Webinar
Adapting to NIST CSF 2.0: Navigating changes and challenges in higher education
Dec 06, 2024 · Authored by Morgan Mincy, Amanda Vellocido
This on-demand webinar was originally presented for the Association of College and University Auditors (ACUA).
Since the National Institute of Standards and Technology (NIST) first introduced the Cybersecurity Framework (CSF) in 2014, numerous organizations have adopted it to enhance and guide their cybersecurity program. Over the past decade, rising cyber threats and widespread implementation of the framework across many industries, including higher education, have prompted NIST to release CSF version 2.0.
This webinar examines the challenges of implementing the NIST CSF within the higher education environment, key updates and impacts from version 1.0 to 2.0 and ways for higher education institutions to conduct audits using the latest version of the NIST CSF.
Key takeaways
After watching this webinar, you will be able to:
- Explore the challenges of implementing NIST CSF in higher education
- Understand the changes and impacts of the NIST CSF 2.0 version update
- Learn how institutions can conduct audits using the new version of NIST CSF
Presenters and subject matter specialists
- Morgan Mincy, CPA, CISA, Manager, Higher Education Risk Advisory
- Amanda Vellocido, CPA, CISA, Manager, Higher Education Risk Advisory
Navigating the Update: Implementing NIST CSF 2.0 in Higher Education
Originally published in the ACUA College and University Auditor Journal, this article outlines changes to the NIST CSF, implementation challenges for higher education, the impact of the new governance section and how institutions should approach auditing with NIST CSF 2.0.
Baker Tilly can help
Is your higher education institution ready to adopt NIST CSF 2.0? For more information, or to learn how Baker Tilly's IT audit specialists can support your cybersecurity framework implementation, contact our team today.
Discover the major changes between NIST CSF 1.0 and 2.0 and next steps your institution should take on its cybersecurity journey.