NIS-2: Requirements and Implementation in Identity & Access Management (DE)
The revised EU directives on the security of network and information systems (NIS-2) are designed to enhance cybersecurity across the EU. Aimed at increasing the IT protection of critical infrastructures, these directives must be implemented by mid-October 2024. Our recent webinar covered the key aspects of NIS-2, including implementation strategies, impact and risk analysis, governance, risk mitigation, and reporting. We placed particular emphasis on the required cyber hygiene in identity and access management.
Find out more
Speakers
Dr. Michael Falk
Partner, Consulting, Cyber Security at KPMG
I am a partner in the Security Consulting division of KPMG. I advise you and your company not only with my many years of experience, but above all with innovative approaches.
Cyber security, privacy and risk assessment of new technologies - this is my focus for the continuous further development of organisations, processes and people. After all, only those who know their cyber risks inside out can utilise the opportunities of digital transformation.
With comprehensive analyses and precise measures, I provide targeted advice on protection against industrial espionage, ransomware and DDoS attacks - without losing sight of the costs and benefits.
After completing my doctorate at Justus Liebig University Giessen on the topic of IT compliance in corporate governance, I am now responsible for the topics of "Cyber Security Strategy, Governance and Risk" and "Privacy Management" at KPMG and am active as a guest lecturer and speaker.
Andreas Kröber
Director Development & Product Strategy IAM
The Identity & Access Management division is an important pillar of Beta Systems Software AG. I am responsible for the product strategy and development of our Garancy Suite for this product group.
At our German locations in Cologne and Berlin, our teams develop software for identity management, access management, cyber hygiene, compliance management and lifecycle management to improve efficiency and ensure IT security and compliance.
I am particularly interested in the areas of secure software development, efficient processes, usability and the use of complex business software from the cloud.
After completing my studies, I gained experience in the production and support of enterprise software and the management of large teams in various industries such as healthcare and retail, which I successfully contribute to the further development of our Garancy Suite.
Understanding NIS-2
NIS-2 aims to improve the protection of network and information systems, particularly in critical sectors such as energy, transportation, banking, and healthcare. The directives mandate enhanced cybersecurity measures to increase the resilience of these infrastructures against cyber threats.
By understanding and implementing NIS-2, organizations can significantly strengthen their cybersecurity posture, reducing vulnerabilities and improving their ability to respond to cyber incidents.
Our webinar covers:
Implementation and Required Measures: Steps to comply with NIS-2, including technical and organizational measures.
Impact and Risk Analysis: How to assess and analyze cyber threats.
NIS-2 Governance: Governance framework, roles, and responsibilities.
Risk Mitigation and Reporting: Strategies for risk mitigation and fulfilling reporting obligations.
Cyber Hygiene in Identity and Access Management: Focus on secure authentication, authorization, and monitoring processes.
This session offers IT professionals, cybersecurity specialists, and stakeholders in critical sectors practical guidance on achieving NIS-2 compliance. By watching this on-demand webinar, you will gain valuable insights and ensure your organization meets the new cybersecurity standards. Don't miss this opportunity to stay ahead in cybersecurity preparedness. Watch the webinar now!