Skip to content
Pause slideshow
Play slideshow
FREE Mega Bundle
- Spend $299 or more and get Mega Bundle for FREE!
FREE Mega Bundle
- Spend $299 or more and get Mega Bundle for FREE!
Governance, Risk and Compliance Docs
Home
NIST
SOC 2
ISO
BLOGS
NIST CSF
What is NIST?
What is NIST CSF?
What is NIST Compliance?
Why NIST in Cybersecurity?
NIST FAQ
SOC2
SOC2 Overview
SOC2 Framework
Why is SOC 2 Important?
What is a SOC 2 Report?
SOC2 Type 1 vs Type 2
GRC
What is GRC?
GRC Processes
Implementing GRC
Power of Governance in GRC
Future of GRC
COSO
What is COSO?
COSO Framework
Implementing COSO Framework
Advantage of COSO
COSO Internal Control
Contact Us
Search
Account
0
Cart
.
.
.
Site navigation
Close
Search
Search
Cancel
Goes great with
Quick shop
Add to cart
Agile Pack
$29.00
$29.00
Quick shop
Add to cart
Benefits Realization Management Pack
$39.00
$39.00
Quick shop
Add to cart
Business Resilience Framework
$399.00
$399.00
Quick shop
Add to cart
Change Management Pack
$39.00
$39.00
Your cart is currently empty.
Home
icon-chevron
NIST
icon-chevron
SOC 2
icon-chevron
ISO
icon-chevron
BLOGS
icon-chevron
Expand submenu
icon-chevron
BLOGS
NIST CSF
icon-chevron
Expand submenu
icon-chevron
NIST CSF
What is NIST?
icon-chevron
What is NIST CSF?
icon-chevron
What is NIST Compliance?
icon-chevron
Why NIST in Cybersecurity?
icon-chevron
NIST FAQ
icon-chevron
SOC2
icon-chevron
Expand submenu
icon-chevron
SOC2
SOC2 Overview
icon-chevron
SOC2 Framework
icon-chevron
Why is SOC 2 Important?
icon-chevron
What is a SOC 2 Report?
icon-chevron
SOC2 Type 1 vs Type 2
icon-chevron
GRC
icon-chevron
Expand submenu
icon-chevron
GRC
What is GRC?
icon-chevron
GRC Processes
icon-chevron
Implementing GRC
icon-chevron
Power of Governance in GRC
icon-chevron
Future of GRC
icon-chevron
COSO
icon-chevron
Expand submenu
icon-chevron
COSO
What is COSO?
icon-chevron
COSO Framework
icon-chevron
Implementing COSO Framework
icon-chevron
Advantage of COSO
icon-chevron
COSO Internal Control
icon-chevron
Contact Us
icon-chevron
NIS2-Directive
Article 19 peer reviews
Cybersecurity peer reviews
EU cybersecurity practices
NIS 2 Directive standards
NIS 2 Directive Article 19 – Peer Reviews
Mar 7, 2025
Article 20 governance structures
Cybersecurity governance
Governance responsibilities
NIS 2 Directive oversight
NIS 2 Directive Article 20 – Governance
Mar 7, 2025
Article 21 risk management
Cyber risk management
Cybersecurity measures
NIS 2 Directive risk management
NIS 2 Directive Article 21 – Cybersecurity Risk-Management Measures
Mar 6, 2025
Article 22 risk assessments
Coordinated security risks
NIS 2 Directive assessments
Union-level security risks
NIS 2 Directive Article 22 – Union Level Coordinated Security Risk Assessments of Critical Supply Chains
Mar 6, 2025
Article 23 reporting obligations
Cybersecurity reporting duties
NIS 2 Directive reporting
Reporting requirements
NIS 2 Directive Article 23 – Reporting Obligations
Mar 6, 2025
Article 24 cybersecurity certification
Cybersecurity trust and security
European certification use
NIS 2 Directive certification
NIS 2 Directive Article 24 – Use Of European Cybersecurity Certification Schemes
Mar 6, 2025
Article 25 standardization
Cybersecurity standards
EU cybersecurity standardization
NIS 2 Directive standards
NIS 2 Directive Article 25 – Standardization
Mar 6, 2025
Article 26 jurisdiction rules
Jurisdiction and territoriality
NIS 2 Directive territoriality
Territoriality in NIS 2 Directive
NIS 2 Directive Article 26 – Jurisdiction And Territoriality
Mar 6, 2025
Article 27 entity registry
Entity registry requirements
NIS 2 Directive entity registry
Registry of entities in NIS 2
NIS 2 Directive Article 27 – Registry of Entities
Mar 6, 2025
Previous
1
2
3
4
5
6
icon-chevron
Next
"Close (esc)"
icon-chevron
NIS2-Directive