gptkbp:instance_of
|
gptkb:Cybersecurity
|
gptkbp:adapted_into
|
Small Businesses
|
gptkbp:addresses
|
Cyber Threats
|
gptkbp:aims_to
|
Enhance Security
|
gptkbp:applies_to
|
Chemical Sector
|
gptkbp:collaborated_with
|
Non-Governmental Organizations
Public-Private Partnerships
Academic Institutions
International Organizations
Research Projects
|
gptkbp:communication
|
gptkb:Publications
Industry Leaders
|
gptkbp:developed_by
|
gptkb:NIST
|
gptkbp:encourages
|
gptkb:collaboration
|
gptkbp:facilitates
|
Information Sharing
|
gptkbp:focuses_on
|
gptkb:Risk_Management
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Cybersecurity Framework for Chemical Sector
|
gptkbp:includes
|
gptkb:Inspector
Implementation Tiers
Core Functions
|
gptkbp:is_adopted_by
|
Government Agencies
Supply Chain Security
|
gptkbp:is_aligned_with
|
ISO Standards
|
gptkbp:is_based_on
|
gptkb:Risk_Management
|
gptkbp:is_designed_for
|
Critical Infrastructure
|
gptkbp:is_documented_in
|
gptkb:guidelines
Reports
|
gptkbp:is_enhanced_by
|
Technological Advances
|
gptkbp:is_evaluated_by
|
gptkb:Micro_Profile
gptkb:Best_Practices
Surveys
Regulatory Bodies
Industry Experts
Third-Party Auditors
|
gptkbp:is_guided_by
|
Federal Policies
|
gptkbp:is_incorporated_in
|
Training Curricula
|
gptkbp:is_influenced_by
|
Global Standards
|
gptkbp:is_informed_by
|
gptkb:military_intelligence
Case Studies
Cybersecurity Incidents
|
gptkbp:is_integrated_with
|
Business Processes
Other Frameworks
|
gptkbp:is_part_of
|
gptkb:Cybersecurity
|
gptkbp:is_promoted_by
|
gptkb:NIST
Industry Associations
Consultants
Cybersecurity Experts
|
gptkbp:is_promoted_through
|
gptkb:Social_Media
Conferences
Webinars
Awareness Campaigns
|
gptkbp:is_referenced_in
|
Regulatory Guidance
|
gptkbp:is_reviewed_by
|
Stakeholders
Peer Reviews
|
gptkbp:is_supported_by
|
gptkb:Workshops
gptkb:Advisory_Services
Grants
Training Programs
Funding Opportunities
Research Initiatives
Technical Assistance
Technical Standards
Public Funding
|
gptkbp:is_updated_by
|
gptkb:NIST
|
gptkbp:is_used_by
|
Chemical Industry
|
gptkbp:is_utilized_for
|
Crisis Management
Incident Response
Policy Development
Resource Allocation
Strategic Planning
Incident Management
Training Exercises
Vulnerability Assessments
Compliance Assessments
|
gptkbp:is_utilized_in
|
Risk Assessments
|
gptkbp:promotes
|
gptkb:Best_Practices
|
gptkbp:provides
|
gptkb:assessment_tools
|
gptkbp:provides_guidance_on
|
Cybersecurity Practices
|
gptkbp:supports
|
gptkb:Resilience
|
gptkbp:bfsParent
|
gptkb:Cybersecurity
|
gptkbp:bfsLayer
|
3
|