NIS-2 Implementing Regulation: Audit Readiness and the Role of Identity Management in the Digital Economy
NIS-2 is not just another regulation to file away. Especially for organizations in the digital economy, the Commission Implementing Regulation (EU) 2024/2690 (NIS-2 Implementing Regulation) clarifies the requirements and makes them directly auditable. It requires security measures that are not only documented, but demonstrably effective. This raises very practical questions: Who has access to which systems and data? For how long? And how can this be proven at any time? This is where NIS-2 becomes tangible, particularly in Identity & Access Management. In this webinar, we show why IAM is evolving from an operational IT task into a strategic success factor and how organizations can translate regulatory requirements into practical, day-to-day processes.
Find out more
Date
Time
Speakers
:quality(50))
David Capriati
Managing Consultant, egerer Consulting GmbH
:quality(50))
Oliver Moebel
Project Consultant, egerer Consulting GmbH
Webinar Agenda – Implementing NIS-2 Successfully
The webinar approaches NIS-2 from a hands-on perspective with a clear focus on Identity & Access Management:
What NIS-2 and the Implementing Regulation really require: A structured overview of the directive and the NIS-2 Implementing Regulation, with a focus on governance, risk management, and explicitly required technical and organizational measures.
Why IAM is central to NIS-2: Unique identities, need-to-know principles, logging, and continuous monitoring are no longer optional – they are mandatory.
Governance before technology: Which role models, processes, and responsibilities form the foundation of NIS-2-compliant IAM.
Automation as the key to auditability: How automated employee lifecycles, access recertifications, and centralized entitlement management reduce risk and simplify audits.
From regulatory intent to practical implementation: How a modern IGA solution translates NIS-2 requirements into practice and becomes a crucial step toward organization-wide compliance.
Key Takeaways
You will understand which IAM requirements arise directly from the NIS-2 Implementing Regulation.
You will see why manual access processes no longer meet regulatory expectations.
You will learn how governance, processes, and technology must work together.
You will gain insight into how IGA helps turn compliance obligations into greater transparency and security.
Who Should Attend?
This webinar is intended for anyone responsible for information security, IT operations, and compliance who needs to address the requirements of NIS-2, particularly the Implementing Regulation for the digital economy:
IT and security leaders
CISOs, information security officers, and compliance managers
IT management and leadership in mid-sized organizations
Those responsible for IAM, IGA, and access management processes
Organizations that are already subject to NIS-2 or the NIS-2 Implementing Regulation, or will be in the future
Register Now
Use this webinar to discuss your specific questions around NIS-2, Identity Management, and audit requirements directly with experienced experts. You will gain practical insights and clear guidance on the next meaningful steps for your organization.