NIS2: regulated service providers in the higher regime

Gain comprehensive practical knowledge and steps to implement security measures immediately

Requirements:
  • No experience required

Take an important step to build your organisation's resilience to cyber threats.

To protect your own assets, your organisation's operations and ensure compliance with NIS2 or the new Cyber Security Act. The course content is built to provide a basic management overview for anyone who is responsible for information and cyber security, or who works in this area or plans to build a career in it.

The training is designed for anyone involved in managing cyber security in an organisation. This course is ideal not only for cybersecurity managers who want to deepen their knowledge, but also for organizations that need to quickly adapt to new regulatory requirements.

The most common graduates are:

  • IT experts

  • Project managers

  • IT auditors and information security specialists

  • Also suitable for senior managers with risk management responsibilities

What will you learn

More information
  • You will learn the practical steps for registering as a mandatory subject and the incident reporting process.
  • You will learn the mechanisms for screening suppliers for risk and how to put these measures into practice.
  • You will understand how the NUCIB monitors compliance with its obligations and learn how to communicate effectively with supervisory authorities.
  • Understand how to implement the necessary organisational and technical security measures to meet NIS2 requirements.
  • You will explore options for sanctions and enforcement for non-compliance and analyze the costs associated with setting up security measures.
  • You will get an overview of the new law on cybersecurity (NIS2) and the obligations arising from this law for providers of regulated services.

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

1st Day

09:00 – 10:30 Introduction to NIS2
  • Reasons for the amendment
  • General information on NIS2
In detail NIS2 and ZoKB
  • Who is affected by the new obligations
  • Distribution of obliged entities
In detail Obligations
  • Registration of subjects
  • Self-determination process
  • Communication with NÚKIB
  • Measures (countermeasures)
  • Cyber threat status
  • Incidents and how to report them
  • Obligation to implement security measures
  • Supplier risk screening mechanism
10:30 – 10:45 Coffee break
10:45 – 12:15 Control activities of the NÚKIB
  • Method of checking compliance with obligations
  • Sanctions and enforcement measures
  • Setting costs
  • Examples
12:15 – 13:15 Lunch break
13:15 – 14:45
  • Security measures
  • Organisational measures
  • Technical measures
14:45 – 15:00 Coffee break
15:00 – 16:30 Implementation
  • Basic implementation procedure
  • Useful links
Conclusion
  • Discussion
  • Block length 90 min.
  • Teaching hours 8
  • Refreshments Yes
  • Exam No

The course is also suitable for cybersecurity managers to improve their knowledge.

Frequently asked questions

All questions

What is NIS2?

NIS2 is an updated version of the 2016 Network and Information Security Directive. NIS2 significantly expands the scope of the current legislation and presents a new solution to strengthen and secure European cyberspace. EU Member States are obliged to adapt this Directive into their legal system.

What changes does NIS2 bring?

The scope of obligations to ensure information and cyber security will not change that much with the new law. What will be new, however, will be the number of regulated entities. Under the current cyber security law regime, obligations are imposed on several hundred larger firms and public bodies. The new law will affect thousands, if not tens of thousands, of organizations. Including a number of medium and smaller entities. Even in areas that have not yet been covered by any regulation directly related to information or cyber security, such as the food industry, waste management, the provision of certain IT services, transport, etc.