Internal training

Practical Approach to the National Cybersecurity System Act for Operators of Essential Services and Digital Service Providers.

A professionally prepared training covering key issues in the field of Cybersecurity, which will enable participants to ensure the required level of security for the provided essential/digital services.

About the training

An effective training for those who want to expand their knowledge of the practical approach to the requirements of the National Cybersecurity System Act.

The training is conducted in the form of lectures and workshops, ensuring the effective application of new knowledge and skills to practical actions. We focus not only on delivering theoretical knowledge but, above all, on providing effective, practical methods and techniques, as well as valuable experiences and best practices. The training lasts one day, and upon completion, participants will receive a certificate of attendance. During the training, key issues related to the KSC for Operators of Essential Services and Digital Service Providers will be discussed. The materials and exercises provided during the training will prepare participants to meet their responsibilities within the KSC framework.

Dedicated exclusively to your organization – this approach guarantees comfort and freedom to thoroughly discuss example issues and situations specific to your company. We understand that every business is unique, so to effectively apply the knowledge gained within your organization, we tailor the presented examples to your specific needs and business context.

Training program

Day 1
9:00 - 16:00

  • Welcome Participants
  • Introduction to the Practical Approach to the National Cybersecurity System (KSC) Act Requirements.
  • Main assumptions and practical requirements of the KSC Act.
  • Basic terms and definitions needed for daily operations.
  • Specific challenges and needs related to meeting the requirements of the KSC and the organization.
  • Essential Service Operators
  • The need to address the KSC requirements.
  • The biggest threats faced in daily operations.
  • How to ensure a high level of security?
  • Digital Service Providers
  • Understanding the obligations of digital service providers.
  • Essential vs. Digital Service Operators – What are the differences?
  • What should digital service providers ensure in their services?
  • Compliance Audit Challenges
  • The audit process.
  • Identifying non-compliance.
  • Scope and documentation of audits.
  • Lunch Break
  • Cybersecurity Management Processes – A Systematic Approach
  • Ensuring continuous compliance with KSC obligations.
  • Main challenges in effectively managing KSC-related activities.
  • NIS 2 Directive – What to Expect?
  • New areas covered by the NIS 2 Directive.
  • Changes NIS 2 will bring to cybersecurity within the EU internal market.
  • Difficult Questions and Discussions
  • Open Q&A session and discussion.

How does it work?

Step 1

REGISTRATION

As the first step, please fill out the application form to let us know your interest in organizing dedicated training at your company.

Step 2

DATE

We will arrange the date and location of the training — adapting to your availability and individual expectations.

Step 3

PRICE

We will present the commercial terms for organizing the training based on the agreed parameters and number of participants.

Step 4

TRAINING

We will deliver the dedicated training in accordance with the agreed terms.

Request a quote for an internal training session