When you submit an enquiry via our website, we use the personal data you supply to respond to your query, including providing you with any requested information about our products and services. We may also email you several times after your enquiry in order to follow up on your interest and ensure that we have answered your it to your satisfaction. We will do this based on our legitimate interest in providing accurate information prior to a sale. Your enquiry is stored and processed as an email which is hosted by Microsoft within the European Economic Area (EEA). We keep enquiry emails for two years, after which they are securely archived and kept for seven years, when we delete them.
This concise guide takes you through the process of implementing the NIST Cybersecurity Framework 2.0, and is aligned to the latest (final) version of the framework.
The guide includes:
This guide has been developed to provide guidance on the subject, where to start and an indication of the order you could do things in. However, there is no single “right way” to improve information security; the important thing is that you end up with an information security framework that is relevant and appropriate for your specific organization’s needs.
For more help, our NIST CSF 2.0 Toolkit is available to purchase and includes 150+ documents, templates and guides. The package includes unlimited email support with a consultant, document reviews and a lifetime subscription to the toolkit update service.