{"id":2765,"date":"2023-12-19T10:53:27","date_gmt":"2023-12-19T10:53:27","guid":{"rendered":"https:\/\/cyber-curriculum.com\/?page_id=2765"},"modified":"2024-04-19T17:13:01","modified_gmt":"2024-04-19T17:13:01","slug":"nist-framework","status":"publish","type":"page","link":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/","title":{"rendered":"NIST Framework"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:120px;--awb-background-image:linear-gradient(180deg, rgba(35,199,172,0.44) 0%,rgba(255,255,255,0) 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p><span style=\"color: rgb(255, 255, 255);\">Effortless compliance with the NIST Framework<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Your partner for NIST compliance<\/h3><\/div><div class=\"fusion-title title fusion-title-2 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">YOUR PARTNER FOR NEST COMPLIANCE<\/h4><\/div><div class=\"fusion-text fusion-text-2 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">The approach at CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span> follows the fundamental guideline of the NIST Cybersecurity Framework. Our priority is to identify, control and minimize the risk to the cyber security of critical infrastructures. With an experienced team of experts, we are your trusted partner to help you effortlessly comply with the NIST framework and develop customized solutions to meet your unique requirements.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion-flex-column fusion-flex-align-self-stretch fusion-no-small-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-row fusion-flex-align-items-center\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1322\" height=\"510\" title=\"Hero-NIST\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-NIST-1.png\" alt class=\"img-responsive wp-image-2660\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-NIST-1-200x77.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-NIST-1-400x154.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-NIST-1-600x231.png 600w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-NIST-1-800x309.png 800w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-NIST-1-1200x463.png 1200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-NIST-1.png 1322w\" sizes=\"(max-width: 640px) 100vw, 1322px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:66px;--awb-padding-bottom:30px;--awb-padding-top-small:25px;--awb-padding-bottom-small:50px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:80px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Your Future with NIST Starts with CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span><\/h3><\/div><div class=\"fusion-text fusion-text-3 sm-text-align-center fusion-text-no-margin\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span> supports you in achieving NIST Framework compliance and mitigates risks for critical infrastructures.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-medium:20px;--awb-padding-right-medium:21px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-padding-top-small:25px;--awb-padding-right-small:25px;--awb-padding-bottom-small:25px;--awb-padding-left-small:25px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0.096%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">How we support you with NIST Framework compliance<\/h4><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Complete transparency<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Asset management<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Threat detection and mitigation<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Risk-based vulnerability management<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Configuration control<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-medium:20px;--awb-padding-right-medium:20px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-padding-top-small:25px;--awb-padding-right-small:25px;--awb-padding-bottom-small:25px;--awb-padding-left-small:25px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0.096%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">What is the <br \/>NIST Framework?<\/h4><\/div><div class=\"fusion-text fusion-text-4 sm-text-align-center fusion-text-no-margin\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>The NIST Framework, short for the National Institute of Standards and Technology Cybersecurity Framework, is an indispensable tool for increasing cybersecurity and ensuring compliance with security standards. It provides clear guidelines and best practices to minimize risks and optimize cybersecurity. Given today&#8217;s complex digital landscape, this framework is crucial to ensure the security of critical infrastructure and strengthen protection against cyber threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-animated\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:50px;--awb-flex-wrap:wrap;\" data-animationType=\"fadeIn\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:80px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5 fusion-no-small-visibility fusion-no-medium-visibility fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>Why CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span>?<\/p>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">our expertise is your business advantage<\/h3><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column fusion-flex-align-self-center fusion-animated borderhover2 equali\" style=\"--awb-padding-top:30px;--awb-padding-right:25px;--awb-padding-bottom:30px;--awb-padding-left:25px;--awb-padding-top-medium:60px;--awb-padding-right-medium:30px;--awb-padding-bottom-medium:60px;--awb-padding-left-medium:30px;--awb-padding-top-small:40px;--awb-padding-right-small:40px;--awb-padding-bottom-small:40px;--awb-padding-left-small:40px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:95%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:95%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationDelay=\"0.4\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:14.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:14.4%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Our service <br \/>For you<\/h3><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-left-medium:0px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:14.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:7.2%;--awb-spacing-left-medium:30px;--awb-width-small:100%;--awb-order-small:2;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6 sm-text-align-center\"><p style=\"color: var(--awb-color1);\">Our competent team of experienced experts is ready to develop customized solutions that are precisely tailored to your individual requirements. We ensure that your NIST compliance is always at the highest level.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:30px;--awb-padding-left:30px;--awb-padding-right-medium:0px;--awb-padding-bottom-medium:0px;--awb-padding-left-medium:40px;--awb-padding-right-small:40px;--awb-padding-bottom-small:0px;--awb-padding-left-small:40px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color6);--awb-bg-color-hover:var(--awb-color6);--awb-bg-size:cover;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:14.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:7.2%;--awb-spacing-left-medium:30px;--awb-width-small:100%;--awb-order-small:2;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Expert knowledge<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Customized solutions<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Proven successes<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:14px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center fusion-no-small-visibility\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:1;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:1;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-1\" data-id=\"1\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/8-3.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:60px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Expertise in NIST compliance<\/h3><\/div><div class=\"fusion-title title fusion-title-9 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">EXPERTISE IN NIST-COMPLIANCE<\/h4><\/div><div class=\"fusion-lottie fusion-lottie-2 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"2\" style=\"--awb-margin-top:-140;--awb-margin-bottom:-140;\"><div class=\"fusion-lottie-animation sm-mx-auto\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/8-3.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-text fusion-text-7 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>We specialize in NIST compliance and therefore offer comprehensive solutions for your security requirements. Our team of experts supports you in implementing the NIST framework and ensures that your systems always meet the highest security standards.<\/p>\n<\/div><ul style=\"--awb-margin-bottom:30px;--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-3 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>NIST risk assessment<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Implementation of <span style=\"background-color: var(--awb-even-row-bgcolor); color: var(--awb-textcolor); font-family: var(--body_typography-font-family); font-size: var(--awb-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">NIST standards<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>NIST compliance training<\/p>\n<\/div><\/li><\/ul><div class=\"sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:14px;--awb-flex-wrap:wrap;--awb-flex-wrap-medium:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:1;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:60px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Strengthen your security with NIST<\/h3><\/div><div class=\"fusion-title title fusion-title-11 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">STRENGTHEN YOUR SECURITY WITH NIST<\/h4><\/div><div class=\"fusion-lottie fusion-lottie-3 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"3\" style=\"--awb-margin-top:-100;--awb-margin-bottom:-100;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/4.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-text fusion-text-8 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>The NIST Framework is a proven guide to improving cybersecurity. Discover the benefits of NIST compliance and how it can protect your organization.<\/p>\n<\/div><ul style=\"--awb-margin-bottom:30px;--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-4 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Customized solutions<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Expert advice<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Proven successes<\/p>\n<\/div><\/li><\/ul><div class=\"sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-4\" data-id=\"4\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/4.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion-flex-column fusion-animated borderhover2\" style=\"--awb-padding-top:100px;--awb-padding-right:80px;--awb-padding-bottom:100px;--awb-padding-left:80px;--awb-padding-right-medium:40px;--awb-padding-bottom-medium:80px;--awb-padding-left-medium:40px;--awb-padding-top-small:40px;--awb-padding-right-small:30px;--awb-padding-bottom-small:40px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-top:0px;--awb-border-right:0px;--awb-border-bottom:0px;--awb-border-left:0px;--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:100%;--awb-margin-top-large:40px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9 md-text-align-center sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p style=\"color: var(--awb-color1); font-size: 18px;\" data-fusion-font=\"true\">Have we caught your Attention?<\/p>\n<\/div><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">Get started with Cyber Curriculum <span class=\"registered\">\u00ae<\/span> today<\/h2><\/div><div class=\"fusion-text fusion-text-10 md-text-align-center sm-text-align-center\"><p style=\"color: rgb(255, 255, 255);\">Ready to improve your NIST compliance and strengthen your security? Contact our team for advice and customized solutions.<\/p>\n<\/div><div class=\"md-text-align-center sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-padding-right-medium:100px;--awb-padding-left-medium:100px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:50px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-5 fusion-no-small-visibility\" data-id=\"5\" style=\"--awb-margin-top:-90px;--awb-margin-right:-70px;--awb-margin-bottom:-150px;--awb-margin-left:-70px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"viewport\" data-start_point=\"0\" data-end_point=\"100\" data-animationoffset=\"top-into-view\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-lottie fusion-lottie-6 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"6\" style=\"--awb-margin-top:-70px;--awb-margin-right:-100px;--awb-margin-bottom:-50px;--awb-margin-left:-100px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":0,"parent":2668,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2765","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIST Framework - CyberCurriculum<\/title>\n<meta name=\"description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST Framework - CyberCurriculum\" \/>\n<meta property=\"og:description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberCurriculum\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-19T17:13:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"45 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/nist-framework\\\/\",\"url\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/nist-framework\\\/\",\"name\":\"NIST Framework - CyberCurriculum\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"datePublished\":\"2023-12-19T10:53:27+00:00\",\"dateModified\":\"2024-04-19T17:13:01+00:00\",\"description\":\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/nist-framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/nist-framework\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/nist-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security &amp; Compliance\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NIST Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"CyberCurriculum\",\"description\":\"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIST Framework - CyberCurriculum","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/","og_locale":"en_US","og_type":"article","og_title":"NIST Framework - CyberCurriculum","og_description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","og_url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/","og_site_name":"CyberCurriculum","article_modified_time":"2024-04-19T17:13:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"45 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/","url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/","name":"NIST Framework - CyberCurriculum","isPartOf":{"@id":"\/#website"},"datePublished":"2023-12-19T10:53:27+00:00","dateModified":"2024-04-19T17:13:01+00:00","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","breadcrumb":{"@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/nist-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cyber-curriculum.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"IT Security &amp; Compliance","item":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/"},{"@type":"ListItem","position":3,"name":"NIST Framework"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"CyberCurriculum","description":"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/comments?post=2765"}],"version-history":[{"count":8,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2765\/revisions"}],"predecessor-version":[{"id":3956,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2765\/revisions\/3956"}],"up":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2668"}],"wp:attachment":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/media?parent=2765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}