Secure Controls Framework
Download The SCF
GRC Fundamentals

Emerging Trends

The cybersecurity and GRC landscape is shifting faster than at any point in history: AI governance mandates, operational technology regulations, quantum cryptography timelines, and an explosion of state and international privacy laws. The SCF Living Control Set is designed to absorb these changes continuously. Here is what is coming and how to prepare.

Trend Deep Dives

The Trends Reshaping Cybersecurity & GRC

Each trend below represents a material shift in the regulatory, threat, or technology landscape that GRC programs must address. The SCF response shows how the Living Control Set already accounts for each.

AI Governance & Regulation

The EU AI Act is the world's first comprehensive AI governance law, creating risk-tiered obligations for AI system developers, deployers, and operators. In the US, multiple AI executive orders, NIST AI RMF, and emerging state AI laws are creating a patchwork of AI governance requirements. Key requirements materializing: AI risk assessments, AI system inventories, model documentation, bias testing, human oversight for high-risk AI decisions, and incident reporting for AI failures.

The SCF's Response To AI Governance

SCF has incorporated AI governance controls into relevant domains, covering AI system inventory, AI risk assessment, algorithmic bias controls, human oversight requirements, and AI incident response. The SCF GOV, RA, and DCH domains are the primary locus of AI governance controls, mapped to both the EU AI Act and NIST AI RMF.

Post-Quantum Cryptography (PQC)

NIST finalized its first post-quantum cryptography standards in 2024 (FIPS 203 ML-KEM, FIPS 204 ML-DSA, FIPS 205 SLH-DSA). The critical threat is "harvest now, decrypt later," where adversaries are collecting encrypted communications today, planning to decrypt them once quantum computing matures. Organizations must inventory all cryptographic usage, classify data by sensitivity, and develop a PQC migration roadmap.

The SCF's Response to Cryptography

The SCF CRY (Cryptography) domain already includes controls for cryptographic algorithm inventory, key management lifecycle, and algorithm agility, the foundational capabilities required for PQC migration. SCF CRY controls are mapped to NIST SP 800-175B and the emerging NIST PQC standards.

OT/ICS & Critical Infrastructure Security

Operational Technology (OT) and Industrial Control Systems (ICS) are the fastest-growing attack surface in critical infrastructure. Nation-state actors have pre-positioned in US and allied critical infrastructure networks. OT security is fundamentally different from IT security. Availability takes precedence over confidentiality, patch cycles are measured in years, and many systems cannot accept agents or interruptions.

The SCF's Response to Operational Technology & Industrial Control Systems

The SCF includes OT/ICS-specific controls across NET (network segmentation), IAC (remote access for OT), CFG (baseline configurations for ICS), and IRO (OT-aware incident response) domains. SCF controls map to IEC 62443, NIST SP 800-82, and the CISA cross-sector CPG for critical infrastructure operators.

Software Supply Chain Security

Following SolarWinds and Log4Shell, software supply chain security has become a federal and enterprise priority. Executive Order 14028 mandated SBOM for federal software procurement. The EU Cyber Resilience Act, effective 2027, will require security by design, vulnerability disclosure, and SBOM for all products with digital elements sold in the EU.

The SCF's Response to Supply Chain Security

The SCF TPM (Third-Party Management) domain covers SBOM requirements, secure software development lifecycle controls, and third-party component management. SCF controls map to the NIST SSDF, EO 14028 requirements, and the EU Cyber Resilience Act.

Global Privacy Law Proliferation

Privacy law has gone from a niche compliance area to a global operational requirement. GDPR catalyzed a global wave: Brazil's LGPD, India's DPDP Act, China's PIPL, and now 20+ US states with comprehensive privacy laws. The fragmentation is the problem, as each law has different scope triggers, rights timeframes, breach notification windows, and enforcement mechanisms.

The SCF's Response to Privacy

The SCF PRI (Privacy) domain and DPMP (Data Privacy Management Principles) were specifically designed for this fragmented landscape. As new privacy laws are enacted, the SCF maps them via STRM. Organizations implementing the SCF already have the foundational controls that satisfy laws that have already been mapped. As new privacy laws are enacted, the SCF will map to them as well.

Zero Trust Architecture (ZTA)

Zero Trust is no longer a framework aspiration. It is a federal mandate. CISA's Zero Trust Maturity Model and OMB M-22-09 require all federal agencies to reach Advanced ZTA maturity. Commercial organizations face growing pressure from cyber insurers, enterprise customers, and sector regulators to demonstrate ZTA implementation. The ZTA journey typically spans 3–5 years.

The SCF's Response to Zero Trust

The SCF IAC (Identity & Access Control), NET (Network Security), and CFG (Configuration Management) domains map directly to the five pillars of Zero Trust. SCF controls map to CISA ZTA Maturity Model, NIST SP 800-207, and DoD ZTA Reference Architecture.

AI-Augmented Threats & Adversarial AI

Threat actors are leveraging AI to automate reconnaissance, generate targeted phishing at scale, create deepfake audio/video for BEC fraud, and accelerate vulnerability discovery. The barrier to entry for sophisticated cyberattacks has dropped dramatically. Defensive response requires AI-aware security awareness training, out-of-band verification procedures, AI-powered detection tools, and updated incident response playbooks.

The SCF's Response to Adversarial AI

The SCF SAT (Security Awareness Training) and IRO (Incident Response) domains are updated to address AI-enabled social engineering and deepfake scenarios. The SCF’s threat modeling controls in the RA domain now include AI-augmented threat actor profiles and TTP relevant to LLM-assisted attacks.

The Living Control Set Advantage

Why the SCF Was Built for This Moment

Every other major cybersecurity framework, including NIST CSF, ISO 27001, and CIS Controls, updates on a multi-year cycle. By the time a new version is published, it is already behind the regulatory and threat landscape it was designed to address.

The SCF CCF™ is a Living Control Set, updated continuously by the volunteer SCF Council as new laws, regulations, frameworks, and threat landscapes emerge. When the EU AI Act was finalized, the SCF incorporated AI governance controls. When NIST published its PQC standards, the SCF updated its CRY domain. When new US state privacy laws pass, the SCF maps them to PRI controls via STRM.

Organizations using the SCF do not need to trigger a full program redesign every time a new regulation lands. They need to run a gap assessment against the updated SCF LCS and address new or modified controls. The foundational program they already built absorbs the change.

SCF LCS Already Covers Emerging Trends

  • AI governance controls already incorporated into GOV and RA domains, mapped to EU AI Act and NIST AI RMF
  • PQC migration controls in CRY domain. Cryptographic inventory and algorithm agility foundation already present
  • OT/ICS controls across NET, IAC, CFG domains, mapped to IEC 62443 and NIST SP 800-82
  • Supply chain security controls in SCO and TPM. SBOM, SSDF, and CRA requirements mapped
  • New privacy laws mapped to PRI domain via STRM as enacted. DPMP foundation covers all substantive requirements
  • Zero trust controls across IAC, NET, CFG, mapped to CISA ZTA Maturity Model and NIST SP 800-207

The SCF's Response to Emerging Trends

When a new regulation, framework, or threat materializes, the SCF Council evaluates it, maps it via STRM to existing or new SCF controls, and releases an updated version of the LCS. Organizations already using the SCF only need to run a delta gap assessment, not rebuild their program from scratch.

Staying Current

Plan-Do-Check-Act for Emerging Trend Response

Emerging trends require proactive monitoring. Organizations that wait for compliance deadlines to begin program changes routinely miss them. The PDCA cycle for trend response should run on a 6-month cadence minimum.

P

Plan

Monitor SCF LCS release notes, CISA alerts, regulatory calendars, and industry threat intelligence. Identify emerging trends with material compliance or risk implications. Assess applicability to your organization’s scope, sector, and geography.

D

Do

Run a delta gap assessment against the updated SCF LCS for newly applicable controls. Prioritize remediation by MCR status (legally mandatory) and risk impact. Execute control implementation projects with defined owners and timelines.

C

Check

Conduct CDPAS assessment against newly applicable controls using ERL evidence requirements. Score control maturity using SCR-CMM. Validate that implementation satisfies the specific requirements of newly applicable laws or frameworks.

A

Act

Close remaining gaps. Update the USG scope to reflect new regulatory triggers. Communicate program status to board and executives per SEC/NIS2/DORA disclosure requirements. Schedule next trend monitoring cycle.