Training on the requirements of the NIS2 Directive

Training based on the practical aspects and obligations arising from the new NIS2 Directive.

About the training

Training on the requirements of the NIS2 Directive

A one-day training course during which participants will become familiar with the key aspects of the NIS2 Directive. The course participants will gain knowledge on how to meet cybersecurity requirements. Through lectures and practical workshop exercises, they will acquire skills related to the key elements of the NIS2 Directive, including its goals, principles, and requirements concerning the protection of critical infrastructure.

The detailed scope of the training is presented below.

Training program

Day 1

9.00-16.00

  •  Welcome and Introduction to the Training
  • What is NIS2? Who does it apply to? – Purpose and Scope
  • Overview of the NIS2 Directive: Definition, objectives, and scope.
  • Reasons for its creation and its impact on cybersecurity at the organizational level.
  • Key changes and obligations introduced by NIS2.
  • A comparison of the current NIS Directive with the new NIS2 Directive and its reach.
  • Break
  • Who is affected by the new NIS2 Directive and by when must changes be implemented?
  • Key vs. important entities under NIS2.
  • Explanation of which organizations are subject to the NIS2 security requirements.
  • NIS2 from an organizational perspective: What actions need to be taken?
  • Obligations of key entities vs. important entities.
  • Discussing the most important aspects and responsibilities within the organizational context.
  • Cybersecurity risk management in the context of NIS2.
  • Overview of the risk management process, risk management measures in cybersecurity, and incident management.
  • Break
  • Security Measures for Business Continuity under NIS2
  • Obligations of entities to implement measures ensuring business continuity in the event of cybersecurity incidents, minimizing potential damage, and restoring normal system operations.
  • Overview of incident reporting requirements and procedures.
  • Impact of the NIS Directive on Other Legal Acts
  • Discussion on the influence of NIS2 on other legal regulations.
  • Proposed changes to the National Cybersecurity System Act from July 2023: Presentation of key amendments and corrections made in recent months, with practical advice on how to implement these upcoming changes.

Training price

Price per participant: 2,900 PLN (net)

Registration for the In-Person Training

Fill out this form if you wish to participate in the in-person training. If you are interested in online participation, please sign up here: Online Training Registration Form.

Submitting the application means acceptance of the terms and conditions of participation.

Training program

Day 1

9.00-16.00

 Training Program – NIS2 Directive Requirements

  • Welcome and Introduction
  • Overview of the training goals and objectives
  • Brief introduction to the NIS2 Directive and its significance
  • What is NIS2? Who does it apply to? – Purpose and Scope
  • Explanation of the NIS2 Directive
  • Target audience: Who is affected by the NIS2 directive?
  • The scope and objectives of the directive
  • The Origins of NIS2, its Impact, and its Influence on Organizational Cybersecurity
  • The reasons behind the creation of NIS2
  • The scope and objectives of the directive
  • Impact on the cybersecurity posture of organizations
  • Key changes and obligations introduced by NIS2
  • Comparative analysis with the previous NIS Directive and its scope
  • Break
  • Who is Affected by NIS2 and the Deadline for Compliance?
  • Key vs. important entities under NIS2
  • Discussion on which organizations are subject to NIS2 security requirements
  • NIS2 from an organizational perspective: What actions need to be taken?
  • Obligations for key and important entities
  • In-depth discussion on the main aspects and obligations organizations need to address
  • Cybersecurity Risk Management in the Context of NIS2
  • Managing risk in cybersecurity under NIS2 requirements
  • Detailed explanation of the risk management process
  • Risk management measures and incident management
  • Break
  • Business Continuity Security Measures in NIS2
  • Obligations regarding continuity of operations in case of cybersecurity incidents
  • Ensuring minimal damage and restoring normal system functionality
  • Requirements for incident reporting and response procedures
  • Implementation of continuity measures in the context of NIS2
  • Impact of NIS Directive on Other Legal Acts
  • How NIS2 affects and interacts with other legal regulations
  • Key updates to the National Cybersecurity System Act (Ustawa o Krajowym Systemie Cyberbezpieczeństwa)
  • Presentation of the key amendments and corrections made in the July 2023 update
  • Practical guidance on implementing the upcoming legal changes in this area

Training price

Price per participant: 1,550 PLN (net)

Registration for online training

Fill out this form if you wish to participate in the online training. If you are interested in in-person participation, please sign up here: Offline Training Registration Form.

Submitting the application means acceptance of the terms and conditions of participation.

Dedicated Training Exclusively for Your Organization- this approach ensures comfort and flexibility, allowing you to thoroughly discuss specific issues and situations within your organization. We understand that each company is unique, which is why we tailor the examples presented to align with your organization’s specific needs and business context. By customizing the training content, we ensure that the acquired knowledge is effectively applied to your organization’s environment, making it more relevant and practical for your team.

Training program

Day 1

9.00-16.00

 

  • Welcome and Introduction
  • Introduction to the training topic.
  • Goals and expectations for the session.
  • What is NIS2? Who does it apply to?
  • Objective and scope of the NIS2 Directive.
  • Reasons for the creation of NIS2 and its impact on cybersecurity levels within organizations.
  • Key changes and obligations introduced by NIS2.
  • Comparison with the existing NIS Directive and its scope.
  • Break
  • Who is Affected by the NIS2 Directive and What are the Deadlines for Compliance?
  • Key entities vs. important entities – who is affected by NIS2.
  • Overview of organizations covered by NIS2 cybersecurity requirements.
  • NIS2 from the perspective of an organization – actions that need to be taken.
  • Obligations of key entities and important entities.
  • Discussion on the most important aspects and obligations for organizations.
  • Risk Management in Cybersecurity in the Context of NIS2
  • Overview of the risk management process.
  • Tools and measures for managing cybersecurity risks under NIS2.
  • Incident management and how to address cybersecurity incidents effectively.
  • Break
  • Security Measures for Business Continuity under NIS2
  • Implementing measures to ensure business continuity in the event of cybersecurity incidents.
  • How to minimize potential damage and restore normal operations after incidents.
  • Obligations and procedures for reporting incidents and ensuring compliance.
  • The Impact of NIS2 on Other Legal Acts
  • How NIS2 influences other cybersecurity laws and regulations.
  • Proposed changes to the National Cybersecurity System Act from July 2023.
  • Practical advice on how to implement upcoming changes and updates.
  • Conclusion and Summary of the Key Learnings
  • Recap of important topics discussed during the training.
  • Open floor for questions and feedback.

 

How does it work?

Step 1

REGISTRATION

In the first step, please fill out the registration form to let us know about your interest in organizing a dedicated training session for your company.

Step 2

DATE

We will set the date and location of the training – we will adapt to your availability and individual expectations.

Step 3

PRICE

We will present you with the commercial terms for organizing the training based on the agreed parameters and number of participants.

Step 4

TRAINING

We will conduct the customized training according to the agreed terms.

Ask for a quote for an internal training session

Organizers