Cybersecurity compliance, governance, and disclosure practices have evolved significantly over the past decade. As we have noted in prior blog posts, the U.S. Securities and Exchange Commission is requiring cybersecurity disclosures for public companies. But public companies are not alone in being subject to threats; small and mid-size businesses are also likely targets of cyber-criminals. It is important for all businesses to regularly review and update their cybersecurity policies and procedures.
In February 2024, the National Institute of Standards and Technology (“NIST”) (an agency within the U.S. Department of Commerce) updated its Cybersecurity Framework (“CSF”) to CSF 2.0. CSF 2.0 provides guidance to industry, government agencies, and other organizations to manage cybersecurity risks. Broadening its original scope, which was primarily targeted at critical infrastructure industries such as hospitals and utilities, CSF 2.0 is designed to help organizations of all sizes and sectors to manage and reduce cybersecurity risk. Of course, cybersecurity best practices are not uniform across every organization. Best practices for a particular organization must be tailored to its unique risks and objectives, which CSF 2.0 hopes to enable.
The NIST encourages CSF 2.0 to be used to address organizational cybersecurity risk alongside other risks to the enterprise that have compliance controls in place, such as financial, data privacy, supply chain, and others. CSF 2.0 expands prior guidance and now highlights the importance of governance and supply chains. The CSF describes outcomes (or functions) that are desired, then maps to potential controls to help achieve those outcomes.
The CSF Core functions organize categories of desired outcomes:
- Govern – The overall organization’s cybersecurity risk management strategy, expectations, and policy – and how those are established, communicated, and monitored.
- Identify – Thorough understanding of the organization’s current cybersecurity risks and opportunities.
- Protect – Safeguards to manage the risks and opportunities identified in the Identify function.
- Detect – Finding and analyzing possible cybersecurity attacks and compromises.
- Respond – Actions taken in response to detected cybersecurity incidents.
- Recover – Restoration of assets and operations affected by a cybersecurity incident.
Incorporating risk management practices such as those described in CSF 2.0 will align your business with known best practices and strengthen its defenses against cybercriminals.
- Partner
Heather Hatfield represents clients in corporate investigations, white-collar crime investigations and defense involving the Foreign Corrupt Practices Act (FCPA), complex contract disputes, oil and gas litigation ...
- Partner
Blake Runions assists clients with broad range of business disputes and investigatory matters, including partnership disputes, internal investigations, and commercial litigation.
Prior to joining the Firm, Blake worked in the ...
- Associate
Jamie Godsey represents public and private corporations, partnerships, and small companies on a broad range of complex business and commercial litigation. Her experience includes a wide variety of matters such as contractual ...
Recent Posts
- Best Practices to Ensure Compliance with Upcoming Data Protection Regulations
- Government Signals Focus on AI Enforcement and Data Protection
- CSF 2.0 – An Expanded Cybersecurity Framework for all Organizations
- Anti-Corruption Enforcement: 2023 Year-In-Review
- ComEd Settlement Proves the Foreign Corrupt Practices Act Is Not Limited to Foreign Corruption
- Compliance Challenges Arising from the Use of ChatGPT and Artificial Intelligence
- Human Resources Compliance Audits (Part 2)
- Human Resources Compliance Audits (Part 1)
- U.S. Attorneys’ Offices Implement New Voluntary Self-Disclosure Policy
- Anti-Corruption Enforcement: 2022 Year-In-Review
TopicsSelect Category
ArchivesSelect Month
- June 2024
- April 2024
- March 2024
- February 2024
- October 2023
- September 2023
- August 2023
- June 2023
- March 2023
- February 2023
- November 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019