Webinar

NIS-2 Implementing Regulation: Audit Readiness and the Role of Identity Management in the Digital Economy

NIS-2 is not just another regulation to file away. Especially for organizations in the digital economy, the Commission Implementing Regulation (EU) 2024/2690 (NIS-2 Implementing Regulation) clarifies the requirements and makes them directly auditable. It requires security measures that are not only documented, but demonstrably effective. This raises very practical questions: Who has access to which systems and data? For how long? And how can this be proven at any time? This is where NIS-2 becomes tangible, particularly in Identity & Access Management. In this webinar, we show why IAM is evolving from an operational IT task into a strategic success factor and how organizations can translate regulatory requirements into practical, day-to-day processes.

Find out more

Date

January 29, 2026

Time

10:00 a.m.

Speakers

Porträtfoto von David Capriati

David Capriati

Managing Consultant, egerer Consulting GmbH

Porträtfoto von Oliver Moebel

Oliver Moebel

Project Consultant, egerer Consulting GmbH

Webinar Agenda – Implementing NIS-2 Successfully

The webinar approaches NIS-2 from a hands-on perspective with a clear focus on Identity & Access Management:

  • What NIS-2 and the Implementing Regulation really require: A structured overview of the directive and the NIS-2 Implementing Regulation, with a focus on governance, risk management, and explicitly required technical and organizational measures.

  • Why IAM is central to NIS-2: Unique identities, need-to-know principles, logging, and continuous monitoring are no longer optional – they are mandatory.

  • Governance before technology: Which role models, processes, and responsibilities form the foundation of NIS-2-compliant IAM.

  • Automation as the key to auditability: How automated employee lifecycles, access recertifications, and centralized entitlement management reduce risk and simplify audits.

  • From regulatory intent to practical implementation: How a modern IGA solution translates NIS-2 requirements into practice and becomes a crucial step toward organization-wide compliance.

Key Takeaways

  • You will understand which IAM requirements arise directly from the NIS-2 Implementing Regulation.

  • You will see why manual access processes no longer meet regulatory expectations.

  • You will learn how governance, processes, and technology must work together.

  • You will gain insight into how IGA helps turn compliance obligations into greater transparency and security.

Who Should Attend?

  • This webinar is intended for anyone responsible for information security, IT operations, and compliance who needs to address the requirements of NIS-2, particularly the Implementing Regulation for the digital economy:

    • IT and security leaders

    • CISOs, information security officers, and compliance managers

    • IT management and leadership in mid-sized organizations

    • Those responsible for IAM, IGA, and access management processes

    • Organizations that are already subject to NIS-2 or the NIS-2 Implementing Regulation, or will be in the future

Register Now

Use this webinar to discuss your specific questions around NIS-2, Identity Management, and audit requirements directly with experienced experts. You will gain practical insights and clear guidance on the next meaningful steps for your organization.