Webinar

NIS-2: Requirements and Implementation in Identity & Access Management (DE)

The revised EU Directives on the security of network and information systems (NIS and NIS-2) are designed to enhance cybersecurity across the EU. Aimed at increasing the IT protection of Critical Infrastructures, these Directives must be implemented by October 2024. Our webinar covers the key aspects of NIS-2, including implementation strategies, impact and risk analysis, governance, risk mitigation, and reporting. We placed particular emphasis on the required cyber hygiene in Identity and Access Management.

Find out more

Speakers

betasystems-events-webinars-michael-falk.jpg

Dr. Michael Falk

Partner, Consulting, Cyber Security at KPMG

I am a partner in the Security Consulting division of KPMG. I advise you and your company not only with my many years of experience, but above all with innovative approaches.

Cyber security, privacy and risk assessment of new technologies - this is my focus for the continuous further development of organisations, processes and people. After all, only those who know their cyber risks inside out can utilise the opportunities of digital transformation.

With comprehensive analyses and precise measures, I provide targeted advice on protection against industrial espionage, ransomware and DDoS attacks - without losing sight of the costs and benefits.

After completing my doctorate at Justus Liebig University Giessen on the topic of IT compliance in corporate governance, I am now responsible for the topics of "Cyber Security Strategy, Governance and Risk" and "Privacy Management" at KPMG and am active as a guest lecturer and speaker.

portrait_andreas_kroeber2.jpg

Andreas Kröber

Director Development & Product Strategy IAM

The Identity & Access Management division is an important pillar of Beta Systems Software AG. I am responsible for the product strategy and development of our Garancy Suite for this product group.

At our German locations in Cologne and Berlin, our teams develop software for identity management, access management, cyber hygiene, compliance management and lifecycle management to improve efficiency and ensure IT security and compliance.

I am particularly interested in the areas of secure software development, efficient processes, usability and the use of complex business software from the cloud.

After completing my studies, I gained experience in the production and support of enterprise software and the management of large teams in various industries such as healthcare and retail, which I successfully contribute to the further development of our Garancy Suite.

Understanding NIS-2

NIS-2 aims to improve the protection of network and information systems, particularly in critical sectors such as energy, transportation, banking, and healthcare. The directives mandate enhanced cybersecurity measures to increase the resilience of these infrastructures against cyber threats.

By understanding and implementing NIS-2, organizations can significantly strengthen their cybersecurity posture, reducing vulnerabilities and improving their ability to respond to cyber incidents.

Our webinar covers:

  • Implementation and Required Measures: Steps to comply with NIS-2, including technical and organizational measures

  • Impact and Risk Analysis: How to assess and analyze cyber threats

  • NIS-2 Governance: Governance framework, roles, and responsibilities

  • Risk Mitigation and Reporting: Strategies for risk mitigation and fulfilling reporting obligations

  • Cyber Hygiene in Identity and Access Management: Focus on secure authentication, authorization, and monitoring processes

This session offers IT professionals, cybersecurity specialists, and stakeholders in critical sectors practical guidance on achieving NIS-2 compliance. By watching this on-demand webinar, you will gain valuable insights and ensure your organization meets the new cybersecurity standards.

Don’t miss this opportunity to stay ahead in cybersecurity preparedness. Watch the webinar now!

Find out more

Partner

KPMG Logo
KPMG AG Wirtschaftsprüfungsgesellschaft

Images

Beta Systems Webinar on VAIT: NIS2 Requirements and Implementation in Identity Access Management

Overview

Date
January 31, 2024
Language
German
Duration
60 minutes
Online

Tags

Access ManagementIAMComplianceNISIdentity Management

Share

Further Resources

Blog Article
Schwarzes Buch mit der Aufschrift EU Regulation neben Europa-Flagge

NIS-2 Regulation: How Midsize Companies Can Efficiently Meet the Requirements

The EU’s NIS-2 Directive poses one of the most significant challenges in recent years for midsize companies in Europe. NIS-2 demands not only extensive technical and organizational measures but also a cultural shift in how companies approach cybersecurity. For organizations handling sensitive design data, customer information, or production data, compliance with NIS-2 requirements is not optional – it’s mandatory and non-compliance may result in heavy fines and personal liability for management. But how can companies implement these complex requirements in a pragmatic and cost-efficient way?
Blog Article
blogartikel_kubernetes.jpg

Workload Automation in Kubernetes: Bridging Technology for Modern Container Orchestration

How classic workload automation can integrate with modern Kubernetes environments. This article explores IBM Workload Scheduler, the Beta Systems Cloud Connector, and the roles of Ingress, Sidecars, and Git-based job definitions in enterprise IT automation for containerized infrastructures.
Blog Article
blogpost_migration-ohne-reue.jpg

Migration Without Regret: How to Future-Proof Your Automation Strategy

In today's fast-paced, data-driven IT landscape, the demands on enterprise systems are escalating rapidly. The need for agility, scalability, and integration with emerging technologies like AI, cloud infrastructure, and observability platforms is reshaping how organizations approach automation. Amid this transformation, many companies are confronting a critical question: Should we modernize our workload automation (WLA) platforms?