{"id":24,"date":"2025-07-24T12:47:40","date_gmt":"2025-07-24T12:47:40","guid":{"rendered":"https:\/\/www.atelye.com.tr\/?page_id=24"},"modified":"2025-11-17T12:43:31","modified_gmt":"2025-11-17T12:43:31","slug":"elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions","status":"publish","type":"page","link":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/","title":{"rendered":"Packages"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-c2b63da3 wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-group alignfull has-raft-bg-alt-background-color has-background is-layout-constrained wp-container-core-group-is-layout-c2b63da3 wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-small-font-size\" style=\"font-style:normal;font-weight:600;letter-spacing:2px;text-transform:uppercase\">Explore Our Packages<\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-left\" id=\"h-elevate-your-security-posture\">Elevate Your Security Posture:<\/h1>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left\" id=\"h-comprehensive-cybersecurity-amp-grc-solutions\"> Comprehensive Cybersecurity &amp; GRC Solutions<\/h2>\n\n\n\n<p class=\"has-text-align-left\">Safeguard your digital assets and ensure Cybersecurity operational resilience with our tailored packages in Information Security, Risk Management, Compliance, and IT Governance.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-container-core-buttons-is-layout-da267d74 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/atelyedr.etsy.com\">Buy Now<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.atelye.com.tr\/index.php\/insights\/\">Read More<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/atelyedr.etsy.com\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi.png\" alt=\"Master Your Cyber &amp; Operational Risk with Expert Solutions\" class=\"wp-image-252\" style=\"aspect-ratio:1;object-fit:contain\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi.png 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi-300x300.png 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi-150x150.png 150w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left is-style-default\" id=\"h-beyond-protection\">Beyond Protection: <\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\" id=\"h-master-your-cybersecurity-amp-operational-risk-with-expert-solutions\">Master Your Cybersecurity &amp; Operational Risk with Expert Solutions<\/h3>\n\n\n\n<p class=\"has-text-align-left has-normal-font-size\">From robust information and cybersecurity frameworks to meticulous Compliance and Governance strategies, our packages empower your organization to thrive securely.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-5be2cbe1 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-e0082cf6 wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-left has-x-large-font-size\" id=\"h-cyber-risk-management-toolkit\">Cyber Risk Management Toolkit<\/h2>\n\n\n\n<p class=\"has-text-align-left\">Proactively manage your cybersecurity posture and stay ahead of emerging threats with our comprehensive <strong>Cyber Risk Management Toolkit<\/strong>. This toolkit provides the essential resources you need to identify, assess, and mitigate risks, turning potential vulnerabilities into a secure operational advantage.<\/p>\n\n\n\n<p>Don&#8217;t let cyber threats catch you by surprise. Our framework is designed to help you build a robust defense strategy, empowering your organization to navigate the digital landscape with confidence and resilience.<\/p>\n\n\n\n<p><strong>Key Features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Integrated Risk &amp; Vulnerability Assessments:<\/strong> Identify and prioritize potential weak points in your systems. Our customizable templates make risk analysis easy and efficient.<\/li>\n\n\n\n<li><strong>Proactive Threat Intelligence:<\/strong> Stay informed about the latest <strong>cybersecurity threats<\/strong> and attack vectors, enabling you to build a smarter, more resilient defense.<\/li>\n\n\n\n<li><strong>Incident Response Planning Guides:<\/strong> Get a step-by-step roadmap for handling and containing cyber incidents, minimizing damage, and ensuring a swift recovery.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-left\">Take control of your <strong>cyber risk<\/strong> and fortify your business against today&#8217;s and tomorrow&#8217;s threats.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-876a7d94 wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-container-core-group-is-layout-cd434741 wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center has-raft-bg-alt-background-color has-background is-layout-flex wp-container-core-columns-is-layout-e05d3243 wp-block-columns-is-layout-flex\" style=\"padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"896\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png\" alt=\"Ultimate NIST CSF 2.0 Cyber Risk Assessment Toolkit | Governance, Identify, Protect, Detect, Respond, Recover Template\" class=\"wp-image-260\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png 1600w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template-300x168.png 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template-1024x573.png 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template-768x430.png 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template-1536x860.png 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-container-core-column-is-layout-71c1d140 wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<h3 class=\"wp-block-heading\" id=\"h-ultimate-nist-csf-2-0-cyber-risk-assessment-toolkit-governance-identify-protect-detect-respond-recover-template\">Ultimate NIST CSF 2.0 Cyber Risk Assessment Toolkit | Governance, Identify, Protect, Detect, Respond, Recover Template<\/h3>\n\n\n\n<p>Master Your Cyber Security Posture with the Ultimate NIST CSF 2.0 Toolkit<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/\">Read more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-eeeb4991 wp-block-group-is-layout-constrained\" style=\"border-radius:0px;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/www.etsy.com\/listing\/4337080365\/cybersecurity-risk-threat-catalog\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369.webp\" alt=\"\" class=\"wp-image-55\" style=\"aspect-ratio:1.3333333333333333;object-fit:cover;width:504px;height:auto\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369-300x300.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369-150x150.webp 150w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369-768x768.webp 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<div class=\"wp-block-group has-raft-bg-alt-background-color has-background is-layout-constrained wp-container-core-group-is-layout-ba3d759a wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-e0082cf6 wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-left has-medium-font-size\" id=\"h-cybersecurity-risk-amp-threat-catalog-toolkit\">Cybersecurity Risk &amp; Threat Catalog Toolkit <\/h3>\n\n\n\n<p class=\"has-text-align-left\">NIST &#8211; ISO 27001 Compliance Template (Excel)<\/p>\n\n\n\n<p class=\"has-text-align-left\">Save weeks of work and be Audit-Ready with our comprehensive Cybersecurity Risk &amp; Threat Catalog Toolkit. This professional Excel template is designed for cybersecurity professionals, GRC teams, vCISOs, and IT audit teams who need a structured, efficient, and compliance-ready risk management solution.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Our toolkit helps you navigate complex information security requirements and build a robust risk register in hours, not months. It\u2019s fully aligned with global standards, ensuring a comprehensive assessment of cybersecurity risks.<br>Including NIST 800-53, ISO 27001, CIS Controls, and NIST CSF.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4337080365\/cybersecurity-risk-threat-catalog\">Buy Now<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-raft-bg-alt-background-color has-background is-layout-constrained wp-container-core-group-is-layout-38ba5251 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-group is-layout-constrained wp-container-core-group-is-layout-92b9201d wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"h-showcase-features-compliance-framework\">Showcase Features Compliance Framework<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Easily navigate the complexities of data privacy with our all-in-one <strong>GDPR &amp; Compliance Framework<\/strong>. This comprehensive toolkit provides the essential resources you need to build a robust <strong>Information Security<\/strong> and <strong>data governance<\/strong> program, ensuring your business is fully prepared and <strong>audit-ready<\/strong>.<\/p>\n\n\n\n<p>Say goodbye to manual research and legal guesswork. Our framework is designed to help you quickly implement compliant policies and procedures, minimizing the risk of fines and building trust with your customers.<\/p>\n\n\n\n<p><strong>Key Features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Step-by-Step GDPR Checklists:<\/strong> Follow a clear roadmap to achieve and maintain <strong>regulatory compliance<\/strong>.<\/li>\n\n\n\n<li><strong>Customizable Policy &amp; Procedure Templates:<\/strong> Quickly establish a solid <strong>data governance<\/strong> foundation with professionally written documents.<\/li>\n\n\n\n<li><strong>Audit-Readiness Documentation:<\/strong> Ensure your business is prepared for any <strong>compliance audit<\/strong> with easy-to-use forms and templates.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\">Take control of your <strong>data privacy<\/strong> and focus on what matters most: growing your business securely.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.etsy.com\/listing\/4340484499\/cybersecurity-maturity-audit-toolkit\"><img loading=\"lazy\" decoding=\"async\" width=\"1908\" height=\"845\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/4q.webp\" alt=\"Cybersecurity Capability Mapping \u2013 28 Domains with Maturity Levels and NIST 800-53, ISO\/IEC 27002, and NIST CSF Crosswalk\" class=\"wp-image-87\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/4q.webp 1908w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/4q-300x133.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/4q-1024x454.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/4q-768x340.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/4q-1536x680.webp 1536w\" sizes=\"auto, (max-width: 1908px) 100vw, 1908px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cybersecurity-maturity-audit-toolkit\">Cybersecurity Maturity Audit Toolkit <\/h4>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-security-assessment-amp-risk-management\">Security Assessment &amp; Risk Management<\/h5>\n\n\n\n<h6 class=\"wp-block-heading\" id=\"h-iso-27001-nist-cmmi-excel\">ISO 27001, NIST, CMMI (Excel)<\/h6>\n\n\n\n<p>Cyber-resilient! Save weeks of effort with this professional Cybersecurity Maturity &amp; Audit Toolkit. Designed for security consultants, vCISOs, and GRC teams, this powerful tool helps businesses of all sizes to perform a thorough security assessment and improve their cybersecurity posture. The toolkit is built on a proven CMMI 5 maturity model. Alsois fully aligned with global standards like ISO 27001, NIST 800-53, and NIST CSF.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4340484499\/cybersecurity-maturity-audit-toolkit\">Buy Now<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/www.etsy.com\/listing\/4295921433\/information-security-maturity-model-iso\"><img loading=\"lazy\" decoding=\"async\" width=\"1908\" height=\"975\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/ISO-27001-NIST-CSF.webp\" alt=\"This downloadable Excel-based tool offers a structured, domain-driven assessment for evaluating your organization\u2019s information security maturity. Designed in alignment with ISF, NIST CSF, and ISO27001 frameworks, it helps security leaders and consultants benchmark and plan continuous improvements across 17 key security domains. Includes pre-mapped essential areas, clear maturity level guidance, and actionable scoring sheets.\" class=\"wp-image-128\" style=\"width:305px;height:auto\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/ISO-27001-NIST-CSF.webp 1908w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/ISO-27001-NIST-CSF-300x153.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/ISO-27001-NIST-CSF-1024x523.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/ISO-27001-NIST-CSF-768x392.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/ISO-27001-NIST-CSF-1536x785.webp 1536w\" sizes=\"auto, (max-width: 1908px) 100vw, 1908px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-information-security-maturity-model\">Information Security Maturity Model <\/h4>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-iso-27001-amp-nist-csf-excel-template\">ISO 27001 &amp; NIST CSF Excel Template <\/h5>\n\n\n\n<h6 class=\"wp-block-heading\" id=\"h-cybersecurity-audit-tool\">Cybersecurity Audit Tool<\/h6>\n\n\n\n<p>This comprehensive Excel toolkit gives you the ultimate accelerator for assessing and improving your information security posture. We built it on an industry-proven framework, aligning fully with ISO\/IEC 27001, NIST CSF, and ISF standards. You get a structured, score-based, and audit-ready framework that simplifies a complex process.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4295921433\/information-security-maturity-model-iso\">Buy Now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/4340484499\/cybersecurity-maturity-audit-toolkit\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"560\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1024x560.webp\" alt=\"Network Security Maturity Assessment Table \u2013 CMMI-Based Evaluation of People, Process, and Technology with NIST CSF Alignment\" class=\"wp-image-54 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1024x560.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-300x164.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-768x420.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1536x841.webp 1536w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9.webp 1880w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Security Assessment &amp; Risk Management | ISO 27001, NIST, CMMI (Excel)<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/cybersecurity-maturity-audit-toolkit-cmmi-based-posture-assessment-28-domains-nist-iso27001-csf-aligned\/\">&#8230;More&#8230;<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4340484499\/cybersecurity-maturity-audit-toolkit\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/4337080365\/cyber-risk-inventory-threat-catalog-196\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369.webp\" alt=\"\" class=\"wp-image-55 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369-300x300.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369-150x150.webp 150w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7076357117_i369-768x768.webp 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Risk &amp; Threat Catalog Toolkit | NIST &#8211; ISO 27001 Compliance Template (Excel)<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/cyber-risk-inventory-threat-catalog-196-nist-csf-aligned-risks-173-threat-catalog-excel-toolkit-iso-27001-nist-800-53-threat-control\/\">More<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4337080365\/cyber-risk-inventory-threat-catalog-196\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/1888048463\/information-security-risk-assessment\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"492\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6762748999_5o7g-1024x492.webp\" alt=\"Information Security Risk Assessment Toolkit \u2013 Excel-Based Dashboard for Identifying and Scoring Cyber Risks\" class=\"wp-image-56 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6762748999_5o7g-1024x492.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6762748999_5o7g-300x144.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6762748999_5o7g-768x369.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6762748999_5o7g.webp 1251w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">ISO 27001 Risk Assessment Toolkit: Excel &amp; Google Sheets (Digital Download)<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/information-security-risk-assessment-toolkit-excel-template-iso-27002-nist-csf-aligned-cybersecurity-risk-assessment\/\">More<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/1888048463\/information-security-risk-assessment\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/4295921433\/information-security-maturity-model\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"511\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6862266869_gajz-1024x511.webp\" alt=\"This is a maturity assessment and it is not necessary to assess 2 numbers behind the comma.\nRead the considerations, consider your internal objectives and assess.\nMATURITY LEVEL 5 is NOT REQUIRED; this level is about full optimisation. We intend to continuously improve but we do not aim for perfection. We need to consider the business objectives and risk appetite.\nWhen your objective is Maturity level 3 and not Maturity level 4 and you ARE on maturity level 3, SCORE maturity level 3.\" class=\"wp-image-57 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6862266869_gajz-1024x511.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6862266869_gajz-300x150.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6862266869_gajz-768x383.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6862266869_gajz-1536x767.webp 1536w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6862266869_gajz.webp 1913w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Security Maturity Model | ISO 27001 &amp; NIST CSF Excel Template | Cybersecurity Audit Tool<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/information-security-maturity-model-excel-template-iso-27001-nist-csf-aligned-assessment-tool-audit-ready-editable\/\">More<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4295921433\/information-security-maturity-model\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/1889944271\/it-internal-control-library\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"453\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6724726128_9id0-1024x453.webp\" alt=\"Ensure your organization's security and compliance with this comprehensive IT Control Framework. This Excel template provides a structured approach to align your IT controls with major cybersecurity frameworks, including NIST 800-53, ISO 27001, ISO 27002, NIST CSF, and COBIT 2019.\n\" class=\"wp-image-58 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6724726128_9id0-1024x453.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6724726128_9id0-300x133.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6724726128_9id0-768x340.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.6724726128_9id0.webp 1266w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">IT Internal Control Library | Comprehensive IT Governance &amp; Risk Management Framework | Control Framework | Editable Excel Template<\/p>\n\n\n\n<p class=\"has-text-align-left\">&#8212;<a href=\"https:\/\/www.atelye.com.tr\/index.php\/it-internal-control-library-comprehensive-it-governance-risk-management-framework-control-framework-editable-excel-template\/\">More<\/a>&#8212;<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/1889944271\/it-internal-control-library\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/4336488246\/bilgi-guvenlii-risk-yonetimi-excel\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Bilgi-Guvenligi-Risk-Yonetimi-Excel-Sablonu.avif\" alt=\"Bilgi G\u00fcvenli\u011fi Risk Envanteri Excel \u015eablonu \u2013 ISO 27001 Uyumlu Bilgi g\u00fcvenli\u011fi risk envanteri Excel \u015fablonu, ISO 27001 uyumlu, siber g\u00fcvenlik risk y\u00f6netimi i\u00e7in dijital ara\u00e7\" class=\"wp-image-103 size-full\"\/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Bilgi G\u00fcvenli\u011fi Risk Y\u00f6netimi Excel \u015eablonu | 394 Haz\u0131r Risk + 167 Tehdit + 333 Aksiyon | ISO 27001, NIST, BDDK, Kvkk Uyumlu T\u00fcrk\u00e7e Dosya<\/p>\n\n\n\n<p class=\"has-text-align-left\">&#8212;<a href=\"https:\/\/www.atelye.com.tr\/index.php\/bilgi-guvenligi-risk-yonetimi-excel-sablonu-394-hazir-risk-167-tehdit-333-aksiyon-iso-27001-nist-bddk-kvkk-uyumlu-turkce-dosya\/\">Get<\/a>&#8212;<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4336488246\/bilgi-guvenlii-risk-yonetimi-excel\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/1876390318\/information-security-policy-template-iso\"><img loading=\"lazy\" decoding=\"async\" width=\"909\" height=\"762\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Policy.webp\" alt=\"Information Security Policy Template Cover Page \u2013 ISO 27001 &amp; NIST CSF Compliant Editable Word Document\" class=\"wp-image-132 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Policy.webp 909w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Policy-300x251.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Policy-768x644.webp 768w\" sizes=\"auto, (max-width: 909px) 100vw, 909px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Information Security Policy Template | Iso 27001 NIST CSF Aligned | Editable Word Format for InfoSec &amp; GRC Use<\/p>\n\n\n\n<p class=\"has-text-align-left\">&lt;&lt;<a href=\"https:\/\/www.atelye.com.tr\/index.php\/information-security-policy-template-iso-27001-nist-csf-aligned-editable-word-format-for-infosec-grc-use\/\">G<\/a>et&gt;&gt;<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/1876390318\/information-security-policy-template-iso\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/4340484499\/cybersecurity-maturity-audit-toolkit\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"560\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1024x560.webp\" alt=\"Network Security Maturity Assessment Table \u2013 CMMI-Based Evaluation of People, Process, and Technology with NIST CSF Alignment\" class=\"wp-image-54 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1024x560.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-300x164.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-768x420.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1536x841.webp 1536w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9.webp 1880w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Cybersecurity Maturity &amp; Audit Toolkit \u2013 CMMI-Based Assessment for 28 Domains (NIST, ISO 27001, CSF Aligned)<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/packages\/cybersecurity-maturity-audit-toolkit-cmmi-based-assessment-for-28-domains-nist-iso-27001-csf-aligned\/\">&#8230;Read More&#8230;<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4340484499\/cybersecurity-maturity-audit-toolkit\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/4296017102\/security-control-framework-template-for\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"480\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Security-Control-Framework.webp\" alt=\"InfoSec Controls Framework with Global Security Standard Mapping (Excel) This professional-grade Information Security Controls Framework (ICF) is designed to support security consultants, auditors, and CISOs in building, assessing, or enhancing cybersecurity programs with precision and global alignment.\" class=\"wp-image-164 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Security-Control-Framework.webp 480w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Security-Control-Framework-300x300.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Security-Control-Framework-150x150.webp 150w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Security Control Framework Template for Auditors &amp; Consultants | InfoSec Controls Framework with Global Standard Mapping Iso Cobit Nist, PCI DSS<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/security-control-framework-template-for-auditors-consultants-infosec-controls-framework-with-global-standard-mapping-iso-cobit-nist-pcidss\/\">&#8230;Read More&#8230;<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4296017102\/security-control-framework-template-for\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/1873429232\/vendor-risk-assessment-toolkit-excel\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"702\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Vendor-Risk-Assessment-Toolkit-1024x702.webp\" alt=\"Vendor Risk Assessment Toolkit Excel Dashboard \u2013 Vendor Scoring and Risk Heatmap for Third\u2011Party Vendor Evaluation Third\u2011Party Vendor Risk Scoring Matrix \u2013 ISO 27001 &amp; NIST 800\u201153 Aligned Vendor Risk Assessment Template\" class=\"wp-image-173 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Vendor-Risk-Assessment-Toolkit-1024x702.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Vendor-Risk-Assessment-Toolkit-300x206.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Vendor-Risk-Assessment-Toolkit-768x527.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Vendor-Risk-Assessment-Toolkit.webp 1493w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Vendor Risk Assessment Toolkit | Excel Template | ISO 27002 &amp; NIST Csf NIST 800-53 Aligned | 3rd Party Assessment for Information Security<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/vendor-risk-assessment-toolkit-excel-template-iso-27002-nist-csf-nist-800-53-aligned-3rd-party-assessment-for-information-security\/\">&#8230;Read More&#8230;<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/1873429232\/vendor-risk-assessment-toolkit-excel\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/1883064262\/information-security-awareness-training\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Awareness-1024x579.webp\" alt=\"Information Security Awareness Training Slide Deck \u2013 Editable PowerPoint Presentation for Cybersecurity Education and Staff Training Information Security Awareness Training Kit | Editable Cybersecurity Presentation + 5 Minimal Security Posters | Digital Download Whether onboarding new employees or running a training session, this kit will help you communicate cybersecurity principles clearly, visually, and effectively.\" class=\"wp-image-181 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Awareness-1024x579.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Awareness-300x170.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Awareness-768x434.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/Information-Security-Awareness.webp 1472w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">Information Security Awareness Training Kit \u2013 Editable PowerPoint + Posters + Canva Link| Editable Cybersecurity Presentation + Posters<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/information-security-awareness-training-kit-editable-powerpoint-posters-canva-link-editable-cybersecurity-presentation-posters\/\">&#8230;Read More&#8230;<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/1883064262\/information-security-awareness-training\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.etsy.com\/listing\/4340484499\/cybersecurity-maturity-audit-toolkit\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"560\" src=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1024x560.webp\" alt=\"Network Security Maturity Assessment Table \u2013 CMMI-Based Evaluation of People, Process, and Technology with NIST CSF Alignment\" class=\"wp-image-54 size-full\" srcset=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1024x560.webp 1024w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-300x164.webp 300w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-768x420.webp 768w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9-1536x841.webp 1536w, https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/07\/il_fullxfull.7095452149_etx9.webp 1880w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-left\">CMMI-Based Cybersecurity Maturity Toolkit | 28 Domains | People-Process-Technology | ISO 27001\/NIST Aligned<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.atelye.com.tr\/index.php\/packages\/cybersecurity-maturity-audit-toolkit-cmmi-based-posture-and-compliance-framework-assessment-28-domains-nist-csf-iso27001-aligned\/\">&#8230;Read More&#8230;<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4340484499\/cybersecurity-maturity-audit-toolkit\">Buy Now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-left has-small-font-size\">\ud83d\udce5 Instant Download<br>Use it immediately in your organization or for client projects.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-raft-bg-alt-background-color has-background is-layout-constrained wp-container-core-group-is-layout-9b632625 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-raft-fg-alt-color has-text-color wp-element-button\" href=\"https:\/\/www.etsy.com\/shop\/AtelyeDR?ref=shop_profile&amp;listing_id=1883064262&amp;section_id=53301479\">Browse All Toolkits on Etsy<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-a3c0914e wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-container-core-group-is-layout-05898ac8 wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left has-xxl-font-size\" id=\"h-why-our-toolkit-is-your-best-solution\"><strong>Why Our Toolkit is Your Best Solution:<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-left\">\u2705 <strong>Achieve &amp; Maintain Compliance:<\/strong> Aligned with leading global and local frameworks like <strong>ISO 27001, NIST CSF, BDDK,<\/strong> and <strong>KVKK<\/strong>, our toolkit ensures your policies and procedures meet critical regulatory standards.<\/p>\n\n\n\n<p class=\"has-text-align-left\">\u2705 <strong>Flexible &amp; Fully Editable:<\/strong> Get instant access to professional, editable templates in Excel, PDF, and Canva formats, allowing you to easily customize and implement solutions that fit your organization.<\/p>\n\n\n\n<p class=\"has-text-align-left\">\u2705 <strong>Expert-Crafted &amp; Vetted:<\/strong> Each document and guide is meticulously designed by seasoned cybersecurity and governance experts, giving you confidence in the quality and accuracy of the content.<\/p>\n\n\n\n<p class=\"has-text-align-left\">\u2705 <strong>Instant, Lifetime Value:<\/strong> With a single purchase, you get immediate download access and a product you can use forever. No hidden fees, no recurring subscriptions\u2014just a one-time investment for long-term security.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-raft-accent-color has-alpha-channel-opacity has-raft-accent-background-color has-background\"\/>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore Our Packages Elevate Your Security Posture: Comprehensive Cybersecurity &amp; GRC Solutions Safeguard your digital assets and ensure Cybersecurity operational resilience with our tailored packages in Information Security, Risk Management, Compliance, and IT Governance. Beyond Protection: Master Your Cybersecurity &amp; Operational Risk with Expert Solutions From robust information and cybersecurity frameworks to meticulous Compliance and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Frameworks for Enhanced Security Posture Manage - Atelye<\/title>\n<meta name=\"description\" content=\"Enhance your organization&#039;s cybersecurity with our tailored packages in Information Security, Risk Management, and Compliance. NIST-ISO27001\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Frameworks for Enhanced Security Posture Manage - Atelye\" \/>\n<meta property=\"og:description\" content=\"Enhance your organization&#039;s cybersecurity with our tailored packages in Information Security, Risk Management, and Compliance. NIST-ISO27001\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Atelye\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T12:43:31+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Atelye_Logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"437\" \/>\n\t<meta property=\"og:image:height\" content=\"181\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Frameworks for Enhanced Security Posture Manage - Atelye\" \/>\n<meta name=\"twitter:description\" content=\"Enhance your organization&#039;s cybersecurity with our tailored packages in Information Security, Risk Management, and Compliance. NIST-ISO27001\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Atelye_Logo.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/\",\"url\":\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/\",\"name\":\"Cybersecurity Frameworks for Enhanced Security Posture Manage - Atelye\",\"isPartOf\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi.png\",\"datePublished\":\"2025-07-24T12:47:40+00:00\",\"dateModified\":\"2025-11-17T12:43:31+00:00\",\"description\":\"Enhance your organization's cybersecurity with our tailored packages in Information Security, Risk Management, and Compliance. NIST-ISO27001\",\"breadcrumb\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#primaryimage\",\"url\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi.png\",\"contentUrl\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi.png\",\"width\":1024,\"height\":1024,\"caption\":\"From robust Information Security frameworks to meticulous Compliance and Governance strategies, our packages empower your organization to thrive securely.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.atelye.com.tr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Packages\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.atelye.com.tr\/#website\",\"url\":\"https:\/\/www.atelye.com.tr\/\",\"name\":\"Atelye\",\"description\":\"Designing Digital Resilience\",\"publisher\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.atelye.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.atelye.com.tr\/#organization\",\"name\":\"Atelye\",\"url\":\"https:\/\/www.atelye.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png\",\"contentUrl\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png\",\"width\":250,\"height\":250,\"caption\":\"Atelye\"},\"image\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/atelye-dr-976413366\/\",\"https:\/\/www.youtube.com\/@AtelyeDR-k5t\"],\"publishingPrinciples\":\"https:\/\/www.atelye.com.tr\/index.php\/about-us\/\",\"ownershipFundingInfo\":\"https:\/\/www.atelye.com.tr\/index.php\/about-us\/\",\"actionableFeedbackPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/faq\/\",\"correctionsPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"ethicsPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"diversityPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"diversityStaffingReport\":\"https:\/\/www.atelye.com.tr\/index.php\/faq\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Frameworks for Enhanced Security Posture Manage - Atelye","description":"Enhance your organization's cybersecurity with our tailored packages in Information Security, Risk Management, and Compliance. NIST-ISO27001","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Frameworks for Enhanced Security Posture Manage - Atelye","og_description":"Enhance your organization's cybersecurity with our tailored packages in Information Security, Risk Management, and Compliance. NIST-ISO27001","og_url":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/","og_site_name":"Atelye","article_modified_time":"2025-11-17T12:43:31+00:00","og_image":[{"width":437,"height":181,"url":"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Atelye_Logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Cybersecurity Frameworks for Enhanced Security Posture Manage - Atelye","twitter_description":"Enhance your organization's cybersecurity with our tailored packages in Information Security, Risk Management, and Compliance. NIST-ISO27001","twitter_image":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Atelye_Logo.png","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/","url":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/","name":"Cybersecurity Frameworks for Enhanced Security Posture Manage - Atelye","isPartOf":{"@id":"https:\/\/www.atelye.com.tr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#primaryimage"},"thumbnailUrl":"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi.png","datePublished":"2025-07-24T12:47:40+00:00","dateModified":"2025-11-17T12:43:31+00:00","description":"Enhance your organization's cybersecurity with our tailored packages in Information Security, Risk Management, and Compliance. NIST-ISO27001","breadcrumb":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#primaryimage","url":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi.png","contentUrl":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_4poiec4poiec4poi.png","width":1024,"height":1024,"caption":"From robust Information Security frameworks to meticulous Compliance and Governance strategies, our packages empower your organization to thrive securely."},{"@type":"BreadcrumbList","@id":"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.atelye.com.tr\/"},{"@type":"ListItem","position":2,"name":"Packages"}]},{"@type":"WebSite","@id":"https:\/\/www.atelye.com.tr\/#website","url":"https:\/\/www.atelye.com.tr\/","name":"Atelye","description":"Designing Digital Resilience","publisher":{"@id":"https:\/\/www.atelye.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.atelye.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.atelye.com.tr\/#organization","name":"Atelye","url":"https:\/\/www.atelye.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png","contentUrl":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png","width":250,"height":250,"caption":"Atelye"},"image":{"@id":"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/atelye-dr-976413366\/","https:\/\/www.youtube.com\/@AtelyeDR-k5t"],"publishingPrinciples":"https:\/\/www.atelye.com.tr\/index.php\/about-us\/","ownershipFundingInfo":"https:\/\/www.atelye.com.tr\/index.php\/about-us\/","actionableFeedbackPolicy":"https:\/\/www.atelye.com.tr\/index.php\/faq\/","correctionsPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","ethicsPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","diversityPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","diversityStaffingReport":"https:\/\/www.atelye.com.tr\/index.php\/faq\/"}]}},"_links":{"self":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":29,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":263,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/24\/revisions\/263"}],"wp:attachment":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}