Webcast Clip: NIST Cybersecurity Framework v2.0, explained

Subscribers:
98,700
Published on ● Video Link: https://www.youtube.com/watch?v=B_Tgq51_OX0



Category:
Show
Duration: 0:56
182 views
4


In this RSAC webcast, two cybersecurity engineers dig into the highly anticipated updates to the Cybersecurity Framework (CSF), Version 2.0, released by NIST in early 2024.

After watching the clip above, enjoy the full webcast here: https://www.rsaconference.com/library/webcast/169-nist-cybersecurity-framework-v2-explained

Highlights include:
• Updates made to the Functions and Categories
• Expansion of the Framework, now encompassing 6 key Functions: Identify, Protect, Detect, Respond, Recover, and the new addition – Govern
• Discussion on why the "Govern" Function represents a pivotal enhancement, emphasizing the need for governance and leadership in cybersecurity management

Inspired by this 60 second webcast clip? Don’t miss the opportunity to learn about the CSF updates and ensure your organization is prepared for the future!




Other Videos By RSA Conference


2024-07-23Webcast: MacOS Security: Rising Threat from State-Backed APTs
2024-07-12Podcast: Guardians of Cybersecurity: Deploying IoT Devices via Drones and Dropboxes
2024-07-03Fianu Pitch - RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-26Fianu Pitch - RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-26RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-25Leadership Panel - RSAC 365 Virtual Seminar: Infrastructure Security
2024-06-25Traditional Sessions - RSAC 365 Virtual Seminar: Infrastructure Security
2024-06-25Closing Celebration with Alicia Keys
2024-06-25RSA Conference 2024 Opening Keynote
2024-06-25Exploring the Universe, Quantum Bit by Quantum Bit
2024-06-25Webcast Clip: NIST Cybersecurity Framework v2.0, explained
2024-06-17Webcast: Full-Circle Zero Trust: Ensuring No App is Left Behind in your IAM Strategy
2024-06-10The Price is WRONG - An Analysis of Security Complexity
2024-06-10What Hacking the Planet Taught Us About Defending Supply Chain Attacks
2024-06-10AI, the Software Supply Chain, and Other (Not So) Puzzling Pieces
2024-06-10Unveiling the Secrets of Codesys V3: ZeroDays, Forensic Artifacts and More
2024-06-10A Walkthrough: AppSec Tool Selection, Procurement, and Implementation
2024-06-10The Cybersecurity of Smart ‘Adult’ Toys, or Lack of It
2024-06-10IP Protection and Privacy in LLM: Leveraging Fully Homomorphic Encryption
2024-06-10Cloud-Enabling the Electric Grid with Consequence Driven Approaches
2024-06-10Use Generative AI to End Your Love/Hate Relationship with DLP



Tags:
rsa
rsaconference
rsac
information
security
cybersecurity
infosec