article summary
-
NIST CSF 2.0 is a widely used voluntary framework that helps organizations of any size manage cybersecurity risk through a structured, flexible approach.
-
The framework is organized around six core functions: Govern, Identify, Protect, Detect, Respond, and Recover, giving organizations a practical model for strengthening cybersecurity oversight and operations.
-
Larson & Company’s assessment service helps organizations map their current state, define target goals, identify gaps, build a prioritized roadmap, and support ongoing improvement over time.
-
As cyber threats and stakeholder expectations continue to rise, a NIST CSF 2.0 assessment provides a credible foundation for risk management, regulatory preparedness, and communication with leadership and auditors.
What is NIST CSF 2.0?
The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, is the most widely adopted voluntary cybersecurity framework in the world. Developed by the National Institute of Standards and Technology, it gives organizations a structured, flexible approach to managing cybersecurity risk regardless of size, sector, or technical sophistication.
The Six Core Functions
|
GOVERN |
Establish cybersecurity strategy, policies, roles, and accountability at the leadership level. |
|
IDENTIFY |
Understand your assets, risks, and business environment to prioritize cybersecurity efforts. |
|
PROTECT |
Implement controls to limit or contain the impact of a cybersecurity event. |
|
DETECT |
Develop capabilities to discover cybersecurity events in a timely manner. |
|
RESPOND |
Take action when a cybersecurity incident is detected — contain, analyze, communicate. |
|
RECOVER |
Restore capabilities and services impaired by a cybersecurity incident. |
What Larson & Company Delivers
Our NIST CSF 2.0 assessment service is designed to be practical, collaborative, and actionable, not just a checkbox exercise.
Here's how we work with you:
- Current-State Mapping: We assess your existing security controls and practices against all six CSF functions, giving you a clear picture of where you are today.
- Target Profile Development: Together, we define where you need to be based on your risk tolerance, business objectives, and regulatory obligations.
- Gap Analysis & Prioritized Roadmap: We translate findings into a plain-language roadmap with prioritized recommendations so you know exactly what to tackle first and why.
- Ongoing Advisory Support: We don't just hand you a report and walk away. Our team is available to help you implement findings and track progress over time.
- A credible, defensible baseline recognized by regulators and auditors.
- Clear visibility into your most significant risk gaps before an incident occurs.
- A framework your board, leadership, and technical teams can all speak to.
- A foundation for meeting regulatory and contractual cybersecurity requirements.
- Confidence and efficiency when responding to client security questionnaires and third-party audits.
Why an Assessment Matters Now
Cyber threats are increasing in frequency and sophistication. At the same time, regulators, partners, and customers are raising expectations for how organizations manage cybersecurity risk. A NIST CSF 2.0 assessment gives you:
Why Larson & Company?
We bring deep expertise in cybersecurity risk management combined with a genuine commitment to making complex frameworks accessible to real organizations. We work alongside you to build something useful, not just compliance theatre.
Our assessments are built on experience across industries, giving us the context to help you benchmark your posture, understand your unique risks, and build a security program that fits your organization.
Ready to get started? Get in touch with Greg Marks today for more information.
Frequently Asked Questions About NIST CSF 2.0
What is NIST CSF 2.0 and who is it for?
NIST CSF 2.0 is a voluntary cybersecurity framework published by the National Institute of Standards and Technology that helps organizations of any size or sector assess and improve their cybersecurity posture. While it originated as guidance for critical infrastructure, version 2.0 is explicitly designed for broad adoption across industries and organization types.
What's new in version 2.0 compared to the original framework?
The most significant addition is the Govern function, which elevates cybersecurity from an IT concern to a board- and executive-level governance issue. Version 2.0 also places greater emphasis on cybersecurity supply chain risk management and provides updated guidance designed to be more accessible to smaller organizations.
Do we need to implement every part of the framework?
No. One of NIST CSF 2.0's core strengths is its flexibility. Organizations can scope their assessment to the areas most relevant to their size, risk profile, and industry obligations. Many organizations start with a targeted scope and expand over time.
How long does a CSF 2.0 assessment typically take?
It depends on the scope and complexity of the organization. A targeted assessment of a single business unit or environment may take anywhere from a few hours to a few days, while an enterprise-wide assessment for a larger organization can take several months. The process generally involves stakeholder interviews, policy and procedure review, and sometimes technical testing.
Should we use an internal team or hire a third party?
Both are valid options. Internal assessments leverage institutional knowledge and cost less, but can suffer from blind spots and confirmation bias. Third-party assessors bring an independent perspective and benchmarking data from peer organizations, and their findings typically carry more weight with regulators, auditors, and boards. For organizations conducting their first assessment, external assessment is generally the stronger choice.
How often should we reassess?
NIST CSF is designed as a continuous improvement cycle, not a one-time exercise. Most organizations reassess annually or following significant changes to their environment such as a major system implementation, a merger or acquisition, or a significant incident.
Does completing a CSF 2.0 assessment mean we're compliant with specific regulations?
Not automatically, but it helps significantly. CSF 2.0 aligns well with a wide range of regulatory frameworks, including GLBA, HIPAA, NYDFS 23 NYCRR 500, FTC Safeguards Rule, and others. A well-documented assessment demonstrates to regulators and auditors that your organization has a structured, defensible approach to cybersecurity risk management.
Greg Marks is a Risk Assurance Manager at Larson & Company. He specializes in cybersecurity, SOC, and IT audits for insurance companies and other industries.
LinkedIn