Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST CSF 2.0

NIST CSF 2.0

NIST Cybersecurity Framework (CSF) 2.0 is an update to NIST CSF  framework.  It expands principles of NIST CSF and adds more structured guidance on minimizing cybersecurity risks. It encompasses organizations of all sizes, irrespective of their security maturity.

After the successful debut of the NIST CSF in 2014 and adoption by 50% of US-based organizations just after 6 years of release, NIST started working on NIST CSF 2.0 in 2022. The CSF 2.0 was released in February 2024 to include not just critical infrastructure sectors but also businesses ranging from schools and startups to enterprise and government organizations.

NIST CSF 2.0 also has a lot of informative references for better adoption and supports integration with other risk programs. reflecting the rapidly changing digital landscape and serving as a comprehensive tool for organizations to strengthen their cybersecurity defenses.

Additional reading

How to Develop an Effective Cybersecurity Disaster Recovery Plan

How to Create a Cybersecurity Disaster Recovery Plan

Your company’s digital infrastructure has the potential to crumble in the blink of an eye. Leaders might know this but don’t want to face it. With disasters, it’s almost always the question of “when” not and “if”.  While digital interconnectedness propels us forward with unprecedented efficiency, it also exposes us to vulnerabilities that tend to…
Network security measures

12 Types of Network Security Measures

In the early days of the internet, Trojans were used to breach networks, and effective security solutions to prevent Trojans were developed. Today, trojans are a thing of the past. Bad actors now rely on phishing, spear phishing, and other social engineering-based attack vectors.  Network security measures for these vectors are now in shape; organizations…
article 15 gdpr

Article 15 GDPR Right of access by the data subject

Article 15 of the General Data Protection Regulation (GDPR) empowers the data subject to exercise their right to know the information their employers hold about them. Are your employees (current/former) asking you to produce the information you have about them? Should you consider oral requests, What’s the TAT for response time and what are the…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.