{"version":"1.0","provider_name":"Kyberala","provider_url":"https:\/\/teknologiateollisuus.fi\/fisc","title":"Cyber risk management directory","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"u64Sg4Gk3G\"><a href=\"https:\/\/teknologiateollisuus.fi\/fisc\/en\/cyber-risk-management-directory\/\">Cyber risk management directory<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/teknologiateollisuus.fi\/fisc\/en\/cyber-risk-management-directory\/embed\/#?secret=u64Sg4Gk3G\" width=\"600\" height=\"338\" title=\"&#8221;Cyber risk management directory&#8221; &#8212; Kyberala\" data-secret=\"u64Sg4Gk3G\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/teknologiateollisuus.fi\/fisc\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"A classification based on the internationally recognized and widely used cybersecurity risk management process model (NIST CSF 2.0), particularly for meeting the compliance requirements of the NIS2 Directive. NIST CSF 2.0 (National Institute of Standards and Technology Cybersecurity Framework 2.0) is an updated version of NIST\u2019s cybersecurity framework. This framework helps organizations manage cybersecurity risks [&hellip;]","thumbnail_url":"https:\/\/teknologiateollisuus.fi\/fisc\/wp-content\/uploads\/sites\/11\/2024\/10\/hallintamalli-e1736336253584.jpg","thumbnail_width":525,"thumbnail_height":500}