Govern first: How NIST CSF 2.0's new function connects cyber risk to ESG leadership

The change that makes all the difference

When NIST published CSF 2.0 in February 2024, the most significant structural change was the addition of a brand-new function: Govern. This was not a minor revision or a rebranding of existing content. It was a deliberate signal from one of the world's most authoritative standards bodies that cybersecurity risk management cannot be separated from organisational governance – and that boards, executive teams and the professionals who advise them need to own it accordingly.

For ESG professionals, this change matters enormously. The Govern function is not a technical function. It is a leadership, strategy and culture function. It covers the policies, processes and accountabilities that determine how an organisation approaches cybersecurity risk across everything it does. In content, structure and intent, it maps directly onto the governance work that ESG professionals do every day.

What the Govern function covers

The CSF 2.0 Govern function is organised around six categories. Understanding each one helps ESG professionals see where their existing work connects and where new attention is needed.

Organisational Context requires that the organisation understands its mission, the regulatory environment it operates in and the risk appetite of its stakeholders – and that this context shapes its cybersecurity risk management decisions. For ESG professionals, this is familiar ground. Materiality assessments, stakeholder engagement processes and regulatory horizon-scanning are all standard ESG activities that directly inform the organisational context that the Govern function requires.

Risk Management Strategy requires that the organisation has an established, documented and communicated approach to cybersecurity risk – including defined risk tolerances and the criteria used to prioritise risk responses. ESG professionals working on enterprise risk management frameworks will recognise this as directly parallel to the risk appetite statements and tolerance thresholds they help develop for environmental and social risks.

Roles, Responsibilities and Authorities requires that cybersecurity responsibilities are clearly assigned, understood and communicated across the organisation – including at the board and senior leadership level. ESG professionals are well positioned to help organisations think through this clearly, since the assignment of responsibility for non-financial risks is a core component of good governance practice.

Policy requires that cybersecurity policies are established, documented and communicated – and that they reflect the organisation's risk strategy and tolerance. For ESG professionals responsible for policy development and governance disclosure, this is directly applicable work.

Oversight requires that the results of cybersecurity risk management activities are used to inform and adjust the organisation's overall risk management strategy – and that there is a clear process by which cybersecurity risk information flows to the board and senior leadership for review and decision-making. This is the ESG reporting and assurance function applied to cyber risk.

Cybersecurity Supply Chain Risk Management requires that cybersecurity risks in the supply chain are identified, assessed and managed – with clear expectations communicated to suppliers and third parties. For ESG professionals who work on supply chain due diligence and responsible sourcing, this is a natural extension of existing practice.

The Govern function is not a new concept dressed in cybersecurity language. It is a description of good risk governance – the same discipline that ESG professionals apply to climate, human rights and labour risk – applied to the cyber domain.

Connecting Govern to ESG governance frameworks

The parallels between NIST CSF 2.0's Govern function and mainstream ESG governance frameworks are striking and practically useful. The Global Reporting Initiative's GRI 205 (Anti-corruption) and GRI 418 (Customer Privacy) standards both require disclosure of governance processes for specific risk categories. The European Sustainability Reporting Standards (ESRS) require disclosure of governance structures and processes for managing material sustainability risks and opportunities. The Task Force on Climate-related Financial Disclosures (TCFD) framework and its successor the ISSB Standards, require disclosure of governance processes for climate risk.

In each of these frameworks, the disclosure requirements are structurally similar to what the NIST CSF 2.0 Govern function requires organisations to have in place: clear accountability at board and executive level, documented risk management processes, defined risk appetite and evidence of how risk information flows to decision-makers. An organisation that has implemented the Govern function of CSF 2.0 is well positioned to produce disclosure-quality governance information for cybersecurity risk across all of these frameworks.

What boards need to know and do

CSF 2.0's Govern function is explicit that board-level oversight of cybersecurity risk is a governance requirement, not an optional enhancement. This aligns with a broader regulatory trend. The US SEC's cybersecurity disclosure rules, the EU's NIS2 Directive and the UK's NCSC guidance all place accountability for cybersecurity governance at the most senior levels of the organisation.

For ESG professionals who prepare board-level governance reports or advise on board governance practices, this has practical implications. Boards need to be able to demonstrate that they have processes for receiving and reviewing cybersecurity risk information, that they have defined their risk appetite for cyber incidents and that they have assigned clear accountability for cybersecurity risk management to specific executive roles. These are exactly the kinds of governance structures that ESG professionals help design and document for other risk categories.

The integration opportunity

One of the most valuable contributions that ESG professionals can make to their organisation's cybersecurity governance is to advocate for integration rather than separation. Cybersecurity risk, like climate risk and social risk, is a cross-cutting enterprise risk that affects strategy, operations, stakeholder relationships and value creation. It should be managed within the same governance infrastructure that handles other material risks – with the same rigour, the same accountability structures and the same disclosure disciplines.

NIST CSF 2.0's Govern function provides the structure for making that integration concrete. It gives ESG professionals a framework for asking the right questions about cybersecurity governance, contributing meaningfully to the answers and ensuring that the organisation's approach to cyber risk meets the same standards of governance quality that its approach to environmental and social risk is expected to meet.

The addition of the Govern function to CSF 2.0 is not just a technical update. It is an invitation to ESG professionals to bring their governance expertise to bear on one of the most consequential risk categories of our time.

Key takeaway: CSF 2.0's Govern function covers organisational context, risk strategy, roles and responsibilities, policy, oversight and supply chain risk – all areas where ESG professionals already have expertise and should be actively engaged.

Contact us

Previous
Previous

Cybersecurity is a material ESG issue – here is how to make the case

Next
Next

What Is the NIST Cybersecurity Framework – and why should ESG professionals care?