The NFC supersedes both the ISO/IEC 27001, ISO/IEC 27002 & ISO/IEC 27005 in the context of cyber security. Just login...

  • Closing the Gap
    Technology & Human Factors
    The critical issues affecting developing and
    implementing a comprehensive ISMS that focuses on Cyber-Crime need to be identified understood
    and controlled during the integration.
  • The absence of compliance in an organization
    is an indication of poor security measures
    causing security risks.

ISMS™ for CISO | Security Managers

On Cloud or Premises? The Nine Five Circle (NFC) Information Security Management System model is seen as a better choice for organizations looking for ISMS that relates to data security. In the cybersecurity zone, the NFC standards for best practice have been developed to provide guidance to organizations wishing to defend their data and business assets from cyber crimes. These standards cover, in addition to other things, the prerequisites for data security, business progression, and risk analysis. Includes Situation Awareness, Metrics, KPIs, CSF, Approaches, SWOT, PEST, Vulnerability Assessment and Management, Security Maturity, ScoreCard, Graphs, Measurements, RACI, Data Classification, Application Inventory, Monte Carlos analysis, Penetration Testing Evaluation, Integration control, and Gap Closure. The NFC combines both human intelligence and machine learning for organizations to make smarter decisions using data and analytics. .

Nine-Five-Circle (NFC) ISMS

The NFC provides detailed guidance for the organization by providing them with the information that needs to be addressed and the systems that need to be used.

Dynamic process

The NFC efficiency enables organizations to determine their maturity level in each life-cycle.

Be Part Of The Cyber Crime Journey!


Nine-Five-Circle enhances the interrelationship between technology and human factors that are not seen in the context of ISO/IEC 27000-family.