Skip to content
Governance, Risk and Compliance Docs
Home
Toolkits
Popular Toolkits
IT Governance Framework
IT Operations Playbook
Internal Audit Framework
ISO Toolkits
ISO 27001 Toolkit
ISO 42001 Toolkit
ISO 9001 Toolkit
ISO 20000 Toolkit
ISO 22301 Toolkit
ISO 45001 Toolkit
ISO 14001 Toolkit
IMS Toolkit
Frameworks
NIST Cybersecurity Framework
Business Resilience Framework
Data Governance Framework
DORA Toolkit
Compliance
SOC2 Toolkit
GDPR Toolkit
Others Toolkits
ITSM Toolkit
Mega Bundle
Sale
All-In-One Consultant Package
Sale price
$2,499
00
$2,499.00
Regular price
$5,752
00
$5,752.00
Save $3,253
BLOGS
NIST CSF
What is NIST?
What is NIST CSF?
What is NIST Compliance?
Why NIST in Cybersecurity?
NIST FAQ
SOC2
SOC2 Overview
SOC2 Framework
Why is SOC 2 Important?
What is a SOC 2 Report?
SOC2 Type 1 vs Type 2
GRC
What is GRC?
GRC Processes
Implementing GRC
Power of Governance in GRC
Future of GRC
COSO
What is COSO?
COSO Framework
Implementing COSO Framework
Advantage of COSO
COSO Internal Control
ALL-IN-ONE
ISO Consultant Toolkit
Consultant Package
BOOK A DEMO
Search
Account
0
Cart
.
.
.
Site navigation
Close
Search
Search
Cancel
Your cart is currently empty.
Home
icon-chevron
Toolkits
icon-chevron
Expand submenu
icon-chevron
Toolkits
View all
icon-chevron
Popular Toolkits
icon-chevron
Expand submenu
icon-chevron
Popular Toolkits
View all
icon-chevron
IT Governance Framework
icon-chevron
IT Operations Playbook
icon-chevron
Internal Audit Framework
icon-chevron
ISO Toolkits
icon-chevron
Expand submenu
icon-chevron
ISO Toolkits
ISO 27001 Toolkit
icon-chevron
ISO 42001 Toolkit
icon-chevron
ISO 9001 Toolkit
icon-chevron
ISO 20000 Toolkit
icon-chevron
ISO 22301 Toolkit
icon-chevron
ISO 45001 Toolkit
icon-chevron
ISO 14001 Toolkit
icon-chevron
IMS Toolkit
icon-chevron
Frameworks
icon-chevron
Expand submenu
icon-chevron
Frameworks
NIST Cybersecurity Framework
icon-chevron
Business Resilience Framework
icon-chevron
Data Governance Framework
icon-chevron
DORA Toolkit
icon-chevron
Compliance
icon-chevron
Expand submenu
icon-chevron
Compliance
SOC2 Toolkit
icon-chevron
GDPR Toolkit
icon-chevron
Others Toolkits
icon-chevron
Expand submenu
icon-chevron
Others Toolkits
ITSM Toolkit
icon-chevron
Mega Bundle
icon-chevron
BLOGS
icon-chevron
Expand submenu
icon-chevron
BLOGS
NIST CSF
icon-chevron
Expand submenu
icon-chevron
NIST CSF
What is NIST?
icon-chevron
What is NIST CSF?
icon-chevron
What is NIST Compliance?
icon-chevron
Why NIST in Cybersecurity?
icon-chevron
NIST FAQ
icon-chevron
SOC2
icon-chevron
Expand submenu
icon-chevron
SOC2
SOC2 Overview
icon-chevron
SOC2 Framework
icon-chevron
Why is SOC 2 Important?
icon-chevron
What is a SOC 2 Report?
icon-chevron
SOC2 Type 1 vs Type 2
icon-chevron
GRC
icon-chevron
Expand submenu
icon-chevron
GRC
What is GRC?
icon-chevron
GRC Processes
icon-chevron
Implementing GRC
icon-chevron
Power of Governance in GRC
icon-chevron
Future of GRC
icon-chevron
COSO
icon-chevron
Expand submenu
icon-chevron
COSO
What is COSO?
icon-chevron
COSO Framework
icon-chevron
Implementing COSO Framework
icon-chevron
Advantage of COSO
icon-chevron
COSO Internal Control
icon-chevron
ALL-IN-ONE
icon-chevron
Expand submenu
icon-chevron
ALL-IN-ONE
ISO Consultant Toolkit
icon-chevron
Consultant Package
icon-chevron
BOOK A DEMO
icon-chevron
NIS2-Directive
Article 19 peer reviews
Cybersecurity peer reviews
EU cybersecurity practices
NIS 2 Directive standards
NIS 2 Directive Article 19 – Peer Reviews
Mar 7, 2025
Article 20 governance structures
Cybersecurity governance
Governance responsibilities
NIS 2 Directive oversight
NIS 2 Directive Article 20 – Governance
Mar 7, 2025
Article 21 risk management
Cyber risk management
Cybersecurity measures
NIS 2 Directive risk management
NIS 2 Directive Article 21 – Cybersecurity Risk-Management Measures
Mar 6, 2025
Article 22 risk assessments
Coordinated security risks
NIS 2 Directive assessments
Union-level security risks
NIS 2 Directive Article 22 – Union Level Coordinated Security Risk Assessments of Critical Supply Chains
Mar 6, 2025
Article 23 reporting obligations
Cybersecurity reporting duties
NIS 2 Directive reporting
Reporting requirements
NIS 2 Directive Article 23 – Reporting Obligations
Mar 6, 2025
Article 24 cybersecurity certification
Cybersecurity trust and security
European certification use
NIS 2 Directive certification
NIS 2 Directive Article 24 – Use Of European Cybersecurity Certification Schemes
Mar 6, 2025
Article 25 standardization
Cybersecurity standards
EU cybersecurity standardization
NIS 2 Directive standards
NIS 2 Directive Article 25 – Standardization
Mar 6, 2025
Article 26 jurisdiction rules
Jurisdiction and territoriality
NIS 2 Directive territoriality
Territoriality in NIS 2 Directive
NIS 2 Directive Article 26 – Jurisdiction And Territoriality
Mar 6, 2025
Article 27 entity registry
Entity registry requirements
NIS 2 Directive entity registry
Registry of entities in NIS 2
NIS 2 Directive Article 27 – Registry of Entities
Mar 6, 2025
Previous
1
2
3
4
5
6
icon-chevron
Next
"Close (esc)"
icon-chevron
NIS2-Directive