About
Join us as we dig into the highly anticipated update to the Cybersecurity Framework (CSF), Version 2.0, that was released by NIST on February 26, 2024! This update is the culmination of two years of public engagement including requests for information, workshops, and multiple drafts. The webinar will include an overview of the CSF 2.0 Core, focusing on the updates made to the Functions and Categories. This review will highlight the expansion of the Framework, now encompassing six key Functions: Identify, Protect, Detect, Respond, Recover, and the new addition - Govern. The new "Govern" Function represents a pivotal enhancement, emphasizing the need for governance and leadership in cybersecurity management. Don’t miss this opportunity to learn about the CSF updates and ensure your organization is prepared for the future!
Presenters
M
Mitch Ashley
1734716524-e8725bec0a3d8a90
Tom Conkle
Cybersecurity Engineer, Optic Cyber Solutions
Tom Conkle has spent over 20 years assisting organizations in assessing their cybersecurity program. Conkle is the co-author of ISACA’s guide for implementing the NIST Cybersecurity Framework. He was a principal architect and subject matter expert in the development of the CMMI Cybermaturity Platform, a self-assessment tool that helps organizations identify a risk informed goals for their cybersecurity program.
1734716591-f51f1cf17813e94d
Kelly Hood
Cybersecurity Engineer, Optic Cyber Solutions
Kelly Hood assists organizations in implementing cybersecurity and privacy best practices, controls, and standards to manage risks and meet compliance goals. She supports organizations across industries as a CMMC RP by developing and implementing cybersecurity strategies to help manage the risks to their business. As a member of the NIST Cybersecurity Framework team, she supported the evolution and outreach of the Cybersecurity Framework through the current version. Additionally, Kelly has been supporting the development and expansion of ISACA's CMMI Cybermaturity Platform. The patent-pending approach she helped develop for ISACA translates cybersecurity risk to cybermaturity goals and identifies mitigation strategies to help organizations improve their cybersecurity capabilities.
Register To Watch Recording
Full name*
Email Address*
Job Field
Postal / Zip Code*
Postal / Zip Code*
Country*
Phone
We use BigMarker as our webinar platform. By clicking Register, you acknowledge that the information you provide will be transferred to BigMarker processing in accordance with their Terms of Service and Privacy Policy.