#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

22 C
Dubai
Sunday, February 1, 2026
HomeTopics 3Law EnforcementCISA Unveils Enhanced Cross-Sector Cybersecurity Performance Goals

CISA Unveils Enhanced Cross-Sector Cybersecurity Performance Goals

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released version 2.0 of its Cross-Sector Cybersecurity Performance Goals (CPGs), a significant update aimed at helping organizations better manage cyber risk amid an increasingly hostile threat landscape.

The new framework, announced on December 11, 2025, reflects three years of operational lessons, extensive industry feedback, and closer alignment with the NIST Cybersecurity Framework (CSF) 2.0.

For security leaders, CISOs, and risk managers worldwide, the update is more than a policy refresh. It’s a signal that cybersecurity governance, accountability, and practical execution are now front and center.

Why This Update Matters Now

Cyberattacks continue to exploit basic weaknesses: poor identity controls, unpatched systems, insecure supply chains, and unclear incident response processes. CISA’s CPGs were originally designed to provide a baseline of high-impact cybersecurity actions, particularly for small and medium-sized organizations that may lack mature security programs.

With CPG 2.0, CISA sharpens that mission. The updated goals focus on what actually reduces risk, not theoretical best practices. By aligning directly with NIST CSF 2.0, the new version also makes it easier for organizations to map CPGs into existing cybersecurity governance, risk, and compliance programs—a critical need for enterprises and critical infrastructure operators.

What’s New in CPG Version 2.0

CISA has introduced several meaningful changes designed to improve clarity, accountability, and real-world usability:

1. Stronger Governance Focus
A new “Govern” function highlights leadership responsibility, executive accountability, and formal risk management strategies. Cybersecurity is no longer framed as purely a technical issue—it is a board-level concern.

2. Unified IT and OT Goals
The updated framework removes silos by consolidating goals across IT, OT, and IoT environments, recognizing that attackers no longer respect operational boundaries.

3. Coverage of Emerging Threats
New goals address third-party risk, zero trust architectures, incident communications, and modern attack techniques—areas increasingly targeted by threat actors.

4. Streamlined and Clearer Structure
Redundant and underused goals have been removed, making the framework easier to adopt and operationalize.

5. Better Documentation and Methodology
Each goal now includes clearer explanations and supporting materials, reducing ambiguity for security teams implementing controls.

As Madhu Gottumukkala, Acting CISA Director, noted:
“Version 2.0 demonstrates our commitment to listening to and incorporating partner feedback to deliver practical, outcome-driven guidance that organizations can act on.”

Impact on Organizations and the Industry

Globally, the updated CPGs reinforce a clear trend: cybersecurity maturity is measured by outcomes, not tools. Organizations are expected to demonstrate governance, risk ownership, and measurable resilience.

For enterprises already working with frameworks like ISO 27001 or NIST, CPG 2.0 offers a practical subset of controls that can accelerate improvements in vulnerability management, supply-chain security, and incident response core services commonly delivered by cybersecurity consulting providers such as Saintynet Cybersecurity.

Why This Matters for the Middle East & Africa (Optional Regional Lens)

While CISA is a U.S. agency, its frameworks are widely referenced by regulators, enterprises, and critical infrastructure operators across the Middle East and Africa (MEA). Many regional organizations are aligning with NIST-based models to support national cybersecurity strategies, cloud adoption, and digital transformation initiatives.

For MEA organizations facing rapid digitization and skills shortages, CPG 2.0 provides a clear starting point, especially when combined with structured training and awareness programs to build internal capability.

10 Recommended Actions for Security Teams

To make practical use of CPG 2.0, security leaders should consider the following steps:

  1. Map CPG 2.0 to Existing Frameworks
    Align the goals with NIST CSF, ISO 27001, or internal risk frameworks to avoid duplication.
  2. Engage Executive Leadership Early
    Use the new “Govern” function to formalize board-level oversight and accountability.
  3. Prioritize Identity and Access Controls
    Strengthen MFA, privileged access management, and device security still top attack vectors.
  4. Unify IT and OT Security Strategies
    Break down silos between enterprise IT and operational environments.
  5. Reassess Third-Party Risk Management
    Apply CPG guidance to vendors, suppliers, and cloud providers.
  6. Strengthen Vulnerability Management
    Focus on remediation of known exploited vulnerabilities, not just scanning.
  7. Review Incident Response and Communication Plans
    Ensure clear escalation paths and external communication protocols.
  8. Adopt Zero Trust Principles Gradually
    Start with identity, device posture, and network segmentation.
  9. Measure What Matters
    Track outcomes such as reduced attack surface and faster response times.
  10. Invest in Skills and Awareness
    Support teams with targeted cybersecurity training and executive awareness programs.

Wider Implications

CPG 2.0 reinforces a growing industry reality: cyber resilience is a governance issue as much as a technical one. Organizations that treat cybersecurity as a compliance checkbox will struggle, while those embedding it into daily operations and leadership decision-making will be better positioned to withstand modern threats.

For ongoing coverage of cybersecurity frameworks, threat alerts, and governance trends, readers can explore analysis.

Conclusion

CISA’s enhanced Cross-Sector Cybersecurity Performance Goals mark a practical evolution in how organizations should approach cyber risk. By emphasizing governance, simplifying implementation, and addressing modern threats, CPG 2.0 provides a clear, actionable roadmap for improving resilience, regardless of sector or maturity level.

In a world of constant cyber pressure, frameworks that focus on real-world impact rather than theory are no longer optional, they are essential.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here