech Today. Delivered daily to your inbox.




Never miss a story with the GovTech Today newsletter.
SUBSCRIBE


 *  * Events
    * Webinars
    * Papers
    * Explainers
    * Sponsored: Articles and Q&A Videos
    * Sponsored: In Case You Missed It
    * Industry Academy
    * Industry Navigator

 *  * About
    * Privacy & AI
    * Contact
    * Advertise

Stay Up To Date
Get smart with GovTech. Your guide to technology in state & local government.
SIGN UP FOR NEWSLETTERS
GET THE MAGAZINE


©2023 All rights reserved. e.Republic LLC
California Residents - Do Not Sell My Personal Information
 * twitter
 * youtube
 * facebook
 * linkedin



By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.

Accept All Cookies
Reject All
Cookies Settings


PRIVACY PREFERENCE CENTER




 * YOUR PRIVACY


 * TARGETING COOKIES


 * FUNCTIONAL COOKIES


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Back Button


BACK

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Reject All Allow All