Webinar

Practical NIS-2 Requirements for Critical Infrastructure Operators in Public Services

The NIS-2 Directive significantly tightens cybersecurity requirements for operators of critical infrastructure and essential public services across the EU ‒ including energy, water supply, and municipal utilities. But what does this mean in practice for organizations affected today? This on-demand webinar shows you exactly how to interpret and implement NIS-2 requirements effectively.

Find out more

Watch now

In just 45 minutes, our experts walk you through the key regulatory obligations from risk management and incident response to supply chain security and reporting with practical, implementable guidance designed for real-world application.

What You’ll Learn

After watching this webinar, you will understand:

  • Which organizations fall under NIS-2 and what obligations they must meet

  • Technical and organizational measures required by the directive

  • How to adapt incident response and business continuity processes to comply

  • Effective strategies for managing supply chain risks and reporting

  • Available support options to help implementation succeed

Get instant access to the On-Demand webinar and start aligning your NIS-2 strategy with best practices today.

Watch now

Speakers

Marco Havekost Portrait
Marco Havekost
Manager, Sopra Steria

Marco Havekost works as a manager and joined the Sopra Steria team in 2018. His consulting expertise lies in IT governance, IT compliance, risk management, and the implementation of regulatory requirements in line with the DORA Regulation. He supports organizations in particular with gap analyses, the derivation of measures, and the development of strategic IT target visions. Other areas of focus include requirements management and project management.

Xhemi Malosmani Portrait
Xhemi Malosmani
Associate Consultant, Sopra Steria

Xhemi Malosmani is Associate Consultant at Sopra Steria and joined the team in 2024. Her consulting focus is on the Digital Operational Resilience Act (DORA) and NIS-2. She supports organizations in particular with topics such as risk management, incident management, and incident recovery. She also specializes in SfO analysis, BCM, and testing digital operational resilience.

Further Resources

Blog Article
5-best-devops-automation-tools-with-text.png

5 Best DevOps Automation Tools Reviewed in 2026

DevOps teams are under pressure to ship faster, reduce errors, and keep complex pipelines running across cloud, on-premises, and hybrid environments all at once. The right DevOps automation tools make that possible. The wrong ones create more fragmentation than they solve. This guide reviews the five best DevOps automation tools in 2026, covering what each does well, where each falls short, and which teams each is actually built for.
Blog Article
Mainframe

Top 6 Reasons Your Competitors Are Replacing Their Legacy Systems

This article explores why enterprises are moving away from legacy mainframe systems toward modern solutions such as those offered by Beta Systems. As rising costs, vendor lock-in, and increasing demands from AI-driven, compliance-focused environments put pressure on traditional IT infrastructures, organizations are seeking more agile, transparent, and cost-efficient alternatives. In this article, we discuss the top six reasons that are driving your competitors to these alternative solutions and how you can do the same without disrupting your workflows.
Webinar
webinar-on-demand-operlog-tools-innovations.jpg

Operlog Tools – Innovations in the First Quarter of 2026

Discover the latest innovations of Operlog Tools – available anytime, on demand. This webinar provides a concise overview of recent enhancements and shows how to take your z/OS log analysis to the next level.