NIST Cybersecurity Framework 2.0 Addresses Growing Cyberattack Threats

NIST Cybersecurity Framework 2.0 Addresses Growing Cyberattack Threats

The News: The National Institute of Standards and Technology (NIST) releases the first draft of its Cybersecurity Framework (CSF) 2.0. Comments on the document are open to the public until November 4, 2023 and the final version is slated to be released in early 2024. Additional information is available on NIST’s website.

NIST Cybersecurity Framework 2.0 Addresses Growing Cyberattack Threats

Analyst Take: The NIST CSF was first released in 2014 as a set of voluntary best practices designed to guide industries with critical infrastructure, such as banking, energy, and healthcare, on understanding, communicating about, and, ultimately, mitigating cybersecurity risk. Effectively, it provides guidelines for developing, integrating, and measuring the success of cybersecurity programs for organizations through facilitating not only systematic methodologies, but also common language to aid communication between technical and nontechnical staff. The document has since become widely regarded as the de facto industry standard, having been downloaded more than 2 million times across more than 185 countries, according to NIST.

Naturally, much has developed since the NIST CSF’s inception. Cyber-crime has risen to an immediate, board-level priority that must be addressed ubiquitously, across industries – vastly broadening the NIST CSF’s applicability and its importance, from small businesses and local schools to large government organizations. Against this backdrop, more guidance is required on how to implement framework recommendations and best practices.

At the same time, the threat landscape is constantly evolving and more difficult than ever for organizations to keep pace with. To name just a few factors, supply chain risks have emerged, and new variants and tactics for ransomware and other malware attacks are continuing to increase.

Version 2.0 of the NIST CSF includes a number of key updates and additions that respond to these new requirements:

  • Arguably most notably, it adds a sixth pillar, “Govern,” to the previously existing five (“Recover,” “Identify”, “Respond,” “Detect,” and “Protect”). This new pillar reflects the criticality of cybersecurity from the standpoint of risk to the business or organization. It adds additional context regarding individual roles and responsibilities for managing cyber-threats, while providing additional context on formulating and executing cybersecurity frameworks from an organizational perspective. Specifically, the Governance pillar covers:
    • Organizational context
    • Risk management strategy
    • Roles and responsibilities
    • Policies and procedures
  • To help streamline adoption of the framework, Version 2.0 adds “Framework Profiles” that provide guidance on implementing CSF best practices, within the context of organizations’ specific resources. While preserving the framework’s flexibility, which allows it to be tailored to organizations’ unique requirements, these profiles add examples specific to industries and use cases that help organizations from the standpoint of implementation.
  • Finally, another important update with Version 2.0 is additional clarity around how the organization’s cybersecurity posture is assessed and measured.

Along with these updates, NIST will be launching a reference tool that will allow CSF 2.0 data to be browsed, searched and exported. The objective is to help organizations utilize the framework in conjunction with other industry guidelines and standards.

For IT Operations teams, the takeaway is that, if they are not yet being held to NIST recommendations from the standpoint of technology implementations and day-to-day policies and procedures, they should be prepared to be. Collaboration with security and line of business (LOB) leaders will continue to increase, and while these conversations may not always be easy, the NIST CSF Version 2.0 represents a tool that can help to facilitate discussions, conceptual development of cybersecurity policies, and their implementation.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other Insights from The Futurum Group:

Tech Giants and White House Join Forces on Safe AI Usage

NIST Launches the Trustworthy & Responsible Artificial Intelligence Resource Center

Network Resilience Coalition Debuts to Boost Data and Network Security

Author Information

Krista Case

Krista Case brings over 15 years of experience providing research and advisory services and creating thought leadership content. Her vantage point spans technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her work has appeared in major publications including eWeek, TechTarget and The Register.

Related Insights
Commvault Q4 FY 2026 Earnings Extend SaaS And Identity Momentum
May 1, 2026

Commvault Q4 FY 2026 Earnings Extend SaaS And Identity Momentum

Fernando Montenegro, VP at Futurum, analyzes Commvault Q4 FY 2026 earnings, focusing on SaaS scale, identity resilience momentum, multi-product adoption, and what management’s FY 2027 guidance implies for platform execution....
Alphabet Q1 FY 2026 AI Demand Surges as Cloud Capacity Caps Growth
May 1, 2026

Alphabet Q1 FY 2026: AI Demand Surges as Cloud Capacity Caps Growth

Futurum Research analyzes Alphabet’s Q1 FY 2026 earnings, focusing on Cloud AI demand, Search monetization changes, and rising capacity investment tied to TPUs and infrastructure....
Engineering Determinism: Lovelace AI Seeks to Replace Naive RAG with Enterprise-Scale Context Engines
April 29, 2026

Engineering Determinism: Lovelace AI Seeks to Replace Naive RAG with Enterprise-Scale Context Engines

Brad Shimmin, VP and Practice Lead at Futurum, explores the launch of Lovelace AI and its Elemental platform. Discover how this new enterprise context engine uses knowledge graphs and entity...
From Silicon to Security: Architecting the Autonomous Enterprise at Google Cloud Next 2026
April 29, 2026

From Silicon to Security: Architecting the Autonomous Enterprise at Google Cloud Next 2026

Brad Shimmin, Nick Patience, Brendan Burke, and Fernando Montenegro analyze the Google Cloud Agentic Strategy from Next 2026. They explore how Gemini Enterprise, the Virgo network, and the Wiz integration...
Is Brave Setting a New Standard for Browser Privacy, or Just Raising the Bar?
April 28, 2026

Is Brave Setting a New Standard for Browser Privacy, or Just Raising the Bar?

Brave claims superior privacy defaults via three-layered tracker and fingerprint blocking, requiring no user setup. As regulators scrutinize tech, this aggressive stance may reset enterprise browser standards....
Is Brave Setting the New Standard for Browser Privacy and Security?
April 28, 2026

Is Brave Setting the New Standard for Browser Privacy and Security?

Brave positions itself as the privacy-first browser with integrated protections against tracking and data leakage. As cyber threats escalate, Brave's default privacy model pressures competitors to rethink their approach to...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.