
Prepare for the NIS2 Directive and the new Cyber Security Act
We can help you secure your organisation in compliance with NIS2 in a timely manner.
What is NIS2?
NIS2, or the Second Cyber Security Directive, is an update of the 2016 EU NIS (Network and Information Security) Directive, which will be implemented in the Cyber Security Act. This amendment is in response to the dramatic increase in cyberattacks in recent years.
Who does NIS2 appy to?
The NIS2 Directive will not only deepen and broaden the whole framework of cyber security in companies, but also significantly expand the number of organisations covered by the Directive from 300 to 9,000 organisations. This will mean direct accountability for CEOs and the reintroduction of higher financial penalties.
A total of 22 sectors, including the energy industry, transport sector, digital service providers, waste management and the chemical industry, will be obliged to comply with the legislative requirements of the new Cyber Security Act and NIS2.
What is NIS2 about?
The introduction of security management (ISMS) for NIS2 will bring about big changes across the board for many organisations. The implementation of NIS2 not only requires an intervention in processes, it also significantly affects technology and human resources.
-
Processes
Processes
-
Technology
Technology
-
Human Resources
Human Resources
How we can help you with NIS2
We perform a comprehensive gap analysis of your current level of cyber security against the new Cyber Security Act (NIS2) requirements. We look at security gaps and challenges across your entire organization, from processes and technology to human resources.
- Analysis of the current state of cyber security in your company
- Evaluation of the fulfilment of NIS2 requirements
- Draft strategy and recommendations for meeting the Cyber Security Act requirements (NIS2 implementation plan)
- NIS2 deployment and outsourcing of security services
-
Processes
Implementation of ISMS in accordance with the new Cyber Security • Setting up security processes • Writing documentation • Putting processes into practice
-
Technology
SOC as a Service • Vulnerability scanning on an annual basis • Penetration testing • Network security audit • PAM deployment
-
Human Resources
CISO as a Service (Outsorcing the role of Cyber Security Manager) • Cyber Security Architect as a Service • internal audit on an annual basis
Why start addressing NIS2 now?
I NEED HELP WITH NIS2