Webinar

NIS-2: Requirements and Implementation in Identity & Access Management (DE)

The revised EU directives on the security of network and information systems (NIS-2) are designed to enhance cybersecurity across the EU. Aimed at increasing the IT protection of critical infrastructures, these directives must be implemented by mid-October 2024. Our recent webinar covered the key aspects of NIS-2, including implementation strategies, impact and risk analysis, governance, risk mitigation, and reporting. We placed particular emphasis on the required cyber hygiene in identity and access management.

Find out more

Speakers

Dr. Michael Falk

Partner, Consulting, Cyber Security at KPMG

I am a partner in the Security Consulting division of KPMG. I advise you and your company not only with my many years of experience, but above all with innovative approaches.

Cyber security, privacy and risk assessment of new technologies - this is my focus for the continuous further development of organisations, processes and people. After all, only those who know their cyber risks inside out can utilise the opportunities of digital transformation.

With comprehensive analyses and precise measures, I provide targeted advice on protection against industrial espionage, ransomware and DDoS attacks - without losing sight of the costs and benefits.

After completing my doctorate at Justus Liebig University Giessen on the topic of IT compliance in corporate governance, I am now responsible for the topics of "Cyber Security Strategy, Governance and Risk" and "Privacy Management" at KPMG and am active as a guest lecturer and speaker.

Andreas Kröber

Director Development & Product Strategy IAM

The Identity & Access Management division is an important pillar of Beta Systems Software AG. I am responsible for the product strategy and development of our Garancy Suite for this product group.

At our German locations in Cologne and Berlin, our teams develop software for identity management, access management, cyber hygiene, compliance management and lifecycle management to improve efficiency and ensure IT security and compliance.

I am particularly interested in the areas of secure software development, efficient processes, usability and the use of complex business software from the cloud.

After completing my studies, I gained experience in the production and support of enterprise software and the management of large teams in various industries such as healthcare and retail, which I successfully contribute to the further development of our Garancy Suite.

Understanding NIS-2

NIS-2 aims to improve the protection of network and information systems, particularly in critical sectors such as energy, transportation, banking, and healthcare. The directives mandate enhanced cybersecurity measures to increase the resilience of these infrastructures against cyber threats.

By understanding and implementing NIS-2, organizations can significantly strengthen their cybersecurity posture, reducing vulnerabilities and improving their ability to respond to cyber incidents.

Our webinar covers:

  • Implementation and Required Measures: Steps to comply with NIS-2, including technical and organizational measures.

  • Impact and Risk Analysis: How to assess and analyze cyber threats.

  • NIS-2 Governance: Governance framework, roles, and responsibilities.

  • Risk Mitigation and Reporting: Strategies for risk mitigation and fulfilling reporting obligations.

  • Cyber Hygiene in Identity and Access Management: Focus on secure authentication, authorization, and monitoring processes.

This session offers IT professionals, cybersecurity specialists, and stakeholders in critical sectors practical guidance on achieving NIS-2 compliance. By watching this on-demand webinar, you will gain valuable insights and ensure your organization meets the new cybersecurity standards. Don't miss this opportunity to stay ahead in cybersecurity preparedness. Watch the webinar now!

Find out more

Partner

KPMG AG Wirtschaftsprüfungsgesellschaft

Images

Overview

Date
January 31, 2024
Language
German
Duration
60 minutes
Online

Contact us

Beta Systems Software AG
Alt-Moabit 90d
10559 Berlin
Germany

Share

Further Resources

Insight

IT Security in Logistics: Why IAM Is Important for Logistics Companies

In a world where global supply chains form the backbone of our economy, the logistics industry is facing enormous opportunities, but also challenges. Efficient and timely delivery of goods is now more important than ever, but increasing digitalization also comes with greater risks and requirements. While digital innovations boost efficiency, they also make the industry more vulnerable to cyber threats and associated data loss. In this context, Identity and Access Management (IAM) is becoming an indispensable tool to protect logistics companies and maximize their efficiency. This article explains why IAM is so essential for the logistics industry and how it can help overcome the many challenges it faces.
Webinar

Protection Against Cyberattacks – Why IAM Is Essential for Public Authorities (DE)

The core requirement for information security in public authorities is the establishment of task-related access rights according to the need-to-know principle. In this webinar, we will show how this principle can be implemented and what needs to be taken into account.
Whitepaper

IAM Implementation Methodology

In our whitepaper, “Methodology of an IAM Introduction,” you will discover how to successfully implement Identity & Access Management (IAM) to enhance the efficiency and security of your IT infrastructure. Given the complexity and challenges of IAM projects, thorough planning and a systematic approach are essential. Our free whitepaper offers a comprehensive guide to navigating these intricacies and achieving successful IAM implementation.