Menu

NIST Cybersecurity Framework 2.0 Addresses Growing Cyberattack Threats

NIST Cybersecurity Framework 2.0 Addresses Growing Cyberattack Threats

The News: The National Institute of Standards and Technology (NIST) releases the first draft of its Cybersecurity Framework (CSF) 2.0. Comments on the document are open to the public until November 4, 2023 and the final version is slated to be released in early 2024. Additional information is available on NIST’s website.

NIST Cybersecurity Framework 2.0 Addresses Growing Cyberattack Threats

Analyst Take: The NIST CSF was first released in 2014 as a set of voluntary best practices designed to guide industries with critical infrastructure, such as banking, energy, and healthcare, on understanding, communicating about, and, ultimately, mitigating cybersecurity risk. Effectively, it provides guidelines for developing, integrating, and measuring the success of cybersecurity programs for organizations through facilitating not only systematic methodologies, but also common language to aid communication between technical and nontechnical staff. The document has since become widely regarded as the de facto industry standard, having been downloaded more than 2 million times across more than 185 countries, according to NIST.

Naturally, much has developed since the NIST CSF’s inception. Cyber-crime has risen to an immediate, board-level priority that must be addressed ubiquitously, across industries – vastly broadening the NIST CSF’s applicability and its importance, from small businesses and local schools to large government organizations. Against this backdrop, more guidance is required on how to implement framework recommendations and best practices.

At the same time, the threat landscape is constantly evolving and more difficult than ever for organizations to keep pace with. To name just a few factors, supply chain risks have emerged, and new variants and tactics for ransomware and other malware attacks are continuing to increase.

Version 2.0 of the NIST CSF includes a number of key updates and additions that respond to these new requirements:

  • Arguably most notably, it adds a sixth pillar, “Govern,” to the previously existing five (“Recover,” “Identify”, “Respond,” “Detect,” and “Protect”). This new pillar reflects the criticality of cybersecurity from the standpoint of risk to the business or organization. It adds additional context regarding individual roles and responsibilities for managing cyber-threats, while providing additional context on formulating and executing cybersecurity frameworks from an organizational perspective. Specifically, the Governance pillar covers:
    • Organizational context
    • Risk management strategy
    • Roles and responsibilities
    • Policies and procedures
  • To help streamline adoption of the framework, Version 2.0 adds “Framework Profiles” that provide guidance on implementing CSF best practices, within the context of organizations’ specific resources. While preserving the framework’s flexibility, which allows it to be tailored to organizations’ unique requirements, these profiles add examples specific to industries and use cases that help organizations from the standpoint of implementation.
  • Finally, another important update with Version 2.0 is additional clarity around how the organization’s cybersecurity posture is assessed and measured.

Along with these updates, NIST will be launching a reference tool that will allow CSF 2.0 data to be browsed, searched and exported. The objective is to help organizations utilize the framework in conjunction with other industry guidelines and standards.

For IT Operations teams, the takeaway is that, if they are not yet being held to NIST recommendations from the standpoint of technology implementations and day-to-day policies and procedures, they should be prepared to be. Collaboration with security and line of business (LOB) leaders will continue to increase, and while these conversations may not always be easy, the NIST CSF Version 2.0 represents a tool that can help to facilitate discussions, conceptual development of cybersecurity policies, and their implementation.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other Insights from The Futurum Group:

Tech Giants and White House Join Forces on Safe AI Usage

NIST Launches the Trustworthy & Responsible Artificial Intelligence Resource Center

Network Resilience Coalition Debuts to Boost Data and Network Security

Author Information

Krista Case

Krista Case brings over 15 years of experience providing research and advisory services and creating thought leadership content. Her vantage point spans technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her work has appeared in major publications including eWeek, TechTarget and The Register.

Related Insights
The Storage Era is Dead; Long Live Everpure!
February 25, 2026

Storage Evolved: Everpure Takes on Data Challenges for an AI World

Brad Shimmin, VP and Practice Lead at Futurum, shares his insights on Pure Storage’s rebrand to Everpure as well as its supportive acquisition of 1touch.io, exploring why dropping "Storage" is...
Palo Alto Networks Q2 FY 2026 ARR Accelerates as Platform Strategy Scales
February 23, 2026

Palo Alto Networks Q2 FY 2026: ARR Accelerates as Platform Strategy Scales

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, analyzes Palo Alto Networks’ Q2 FY 2026 results, highlighting platformization momentum, SASE and AI SOC traction, and identity/observability...
No More Playing Koi Can Palo Alto Networks Secure the Modern Supply Chain
February 18, 2026

No More Playing Koi: Can Palo Alto Networks Secure the Modern Supply Chain?

Fernando Montenegro, VP at Futurum, analyzes Palo Alto Networks' acquisition of Koi Security, a move that shifts endpoint defense from file scanning to marketplace governance....
Can Proofpoint Secure the Intent of the Autonomous Agent
February 17, 2026

Can Proofpoint Secure the Intent of the Autonomous Agent?

Fernando Montenegro, VP at Futurum, analyzes Proofpoint’s acquisition of Acuvity and the strategic move to secure autonomous AI agents and "Read-Write AI" workflows....
Cisco Q2 FY 2026 Earnings- AI Infrastructure Momentum Lifts Results
February 13, 2026

Cisco Q2 FY 2026 Earnings: AI Infrastructure Momentum Lifts Results

Futurum Research analyzes Cisco’s Q2 FY 2026 results, highlighting AI infrastructure momentum, campus networking demand, and margin mitigation plans, with guidance reaffirming a strong FY 2026 outlook....
OpenAI Frontier Close the Enterprise AI Opportunity Gap—or Widen It
February 9, 2026

OpenAI Frontier: Close the Enterprise AI Opportunity Gap—or Widen It?

Futurum Research Analysts Mitch Ashley, Keith Kirkpatrick, Fernando Montenegro, Nick Patience, and Brad Shimmin examine OpenAI Frontier and whether enterprise AI agents can finally move from pilots to production. The...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.