CyberSecurity Training and Certification
  • Back
  • Certificationas
    • Certification roadmap
    • CyberSecurity Foundations for Beginners
    • For Working IT Professionals
    • For Penetration Testers and Ethical Hackers
    • For Managers and IT leads
  • About Us
  • Resources
  • Contact us
CyberSecurity Governance

Pros & Cons of the NIST CSF 2.0 “Cyber AI Profile”

This week NIST published the Initial Preliminary Draft of NIST IR 8596: Cybersecurity Framework Profile for Artificial Intelligence (aka the Cyber AI Profile). It extends CSF…

by Raymond Friedman2 minutes read December 28, 2025
  • Share:

This week NIST published the Initial Preliminary Draft of NIST IR 8596: Cybersecurity Framework Profile for Artificial Intelligence (aka the Cyber AI Profile). It extends CSF 2.0 outcomes into AI—organized aroundthree focus areas: Secure (AI components), Defend (AI-enabled cyber defense), and Thwart (AI-enabled attacks)—and it’s open for public comment until January 30, 2026.

✅ Pros

1) Familiar CSF risk language—now applied to AI

The biggest win is translation: by extending Govern, Identify, Protect, Detect, Respond, Recover into AI contexts, teams can evaluate AI risk using a structure that security leaders, auditors, and execs already speak.

2) Holistic view of “AI cybersecurity”

Instead of treating AI security as only a model problem, the Cyber AI Profile pushes organizations to think across models, infrastructure, data pipelines, integrations, and both AI-enabled defense and AI-enabled attacks.

3) Additive, not disruptive

It’s designed to complement CSF 2.0 and aligns with existing NIST work like the AI Risk Management Framework (AI RMF), which makes it easier to integrate into real-world governance programs (instead of becoming “yet another framework”).

⚠️ Cons / Gaps

1) Still high-level (for now)

As a draft, it doesn’t go deep enough on the operational realities: secure training pipelines, model poisoning defenses, autonomous agent controls, and AI-specific incident response playbooks.

2) Limited coverage of complex AI ecosystems

Multi-agent systems, agent-to-agent interactions, and emergent behavior risks deserve more detailed treatment—because that’s where the “surprises” show up first.

3) Governance accountability needs more clarity

There’s minimal guidance on who owns AI risk, how to prove third-party model assurance, and how to do strong cross-framework mappings in a way that makes audits and procurement defensible.

🧭 Bottom line

The Cyber AI Profile is a solid foundation that normalizes AI as a cybersecurity risk, but it needs more operational depth and clearer governance ownership to support mature AI deployments.

🎓 Relevant certifications to operationalize this (Mile2)

If your team wants to move from “framework awareness” to “implementation muscle,” these map cleanly to the CSF functions:

  • Govern (GRC + security leadership): C)ISSO — builds security management standards, risk management, and controls aligned to business needs.
  • Identify/Protect (core security program): C)SP — covers governance/risk/compliance, IAM, data security, and incident response foundations.
  • Detect/Respond (SOC + operations): C)CSA — security analyst skills for detection and triage.
  • Respond/Recover (incident handling): C)IHE — incident handling process and response fundamentals.
  • Secure/Thwart (offensive validation + resilience): C)PEH / C)PTE / C)PTC — practical offensive security skills that help you test controls and validate real risk.
  • Framework implementation: C)CFO (Certified Cybersecurity Framework Officer) — for teams tasked with actually rolling out CSF in the org.
  • Share:
Previous
How Hackers Use Cookies to Bypass 2FA (and What to Do About It)
2 minutes read
Next
AI isn’t just a technology risk anymore — it’s a liability risk.
4 minutes read
Raymond Friedman
Raymond Friedman
author

Dr. Raymond Friedman Cybersecurity & AI Thought Leader | Creator of theoretical models ACRPM™ & BCAA™ | Author of The Art of an Organizational Leader & mile2’s CAICSO™ | Researcher & Keynote Speaker on AI, Governance & Leadership

Got Questions? Talk to us

Name(Required)
This field is hidden when viewing the form

Share this

Recent Posts

  • AI isn’t just a technology risk anymore — it’s a liability risk.
  • Pros & Cons of the NIST CSF 2.0 “Cyber AI Profile”
  • How Hackers Use Cookies to Bypass 2FA (and What to Do About It)
  • Certification vs. Degree in Cybersecurity: The Road to Making Informed Decision
  • Cybersecurity Certification Lead to Better Financial Outcomes

Let's Achieve Together

Welcome to our diverse and dynamic course catalog.

About Mile2

Mile2 develops cyber security certifications that meet the evolving needs of the Information Systems sector. Read more…

Facebook-f Linkedin Youtube
Courses
  • Courses
  • Certifications
  • Blogs
  • CyberSecurity Resources
Useful Links
  • Code of Ethics
  • Legal & Trademark
  • Privacy Statement
Contact Us
  • (613) 416-8898
  • info@mile2.ca
  • 451-207 Bank Street Ottawa, ON K2P 2N2 Canada
  • Copyright © 2025 Mile2 Canada. All Rights Reserved.
HomeSearchAccount