Skip to content
Governance, Risk and Compliance Docs
Home
Toolkits
Popular Toolkits
IT Governance Framework
IT Operations Playbook
Internal Audit Framework
ISO Toolkits
ISO 27001 Toolkit
ISO 42001 Toolkit
ISO 9001 Toolkit
ISO 20000 Toolkit
ISO 22301 Toolkit
ISO 45001 Toolkit
ISO 14001 Toolkit
IMS Toolkit
Frameworks
NIST Cybersecurity Framework
Business Resilience Framework
Data Governance Framework
DORA Toolkit
Compliance
SOC2 Toolkit
GDPR Toolkit
Others Toolkits
ITSM Toolkit
Mega Bundle
Sale
All-In-One Consultant Package
Sale price
$2,499
00
$2,499.00
Regular price
$5,752
00
$5,752.00
Save $3,253
BLOGS
NIST CSF
What is NIST?
What is NIST CSF?
What is NIST Compliance?
Why NIST in Cybersecurity?
NIST FAQ
SOC2
SOC2 Overview
SOC2 Framework
Why is SOC 2 Important?
What is a SOC 2 Report?
SOC2 Type 1 vs Type 2
GRC
What is GRC?
GRC Processes
Implementing GRC
Power of Governance in GRC
Future of GRC
COSO
What is COSO?
COSO Framework
Implementing COSO Framework
Advantage of COSO
COSO Internal Control
ALL-IN-ONE
ISO Consultant Toolkit
Consultant Package
BOOK A DEMO
Search
Account
0
Cart
.
.
.
Site navigation
Close
Search
Search
Cancel
Your cart is currently empty.
Home
icon-chevron
Toolkits
icon-chevron
Expand submenu
icon-chevron
Toolkits
View all
icon-chevron
Popular Toolkits
icon-chevron
Expand submenu
icon-chevron
Popular Toolkits
View all
icon-chevron
IT Governance Framework
icon-chevron
IT Operations Playbook
icon-chevron
Internal Audit Framework
icon-chevron
ISO Toolkits
icon-chevron
Expand submenu
icon-chevron
ISO Toolkits
ISO 27001 Toolkit
icon-chevron
ISO 42001 Toolkit
icon-chevron
ISO 9001 Toolkit
icon-chevron
ISO 20000 Toolkit
icon-chevron
ISO 22301 Toolkit
icon-chevron
ISO 45001 Toolkit
icon-chevron
ISO 14001 Toolkit
icon-chevron
IMS Toolkit
icon-chevron
Frameworks
icon-chevron
Expand submenu
icon-chevron
Frameworks
NIST Cybersecurity Framework
icon-chevron
Business Resilience Framework
icon-chevron
Data Governance Framework
icon-chevron
DORA Toolkit
icon-chevron
Compliance
icon-chevron
Expand submenu
icon-chevron
Compliance
SOC2 Toolkit
icon-chevron
GDPR Toolkit
icon-chevron
Others Toolkits
icon-chevron
Expand submenu
icon-chevron
Others Toolkits
ITSM Toolkit
icon-chevron
Mega Bundle
icon-chevron
BLOGS
icon-chevron
Expand submenu
icon-chevron
BLOGS
NIST CSF
icon-chevron
Expand submenu
icon-chevron
NIST CSF
What is NIST?
icon-chevron
What is NIST CSF?
icon-chevron
What is NIST Compliance?
icon-chevron
Why NIST in Cybersecurity?
icon-chevron
NIST FAQ
icon-chevron
SOC2
icon-chevron
Expand submenu
icon-chevron
SOC2
SOC2 Overview
icon-chevron
SOC2 Framework
icon-chevron
Why is SOC 2 Important?
icon-chevron
What is a SOC 2 Report?
icon-chevron
SOC2 Type 1 vs Type 2
icon-chevron
GRC
icon-chevron
Expand submenu
icon-chevron
GRC
What is GRC?
icon-chevron
GRC Processes
icon-chevron
Implementing GRC
icon-chevron
Power of Governance in GRC
icon-chevron
Future of GRC
icon-chevron
COSO
icon-chevron
Expand submenu
icon-chevron
COSO
What is COSO?
icon-chevron
COSO Framework
icon-chevron
Implementing COSO Framework
icon-chevron
Advantage of COSO
icon-chevron
COSO Internal Control
icon-chevron
ALL-IN-ONE
icon-chevron
Expand submenu
icon-chevron
ALL-IN-ONE
ISO Consultant Toolkit
icon-chevron
Consultant Package
icon-chevron
BOOK A DEMO
icon-chevron
NIS2-Directive
NIS 2 Directive Article 10
NIS 2 Directive Article 10 – Computer Security Incident Response Teams (CSIRTs)
NIS 2 Directive Article 10 – Computer Security Incident Response Teams (CSIRTs)
Mar 7, 2025
Article 11 requirements overview
Cybersecurity technical capabilities
NIS 2 Directive requirements
Technical capabilities standards
NIS 2 Directive Article 11 – Requirements, Technical Capabilities and Tasks of CSIRTs
Mar 7, 2025
Article 12 vulnerability disclosure
Coordinated vulnerability mechanisms
Cybersecurity vulnerability coordination
NIS 2 Directive disclosure
NIS 2 Directive Article 12 – Coordinated Vulnerability Disclosure and a European Vulnerability Database
Mar 7, 2025
Article 13 national cooperation
Cybersecurity cooperation strategies
National level cybersecurity
NIS 2 Directive cooperation
NIS 2 Directive Article 13 – Cooperation at National Level
Mar 7, 2025
Article 14 Cooperation Group
Cooperation Group overview
EU cybersecurity cooperation
NIS 2 Directive collaboration
NIS 2 Directive Article 14 – Cooperation Group
Mar 7, 2025
Article 15 CSIRTs network
CSIRTs cooperation
Cybersecurity network
NIS 2 Directive CSIRTs
NIS 2 Directive Article 15 – CSIRTs network
Mar 7, 2025
Article 16 ECCL Organization
Cyber crisis liaison organization
European cyber crisis coordination
NIS 2 Directive ECCL
NIS 2 Directive Article 16 – European Cyber Crisis Liaison Organization Network (EU-CyCLONe)
Mar 7, 2025
Article 17 international cooperation
Cybersecurity international collaboration
Global cybersecurity efforts
NIS 2 Directive cooperation
NIS 2 Directive Article 17 – International Cooperation
Mar 7, 2025
Article 18 cybersecurity report
Cybersecurity transparency
NIS 2 Directive reporting
State of cybersecurity in EU
NIS 2 Directive Article 18 – Report on the State of Cybersecurity in the Union
Mar 7, 2025
Previous
1
2
3
4
…
6
icon-chevron
Next
"Close (esc)"
icon-chevron
NIS2-Directive