Internal training

Training on the requirements of the NIS2 Directive

Training based on the practical aspects and obligations arising from the new NIS2 Directive.

About the training

Training on the requirements of the NIS2 Directive

A one-day training course during which participants will become familiar with the key aspects of the NIS2 Directive. The course participants will gain knowledge on how to meet cybersecurity requirements. Through lectures and practical workshop exercises, they will acquire skills related to the key elements of the NIS2 Directive, including its goals, principles, and requirements concerning the protection of critical infrastructure.

The detailed scope of the training is presented below.

Dedicated exclusively to your organization – this approach guarantees comfort and freedom to thoroughly discuss specific topics and situations within your company. We understand that every business is unique, so to effectively translate the acquired knowledge into your organization, we tailor the examples presented to your specific needs and business context.

Training program

Day 1

9.00-16.00

  •  Welcome and Introduction to the Training
  • What is NIS2? Who does it apply to? – Purpose and Scope
  • Overview of the NIS2 Directive: Definition, objectives, and scope.
  • Reasons for its creation and its impact on cybersecurity at the organizational level.
  • Key changes and obligations introduced by NIS2.
  • A comparison of the current NIS Directive with the new NIS2 Directive and its reach.
  • Break
  • Who is affected by the new NIS2 Directive and by when must changes be implemented?
  • Key vs. important entities under NIS2.
  • Explanation of which organizations are subject to the NIS2 security requirements.
  • NIS2 from an organizational perspective: What actions need to be taken?
  • Obligations of key entities vs. important entities.
  • Discussing the most important aspects and responsibilities within the organizational context.
  • Cybersecurity risk management in the context of NIS2.
  • Overview of the risk management process, risk management measures in cybersecurity, and incident management.
  • Break
  • Security Measures for Business Continuity under NIS2
  • Obligations of entities to implement measures ensuring business continuity in the event of cybersecurity incidents, minimizing potential damage, and restoring normal system operations.
  • Overview of incident reporting requirements and procedures.
  • Impact of the NIS Directive on Other Legal Acts
  • Discussion on the influence of NIS2 on other legal regulations.
  • Proposed changes to the National Cybersecurity System Act from July 2023: Presentation of key amendments and corrections made in recent months, with practical advice on how to implement these upcoming changes.

How does it work?

Step 1

REGISTRATION

In the first step, fill out the application form to express your interest in organizing dedicated training at your company.

Step 2

DATE

We will set the date and location of the training – tailored to your availability and individual expectations.

Step 3

PRICE

We will present the commercial terms for organizing the training based on the agreed parameters and number of participants.

Step 4

TRAINING

We will conduct the dedicated training according to the agreed terms.

Request a quote for an internal training

Organizers