{"version":"1.0","provider_name":"kw022024","provider_url":"https:\/\/itegriti.com\/kw022024","title":"NIST Based Cybersecurity Analysis","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DIGQgCfqWE\"><a href=\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/\">NIST Based Cybersecurity Analysis<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/itegriti.com\/kw022024\/2016\/gsd\/nist-cybersecurity-analysis\/embed\/#?secret=DIGQgCfqWE\" width=\"600\" height=\"338\" title=\"&#8220;NIST Based Cybersecurity Analysis&#8221; &#8212; kw022024\" data-secret=\"DIGQgCfqWE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"ITEGRITI assisted a client in the electric power industry by performing a gap analysis of their cybersecurity program against both regulatory standards and the NIST framework.\u00a0 We provided prioritized and actionable recommendations for each identified concern with sufficient detail to direct the client team through remediation.\u00a0Agreeing\u00a0 with all reported concerns [&hellip;]"}