SlideShare a Scribd company logo
Cybersecurity Capability Maturity Model
(C2M2) Version 2.1
Overview
C2M2 Version 2.1 Overview
- 2 -
The C2M2 is a free tool to help organizations
evaluate their cybersecurity capabilities and
optimize their security investments.
• Designed for any organization regardless of
ownership, structure, size, or industry
• Uses a set of 350+ industry-vetted
cybersecurity practices focused on both
information technology (IT) and operations
technology (OT) assets and environments
• Results help users prioritize cybersecurity
investment decisions based on their risk
• Developed in 2012 and maintained
through an extensive public-private
partnership between the U.S. Department
of Energy’s Office of Cybersecurity, Energy
Security, and Emergency Response and
numerous government, industry, and
academic organizations
• Recent updates in 2022 reflect new
technologies, threats, and practices
Benefits of Using the C2M2
Planning Evaluating
Maturity model structure facilitates
cybersecurity program planning and
target-setting
Enables consistent evaluation of
cybersecurity capabilities and tracking
of progress over time
Prioritizing Reporting
Helps companies prioritize actions and
investments for cybersecurity
improvements
C2M2 assessment tools produce views
of cybersecurity program status that
can be used in reporting
- 3 -
Key Features of the C2M2
Area Description
Maturity
Model
The C2M2 consists of cybersecurity practices that are organized into three
progressive levels of cybersecurity maturity.
Management
Activities
Management activities measure the extent to which cybersecurity is ingrained in
an organization’s culture.
Specificity
The C2M2 is descriptive, not prescriptive. Practice statements focus on outcomes
that may be implemented through any number of measures.
Scoping
The C2M2 may be applied to an entire enterprise or to individual parts of the
enterprise to enable users to select an appropriate level of granularity.
Usability
A C2M2 self-evaluation can be completed in one-day using a free tool that securely
records results and generates a detailed, graphical report.
- 4 -
What is a Maturity Model?
• A Crawl/Walk/Run-style set
of characteristics, practices,
or processes that represent
the progression of
capabilities in a particular
discipline.
• A tool to benchmark current
capabilities and identify
goals and priorities for
improvement.
- 5 -
Model Organized by 10 Domains
- 6 -
• Domains are logical groupings of cybersecurity
practices
• Each domain has a short name for ease of
reference
ASSET
Asset, Change, and
Configuration
Management
THREAT
Threat and
Vulnerability
Management
RISK
Risk Management
ACCESS
Identity and Access
Management
SITUATION
Situational
Awareness
RESPONSE
Event and Incident
Response,
Continuity of
Operations
THIRD-PARTIES
Third-Party Risk
Management
WORKFORCE
Workforce
Management
ARCHITECTURE
Cybersecurity
Architecture
PROGRAM
Cybersecurity
Program
Management
Model Structure
- 7 -
Model contains 10 domains
Multiple approach objectives in each domain
Unique to each domain
One per domain
Similar in each domain
Approach objectives are supported by a
progression of practices that are unique to the
domain
Each management objective is supported by a
progression of practices that are similar in each
domain and describe institutionalization activities
Model
Domain
Approach Objectives
Practices at MIL1
Practices at MIL2
Practices at MIL3
Management Objectives
Practices at MIL2
Practices at MIL3
C2M2 Adoption by Sector
Since 2012, DOE has
responded to more than
2,400 requests for the
C2M2 PDF-Based Self-
Evaluation Tool from owners
and operators in U.S. critical
infrastructure sectors and
from international partners.
- 8 -
C2M2 Tool Requests By U.S. Sector
Data current as
of March 2023
C2M2 Version 2.1 Resources
Visit energy.gov/c2m2, c2m2.doe.gov, or email C2M2@hq.doe.gov for more
information.
- 9 -
Model Document Introduces the model practices, key concepts, and how to use the model
Self-Evaluation Tools The tool, available on two platforms, offers interactive features and help
text, allows users to securely record results, and automatically generates a
detailed, graphical report
Self-Evaluation Guide Guides users to plan and facilitate a self-evaluation workshop with key
participants in their organization
Self-Evaluation
Workshop Kickoff
Presentation
Supports planning for a self-evaluation workshop
Self-Evaluation Cheat
Sheet
Offers a placemat-style reference guide for participants during a self-
evaluation
Thank You

More Related Content

PPTX
C2M2 V2.1 Self-Evaluation Workshop Kickoff Presentation -- July 2023.pptx
PDF
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
PPTX
C2M2 V2.1 Self-Evaluation Workshop Kickoff.pptx
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PDF
Cyber security maturity model- IT/ITES
PPTX
Security-Invest Where it Matters Most
PDF
Helping Utilities with Cybersecurity Preparedness: The C2M2
PPTX
DMSS PPT123456789012345678912348975.pptx
C2M2 V2.1 Self-Evaluation Workshop Kickoff Presentation -- July 2023.pptx
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
C2M2 V2.1 Self-Evaluation Workshop Kickoff.pptx
Cybersecurity Capability Maturity Model (C2M2)
Cyber security maturity model- IT/ITES
Security-Invest Where it Matters Most
Helping Utilities with Cybersecurity Preparedness: The C2M2
DMSS PPT123456789012345678912348975.pptx

Similar to C2M2 V2.1 Overview Presentation -- July 2023.pptx (20)

PDF
Certified Cybersecurity Compliance Professional.PREVIEW.pdf
PPTX
Cyber Threats Awareness, Prevention, and Defense - DigitDefence
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PDF
Hewlett-Packard Enterprise- State of Security Operations 2015
PDF
Credit Union Cyber Security
PPTX
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
DOCX
Information Security Assurance Capability Maturity Model (ISA-.docx
PPTX
Build and Information Security Strategy
PPTX
Build an Information Security Strategy
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PDF
Cybersecurity PowerPoint Presentation Slides
PDF
Smart Grid Maturity Model
PDF
Hp arc sight_state of security ops_whitepaper
PPTX
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Holistic Cybersecurity_September 21, 2022_FV.pdf
PDF
Cybersecurity Powerpoint Presentation Slides
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PPTX
defensible_security-executive_support-sample.pptx
Certified Cybersecurity Compliance Professional.PREVIEW.pdf
Cyber Threats Awareness, Prevention, and Defense - DigitDefence
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
Hewlett-Packard Enterprise- State of Security Operations 2015
Credit Union Cyber Security
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Information Security Assurance Capability Maturity Model (ISA-.docx
Build and Information Security Strategy
Build an Information Security Strategy
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity PowerPoint Presentation Slides
Smart Grid Maturity Model
Hp arc sight_state of security ops_whitepaper
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
Today's Cyber Challenges: Methodology to Secure Your Business
Holistic Cybersecurity_September 21, 2022_FV.pdf
Cybersecurity Powerpoint Presentation Slides
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
defensible_security-executive_support-sample.pptx
Ad

Recently uploaded (20)

PPTX
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
PPTX
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
PPTX
Practice Questions on recent development part 1.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
AgentX UiPath Community Webinar series - Delhi
PPTX
“Next-Gen AI: Trends Reshaping Our World”
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Geodesy 1.pptx...............................................
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
composite construction of structures.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
Practice Questions on recent development part 1.pptx
Structs to JSON How Go Powers REST APIs.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
AgentX UiPath Community Webinar series - Delhi
“Next-Gen AI: Trends Reshaping Our World”
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
OOP with Java - Java Introduction (Basics)
Geodesy 1.pptx...............................................
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
composite construction of structures.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Ad

C2M2 V2.1 Overview Presentation -- July 2023.pptx

  • 1. Cybersecurity Capability Maturity Model (C2M2) Version 2.1 Overview
  • 2. C2M2 Version 2.1 Overview - 2 - The C2M2 is a free tool to help organizations evaluate their cybersecurity capabilities and optimize their security investments. • Designed for any organization regardless of ownership, structure, size, or industry • Uses a set of 350+ industry-vetted cybersecurity practices focused on both information technology (IT) and operations technology (OT) assets and environments • Results help users prioritize cybersecurity investment decisions based on their risk • Developed in 2012 and maintained through an extensive public-private partnership between the U.S. Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response and numerous government, industry, and academic organizations • Recent updates in 2022 reflect new technologies, threats, and practices
  • 3. Benefits of Using the C2M2 Planning Evaluating Maturity model structure facilitates cybersecurity program planning and target-setting Enables consistent evaluation of cybersecurity capabilities and tracking of progress over time Prioritizing Reporting Helps companies prioritize actions and investments for cybersecurity improvements C2M2 assessment tools produce views of cybersecurity program status that can be used in reporting - 3 -
  • 4. Key Features of the C2M2 Area Description Maturity Model The C2M2 consists of cybersecurity practices that are organized into three progressive levels of cybersecurity maturity. Management Activities Management activities measure the extent to which cybersecurity is ingrained in an organization’s culture. Specificity The C2M2 is descriptive, not prescriptive. Practice statements focus on outcomes that may be implemented through any number of measures. Scoping The C2M2 may be applied to an entire enterprise or to individual parts of the enterprise to enable users to select an appropriate level of granularity. Usability A C2M2 self-evaluation can be completed in one-day using a free tool that securely records results and generates a detailed, graphical report. - 4 -
  • 5. What is a Maturity Model? • A Crawl/Walk/Run-style set of characteristics, practices, or processes that represent the progression of capabilities in a particular discipline. • A tool to benchmark current capabilities and identify goals and priorities for improvement. - 5 -
  • 6. Model Organized by 10 Domains - 6 - • Domains are logical groupings of cybersecurity practices • Each domain has a short name for ease of reference ASSET Asset, Change, and Configuration Management THREAT Threat and Vulnerability Management RISK Risk Management ACCESS Identity and Access Management SITUATION Situational Awareness RESPONSE Event and Incident Response, Continuity of Operations THIRD-PARTIES Third-Party Risk Management WORKFORCE Workforce Management ARCHITECTURE Cybersecurity Architecture PROGRAM Cybersecurity Program Management
  • 7. Model Structure - 7 - Model contains 10 domains Multiple approach objectives in each domain Unique to each domain One per domain Similar in each domain Approach objectives are supported by a progression of practices that are unique to the domain Each management objective is supported by a progression of practices that are similar in each domain and describe institutionalization activities Model Domain Approach Objectives Practices at MIL1 Practices at MIL2 Practices at MIL3 Management Objectives Practices at MIL2 Practices at MIL3
  • 8. C2M2 Adoption by Sector Since 2012, DOE has responded to more than 2,400 requests for the C2M2 PDF-Based Self- Evaluation Tool from owners and operators in U.S. critical infrastructure sectors and from international partners. - 8 - C2M2 Tool Requests By U.S. Sector Data current as of March 2023
  • 9. C2M2 Version 2.1 Resources Visit energy.gov/c2m2, c2m2.doe.gov, or email [email protected] for more information. - 9 - Model Document Introduces the model practices, key concepts, and how to use the model Self-Evaluation Tools The tool, available on two platforms, offers interactive features and help text, allows users to securely record results, and automatically generates a detailed, graphical report Self-Evaluation Guide Guides users to plan and facilitate a self-evaluation workshop with key participants in their organization Self-Evaluation Workshop Kickoff Presentation Supports planning for a self-evaluation workshop Self-Evaluation Cheat Sheet Offers a placemat-style reference guide for participants during a self- evaluation