Webinar

NIS-2: Requirements and Implementation in Identity & Access Management (DE)

The revised EU Directives on the security of network and information systems (NIS and NIS-2) are designed to enhance cybersecurity across the EU. Aimed at increasing the IT protection of Critical Infrastructures, these Directives must be implemented by October 2024. Our webinar covers the key aspects of NIS-2, including implementation strategies, impact and risk analysis, governance, risk mitigation, and reporting. We placed particular emphasis on the required cyber hygiene in Identity and Access Management.

Find out more

Understanding NIS-2

NIS-2 aims to improve the protection of network and information systems, particularly in critical sectors such as energy, transportation, banking, and healthcare. The directives mandate enhanced cybersecurity measures to increase the resilience of these infrastructures against cyber threats.

By understanding and implementing NIS-2, organizations can significantly strengthen their cybersecurity posture, reducing vulnerabilities and improving their ability to respond to cyber incidents.

Our webinar covers:

  • Implementation and Required Measures: Steps to comply with NIS-2, including technical and organizational measures

  • Impact and Risk Analysis: How to assess and analyze cyber threats

  • NIS-2 Governance: Governance framework, roles, and responsibilities

  • Risk Mitigation and Reporting: Strategies for risk mitigation and fulfilling reporting obligations

  • Cyber Hygiene in Identity and Access Management: Focus on secure authentication, authorization, and monitoring processes

This session offers IT professionals, cybersecurity specialists, and stakeholders in critical sectors practical guidance on achieving NIS-2 compliance. By watching this on-demand webinar, you will gain valuable insights and ensure your organization meets the new cybersecurity standards.

Don’t miss this opportunity to stay ahead in cybersecurity preparedness. Watch the webinar now!

Speakers

betasystems-events-webinars-michael-falk.jpg
Dr.Michael Falk
Partner, Consulting, Cyber Security at KPMG

I am a partner in the Security Consulting division of KPMG. I advise you and your company not only with my many years of experience, but above all with innovative approaches.

Cyber security, privacy and risk assessment of new technologies - this is my focus for the continuous further development of organisations, processes and people. After all, only those who know their cyber risks inside out can utilise the opportunities of digital transformation.

With comprehensive analyses and precise measures, I provide targeted advice on protection against industrial espionage, ransomware and DDoS attacks - without losing sight of the costs and benefits.

After completing my doctorate at Justus Liebig University Giessen on the topic of IT compliance in corporate governance, I am now responsible for the topics of "Cyber Security Strategy, Governance and Risk" and "Privacy Management" at KPMG and am active as a guest lecturer and speaker.

Andreas Kröber
Director Development & Product Strategy IAM

The Identity & Access Management division is an important pillar of Beta Systems Software AG. I am responsible for the product strategy and development of our Garancy Suite for this product group.

At our German locations in Cologne and Berlin, our teams develop software for identity management, access management, cyber hygiene, compliance management and lifecycle management to improve efficiency and ensure IT security and compliance.

I am particularly interested in the areas of secure software development, efficient processes, usability and the use of complex business software from the cloud.

After completing my studies, I gained experience in the production and support of enterprise software and the management of large teams in various industries such as healthcare and retail, which I successfully contribute to the further development of our Garancy Suite.

Further Resources

Blog Article
Schwarzes Buch mit der Aufschrift EU Regulation neben Europa-Flagge

NIS-2 Regulation: How Midsize Companies Can Efficiently Meet the Requirements

The EU’s NIS-2 Directive poses one of the most significant challenges in recent years for midsize companies in Europe. NIS-2 demands not only extensive technical and organizational measures but also a cultural shift in how companies approach cybersecurity. For organizations handling sensitive design data, customer information, or production data, compliance with NIS-2 requirements is not optional – it’s mandatory and non-compliance may result in heavy fines and personal liability for management. But how can companies implement these complex requirements in a pragmatic and cost-efficient way?
Blog Article
batch-job-scheduling-blog-post.png

Batch Job Scheduling: Features, Benefits & Top Platforms in 2026

Managing thousands of IT jobs across hybrid environments is complex, and when batch processes fail, the business feels it immediately. Whether it’s a missed end-of-day report, a delayed data pipeline, or a financial close that runs hours late, batch scheduling failures are costly. Batch job scheduling is the solution to this. Keep reading to find out what it means, the key features to look for, common challenges, and the top batch scheduling platforms available in 2026.
Blog Article
5-best-devops-automation-tools-with-text.png

5 Best DevOps Automation Tools Reviewed in 2026

DevOps teams are under pressure to ship faster, reduce errors, and keep complex pipelines running across cloud, on-premises, and hybrid environments all at once. The right DevOps automation tools make that possible. The wrong ones create more fragmentation than they solve. This guide reviews the five best DevOps automation tools in 2026, covering what each does well, where each falls short, and which teams each is actually built for.