The final update to the NIST Cybersecurity Framework 2.0 is here! Check out this video to learn about what changed and where to dig in!

Presented by Kelly Hood, CISSP (@KellyHood_)

Optic Cyber Solutions strives to help organizations identify and address their blind spots through our assessment, implementation, and advising services. For more information about Optic Cyber Solutions and how we can help you integrate the CSF update or conduct a CSF gap assessment, reach out at Info@OpticCyber.com or check out our website at

Video: Overview – NIST Cybersecurity Framework 2.0

Video: Profiles – NIST Cybersecurity Framework 2.0

Video: Do I Measure Up? NIST Cybersecurity Framework 2.0

CSF 2.0 Maturity & Progress Tracker (MaPT):

CSF 2.0 Profile Template:

The NIST Cybersecurity Framework (CSF) 2.0:

Quick Start Guides:

CSF 2.0 Profiles:

Informative References:

Cybersecurity & Privacy Reference Tool (CPRT):

CSF 2.0 Reference Tool:

CSF 2.0 Website:

CForum Community:

source

div style="text-align: center;">
28 thoughts on “What Changed? – NIST Cybersecurity Framework 2.0”
  1. Dear Presenter,

    Thank you for your support,
    when a device remained compromised for long,
    Few issues start occurring:
    1. Information that device has or sends/receives, can be accessed by just any.
    2. As a result, No information is secured, as a result of, on the next day, anyone can claim as such, For instance, 2.0 is a marking word for this outline, what if tomorrow someone creating content using 2.0, for compromised device, its not possible to find out , a genuine provider or imposter.
    3. It is also impossible, to know who is actual provider.

    so, Any chance, a few basic information can be obtained to know what’s going on…
    As it’s been a while, this cybersecurity giving such a confusing impression which information to believe and which one to ignore!
    plus few other uncertainty makes it failed project since beginning, Time, Energy & Money is spent but no development so far!

    It’s actually frustrating for the device as if anything could be done to educate the device into more secure way, Output may occur quicker than expected.

    Or any other method or advice, that You like to share for students please?

    Kind regards,

  2. Lol, what a luck I have today , that I find You. You explain this very well. In my life upgrade I was not wishing any more than Your YT Video. Fantastic.. 🙂

  3. Are there subcategories that carry overt from 1.0? For example, in every list they've published, under Identify's Risk assessment it goes ID.RA-01, 02, 03, 04, and 05 then skips to ID.RA-07. Does this mean that the ID.RA-06 remains unchanged?

Leave a Reply

Your email address will not be published. Required fields are marked *