Skip to content

Scam messages have been sent in the name of Cyber Security Finland.

Read more about the scams
Regulatory Frameworks

Cybersecurity Regulatory Frameworks

Comprehensive collection of key cybersecurity regulations and standards. Detailed implementation guides and compliance support.

6+
Major regulations
100+
Requirements covered
25+
Industries supported
98%
Compliance success rate

Implementation Process

Five-phase methodology for successful implementation of regulations and standards

1

Current state assessment

2

Requirements analysis

3

Implementation planning

4

Practical implementation

5

Audit and certification

Supported Regulatory Frameworks

Comprehensive support for key cybersecurity regulations and standards

EU
Active: 2024-10-17

NIS2 Directive

European Union Network and Information Security Directive v2

Key requirements:

  • Cybersecurity risk management
  • Incident reporting
  • Supply chain security
  • Staff training
Sectors:
Energy Transport Banking Health Digital Infrastructure
Learn More
EU
Active: 2025-01-17

DORA Regulation

Digital Operational Resilience Act for financial sector

Key requirements:

  • ICT risk management
  • Third-party risk management
  • Digital operational resilience
  • Testing and exercises
Sectors:
Banking Insurance Investment Payment Services
Learn More
EU + Global
Active: 2018-05-25

GDPR Regulation

General Data Protection Regulation for personal data processing

Key requirements:

  • Data protection impact assessments
  • Personal data protection
  • Data breach notification
  • Individual rights
Sectors:
All sectors processing personal data
Learn More
EU
Active: 2016-07-01

eIDAS Regulation

Electronic identification and trust services

Key requirements:

  • Electronic signatures
  • Electronic sealed documents
  • Time stamping
  • Authentication services
Sectors:
Digital Services Public Services E-commerce
Learn More
Global
Active: Ongoing

ISO 27001

International information security management system standard

Key requirements:

  • Information security policy
  • Risk assessment process
  • Security controls
  • Continuous improvement
Sectors:
All sectors
Learn More
Global
Active: Ongoing

SOC 2

Service organization control auditing

Key requirements:

  • Security
  • Availability
  • Processing Integrity
  • Confidentiality
Sectors:
SaaS Cloud Services Data Centers
Learn More

Start Your Compliance Journey

Contact our experts and get a tailored implementation plan.