Skip to main content

Posts

Recent posts

NIST CSF 2.0 – GOVERN (GV.OV): Turning Governance Into Oversight That Works

In the previous post on GV.PO – Policies, Processes, and Procedures , we focused on how organizations define expectations for cybersecurity. But governance does not stop at documentation. Policies without oversight are aspirational at best—and risky at worst. This is where GV.OV (Oversight) comes in. Under NIST CSF 2.0 , GV.OV ensures that cybersecurity governance is actively monitored, challenged, and reinforced by leadership. It transforms governance from a static control set into a living management discipline. What GV.OV Really Means in Practice GV.OV focuses on accountability. It ensures that: Cybersecurity decisions are made at the right level Risk is understood, accepted, or rejected explicitly Leadership visibility extends beyond dashboards and heat maps In short: someone is clearly responsible , and oversight mechanisms exist to confirm cybersecurity is being executed as intended. This category ties cybersecurity directly to enterprise governance , not just IT operations. C...

NIST CSF 2.0 Policies, Processes, and Procedures (GV.PO): Turning Governance Into Operational Reality

After decades leading cybersecurity programs in large, global organizations, I’ve learned that governance only matters when it shows up in daily decisions . Policies that live in binders, processes that no one follows, and procedures that exist only for audits do not reduce risk—they create the illusion of control. The GV.PO category in NIST CSF 2.0 exists to close that gap. Where Organizational Context defines what matters , Risk Management Strategy defines how decisions are made , and Roles and Responsibilities define who decides , GV.PO defines how governance is operationalized across the enterprise . What GV.PO Is GV.PO – Policies, Processes, and Procedures ensures that cybersecurity governance is formalized, actionable, and consistently executed across the organization. GV.PO addresses questions leaders often overlook: Do our policies reflect how we actually operate? Are processes designed for the business or for auditors? Can teams execute security procedures under pressure? A...

NIST CSF 2.0 Roles, Responsibilities, and Authorities (GV.RR): Eliminating Ambiguity in Cybersecurity Leadership

After more than twenty years leading cybersecurity programs in global enterprises, I’ve seen sophisticated security architectures fail for one simple reason: no one was truly accountable . Technology does not fail in isolation—organizations do. GV.RR exists to eliminate the ambiguity that undermines even the most mature security programs by clearly defining who is responsible, who is accountable, and who has authority to make decisions about cybersecurity risk. In NIST CSF 2.0, GV.RR formalizes something CISOs have long known: governance without clear ownership is performative. What GV.RR Is GV.RR – Roles, Responsibilities, and Authorities focuses on ensuring that cybersecurity responsibilities are clearly defined, assigned, communicated, and enforced across the organization. GV.RR answers leadership-level questions such as: Who owns cyber risk at the enterprise level? Who has authority to accept or transfer risk? How do responsibilities differ between IT, security, legal, complian...

NIST CSF 2.0 Risk Management Strategy (GV.RM): Turning Risk Tolerance Into Actionable Cyber Decisions

After nearly two decades as a CISO in large, complex organizations, one truth has been constant: Most cybersecurity programs don’t fail because they lack controls—they fail because they lack a coherent risk strategy. NIST CSF 2.0 directly addresses this gap through GV.RM – Risk Management Strategy . If Organizational Context (GV.OC) defines what matters and why , * GV.RM defines how the organization makes consistent, repeatable, and defensible decisions about cyber risk . GV.RM is where cybersecurity governance becomes operationally real. What Risk Management Strategy (GV.RM) Is Under NIST CSF 2.0 , GV.RM focuses on defining, documenting, and governing how cybersecurity risk is identified, evaluated, prioritized, treated, and monitored in alignment with enterprise risk management. In practical terms, GV.RM answers questions executives ask—sometimes implicitly: How much cyber risk are we willing to accept? Who has the authority to accept, transfer, mitigate, or avoid risk? How do we ...

NIST CSF 2.0 Organizational Context (GV.OC): Governing Cybersecurity With Business Clarity

As a CISO in a large, global organization, I’ve learned that most cybersecurity failures are not caused by missing controls or weak tools. They are caused by misalignment —between security, business priorities, risk tolerance, and decision-making authority. That is precisely why NIST CSF 2.0 elevated governance and introduced greater clarity around Organizational Context (GV.OC) . GV.OC is not a documentation exercise. It is the discipline of ensuring cybersecurity risk management is firmly grounded in who the organization is, how it operates, and what truly matters to the business . When Organizational Context is weak, security programs drift. When it is strong, cybersecurity becomes an integrated business capability rather than a defensive cost center. What Organizational Context (GV.OC) Really Is In NIST CSF 2.0, GV.OC focuses on ensuring the organization’s mission, objectives, stakeholders, risk environment, and operating constraints are clearly understood and incorporated into ...

Generative AI Policies: Aligning Organizational Governance with the NIST AI Risk Management Framework

Generative AI is moving faster than most organizational control structures. Employees are already using tools like ChatGPT, Copilot, Claude, and image generators to write code, summarize documents, build presentations, and analyze data—often without security or legal review. Banning generative AI outright is rarely effective. Ignoring it is worse. What organizations need is a clear, enforceable Generative AI policy that: Enables productivity Protects sensitive data Manages legal, ethical, and security risk Aligns with a recognized framework The NIST AI Risk Management Framework (AI RMF) provides a strong foundation for doing exactly that. Why Generative AI Policies Matter Generative AI introduces new risk categories that traditional IT or acceptable-use policies do not fully address: Data leakage through prompts and outputs Model hallucinations treated as fact Intellectual property exposure Bias and ethical risk Shadow AI adoption Regulatory and compliance gaps A well-designed pol...