Course Outline
1 - Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation
- Training course objectives and structure
- Standards and regulatory frameworks
- NIS 2 Directive h NIS 2 Directive requirements
- Initiation of the NIS 2 Directive implementation
- The organization and its context
2 - Analysis of NIS 2 Directive compliance program, asset management, and risk management
- Cybersecurity governance
- Cybersecurity roles and responsibilities
- Asset management
- Risk management
3 - Cybersecurity controls, incident management, and crisis management
- Cybersecurity controls
- Supply chain security
- Incident management
- Crisis management
4 - Communication, testing, monitoring, and continual improvement in cybersecurity
- Business continuity
- Awareness and training
- Communication
- Testing in cybersecurity
- Measuring, monitoring, and reporting performance and metrics
- Continual improvement
- Closing of the training course
- Audit documentation and quality review
- Closing of the audit
- Evaluation of action plans by the auditor
- Beyond the initial audit
- Managing an internal audit program
- Closing of the training course
Target Audience
Cybersecurity professional seeking to gain a thorough understanding of the requirements of NIS 2 Directive and learn practical strategies to implement robust cybersecurity measures
IT managers and professionals aiming to gain insights on implementing secure systems and improve the resilience of critical systems
Government and regulatory officials responsible for enforcing the NIS 2 Directive