Webinar

NIS-2: Requirements and Implementation in Identity & Access Management (DE)

The revised EU directives on the security of network and information systems (NIS-2) are designed to enhance cybersecurity across the EU. Aimed at increasing the IT protection of critical infrastructures, these directives must be implemented by mid-October 2024. Our recent webinar covered the key aspects of NIS-2, including implementation strategies, impact and risk analysis, governance, risk mitigation, and reporting. We placed particular emphasis on the required cyber hygiene in identity and access management.

Find out more

Speakers

betasystems-events-webinars-michael-falk.jpg

Dr. Michael Falk

Partner, Consulting, Cyber Security at KPMG

I am a partner in the Security Consulting division of KPMG. I advise you and your company not only with my many years of experience, but above all with innovative approaches.

Cyber security, privacy and risk assessment of new technologies - this is my focus for the continuous further development of organisations, processes and people. After all, only those who know their cyber risks inside out can utilise the opportunities of digital transformation.

With comprehensive analyses and precise measures, I provide targeted advice on protection against industrial espionage, ransomware and DDoS attacks - without losing sight of the costs and benefits.

After completing my doctorate at Justus Liebig University Giessen on the topic of IT compliance in corporate governance, I am now responsible for the topics of "Cyber Security Strategy, Governance and Risk" and "Privacy Management" at KPMG and am active as a guest lecturer and speaker.

portrait_andreas_kroeber2.jpg

Andreas Kröber

Director Development & Product Strategy IAM

The Identity & Access Management division is an important pillar of Beta Systems Software AG. I am responsible for the product strategy and development of our Garancy Suite for this product group.

At our German locations in Cologne and Berlin, our teams develop software for identity management, access management, cyber hygiene, compliance management and lifecycle management to improve efficiency and ensure IT security and compliance.

I am particularly interested in the areas of secure software development, efficient processes, usability and the use of complex business software from the cloud.

After completing my studies, I gained experience in the production and support of enterprise software and the management of large teams in various industries such as healthcare and retail, which I successfully contribute to the further development of our Garancy Suite.

Understanding NIS-2

NIS-2 aims to improve the protection of network and information systems, particularly in critical sectors such as energy, transportation, banking, and healthcare. The directives mandate enhanced cybersecurity measures to increase the resilience of these infrastructures against cyber threats.

By understanding and implementing NIS-2, organizations can significantly strengthen their cybersecurity posture, reducing vulnerabilities and improving their ability to respond to cyber incidents.

Our webinar covers:

  • Implementation and Required Measures: Steps to comply with NIS-2, including technical and organizational measures.

  • Impact and Risk Analysis: How to assess and analyze cyber threats.

  • NIS-2 Governance: Governance framework, roles, and responsibilities.

  • Risk Mitigation and Reporting: Strategies for risk mitigation and fulfilling reporting obligations.

  • Cyber Hygiene in Identity and Access Management: Focus on secure authentication, authorization, and monitoring processes.

This session offers IT professionals, cybersecurity specialists, and stakeholders in critical sectors practical guidance on achieving NIS-2 compliance. By watching this on-demand webinar, you will gain valuable insights and ensure your organization meets the new cybersecurity standards. Don't miss this opportunity to stay ahead in cybersecurity preparedness. Watch the webinar now!

Find out more

Partner

KPMG Logo
KPMG AG Wirtschaftsprüfungsgesellschaft

Images

Beta Systems Webinar on VAIT: NIS2 Requirements and Implementation in Identity Access Management

Overview

Date
January 31, 2024
Language
German
Duration
60 minutes
Online

Tags

Identity ManagementComplianceNISIAMAccess Management

Share

Further Resources

Blog Article
Aerial view of cargo ship and container harbor

IT Security in Logistics: Why IAM Is Important for Logistics Companies

In a world where global supply chains form the backbone of our economy, the logistics industry is facing enormous opportunities, but also challenges. Efficient and timely delivery of goods is now more important than ever, but increasing digitalization also comes with greater risks and requirements. While digital innovations boost efficiency, they also make the industry more vulnerable to cyber threats and associated data loss. In this context, Identity and Access Management (IAM) is becoming an indispensable tool to protect logistics companies and maximize their efficiency. This article explains why IAM is so essential for the logistics industry and how it can help overcome the many challenges it faces.
Webinar
Beta Systems Webinar on protection against cyberattacks IAM for public authorities

Protection Against Cyberattacks – Why IAM Is Essential for Public Authorities (DE)

The core requirement for information security in public authorities is the establishment of task-related access rights according to the need-to-know principle. In this webinar, we will show how this principle can be implemented and what needs to be taken into account.
Blog Article
soap-blog.jpg

What Is SOAP?

Unlocking the Potential of Service Orchestration and Automation Platforms