Skip to content
Pause slideshow
Play slideshow
FREE Mega Bundle
- Spend $299 or more and get Mega Bundle for FREE!
FREE Mega Bundle
- Spend $299 or more and get Mega Bundle for FREE!
Governance, Risk and Compliance Docs
Home
NIST
SOC 2
ISO
BLOGS
NIST CSF
What is NIST?
What is NIST CSF?
What is NIST Compliance?
Why NIST in Cybersecurity?
NIST FAQ
SOC2
SOC2 Overview
SOC2 Framework
Why is SOC 2 Important?
What is a SOC 2 Report?
SOC2 Type 1 vs Type 2
GRC
What is GRC?
GRC Processes
Implementing GRC
Power of Governance in GRC
Future of GRC
COSO
What is COSO?
COSO Framework
Implementing COSO Framework
Advantage of COSO
COSO Internal Control
Contact Us
Search
Account
0
Cart
.
.
.
Site navigation
Close
Search
Search
Cancel
Goes great with
Quick shop
Add to cart
Agile Pack
$29.00
$29.00
Quick shop
Add to cart
Benefits Realization Management Pack
$39.00
$39.00
Quick shop
Add to cart
Business Resilience Framework
$399.00
$399.00
Quick shop
Add to cart
Change Management Pack
$39.00
$39.00
Your cart is currently empty.
Home
icon-chevron
NIST
icon-chevron
SOC 2
icon-chevron
ISO
icon-chevron
BLOGS
icon-chevron
Expand submenu
icon-chevron
BLOGS
NIST CSF
icon-chevron
Expand submenu
icon-chevron
NIST CSF
What is NIST?
icon-chevron
What is NIST CSF?
icon-chevron
What is NIST Compliance?
icon-chevron
Why NIST in Cybersecurity?
icon-chevron
NIST FAQ
icon-chevron
SOC2
icon-chevron
Expand submenu
icon-chevron
SOC2
SOC2 Overview
icon-chevron
SOC2 Framework
icon-chevron
Why is SOC 2 Important?
icon-chevron
What is a SOC 2 Report?
icon-chevron
SOC2 Type 1 vs Type 2
icon-chevron
GRC
icon-chevron
Expand submenu
icon-chevron
GRC
What is GRC?
icon-chevron
GRC Processes
icon-chevron
Implementing GRC
icon-chevron
Power of Governance in GRC
icon-chevron
Future of GRC
icon-chevron
COSO
icon-chevron
Expand submenu
icon-chevron
COSO
What is COSO?
icon-chevron
COSO Framework
icon-chevron
Implementing COSO Framework
icon-chevron
Advantage of COSO
icon-chevron
COSO Internal Control
icon-chevron
Contact Us
icon-chevron
NIS2-Directive
Article 28 domain name database
Domain name registration data
Domain registration data
NIS 2 Directive domain database
NIS 2 Directive Article 28 – Database of Domain Name Registration Data
Mar 6, 2025
Article 29 information-sharing
Cyber threat information-sharing
Cybersecurity sharing arrangements
NIS 2 Directive info-sharing
NIS 2 Directive Article 29 – Cybersecurity Information-Sharing Arrangements
Mar 6, 2025
Article 30 voluntary notification
NIS 2 Directive notifications
Relevant info notification
Voluntary cybersecurity info
NIS 2 Directive Article 30 – Voluntary Notification Of Relevant Information
Mar 6, 2025
Article 31 supervision aspects
Cybersecurity enforcement aspects
General supervision and enforcement
NIS 2 Directive supervision
NIS 2 Directive Article 31 – General Aspects Concerning Supervision and Enforcement
Mar 6, 2025
Article 32 supervisory measures
Enforcement for essential entities
Essential entity supervision
NIS 2 Directive enforcement
NIS 2 Directive Article 32 – Supervisory and Enforcement Measures In Relation To Essential Entities
Mar 6, 2025
Article 33 important entity measures
Enforcement for important entities
NIS 2 Directive supervision
Supervisory measures for entities
NIS 2 Directive Article 33 – Supervisory and Enforcement Measures In Relation To Important Entities
Mar 5, 2025
Article 34 administrative fines
General conditions for fines
Imposing administrative penalties
NIS 2 Directive fines
NIS 2 Directive Article 34 – General Conditions For Imposing Administrative Fines on Essential and Important Entities
Mar 5, 2025
Article 35 data breach infringements
Infringements and data breaches
NIS 2 Directive Article 35 – Infringements Entailing a Personal Data Breach
NIS 2 Directive data breach
Personal data breach penalties
NIS 2 Directive Article 35 – Infringements Entailing a Personal Data Breach
Mar 4, 2025
NIS 2 Directive Article 36 – Penalties
NIS 2 Directive Article 36 – Penalties
Mar 4, 2025
Previous
1
2
3
4
5
6
icon-chevron
Next
"Close (esc)"
icon-chevron
NIS2-Directive