NIS2 training for boards of directors

NIS2 training for boards of directors

Training based on practical aspects and obligations arising from the new NIS2 Directive.

About the training

Training on the NIS2 Directive Requirements

A one-day training designed to comprehensively introduce participants to the issues related to the NIS2 Directive, aimed at improving the security of network and information systems within the European Union. Participants will familiarize themselves with the key requirements of the directive and its impact on organizational operations. Through lectures and practical workshop exercises, they will acquire the knowledge necessary to meet cybersecurity requirements, including those concerning obligations for critical sector enterprises and digital service providers, as well as the requirement to obtain a certificate confirming compliance with the directive.

The detailed scope of the training is presented below.

Training program

Day 1

9.00-13.00

  • Welcome to the participants
  • Introduction to the NIS2 Directive
  • What is the NIS2 Directive?
  • History, evolution, and objectives of the NIS Directive.
  • Reasons for introducing NIS2 and key differences compared to NIS 1.
  • Sectors covered by the directive and qualification criteria.
  • Scope of application – critical and important sectors.
  • The importance of the NIS2 Directive for the company
  • Consequences for organizations in case of non-compliance with the regulations.
  • New obligations for company boards.
  • Key NIS2 Requirements
  • Board obligations:
  • Responsibility of the board for managing cybersecurity risks.
  • Requirements for incident reporting and ensuring appropriate security measures.
  • Incident reporting
  • Criteria and deadlines for reporting incidents
  • Procedures and board responsibility for reporting
  • The Board’s role in ensuring compliance with the NIS2 Directive
  • Strategic approach to cybersecurity:
  • How the board can influence the cybersecurity culture within the organization.
  • Integrating cybersecurity into the overall business strategy.
  • Board responsibility
  • Board roles and obligations under NIS2
  • Legal and financial consequences of non-compliance
  • Monitoring compliance and accountability:
  • Methods for monitoring compliance with NIS2.
  • Board responsibility for implementing and maintaining compliance.
  • Practical aspects of implementing NIS2
  • Planning and implementation schedule
  • Steps to successfully implement NIS2 in the company
  • The board’s role in the implementation process
  • Analysis of real cybersecurity breach cases:
  • Discussion of known incidents and their impact on organizations.
  • Analysis of board responses and lessons learned.
  • Examples of breaches and their consequences
  • Case studies from real-life incidents
  • Discussion of real breach cases and their legal and financial impacts.
  • Analysis of consequences for the board and the company
  • Discussion on potential consequences for the board and the company in case of breaches.

Training price

Price per participant: 2,900 PLN (net)

Registration for in-person training

Fill out this form if you wish to participate in in-person training. If you are interested in attending online, please register here: Online Training Registration Form.

Submitting the registration means acceptance of the terms and conditions of participation.

Training program

Day 1

9.00-13.00

  • Training Program
  • Welcome of Participants
  • Introduction to the NIS2 Directive
  • What is the NIS2 Directive?
  • History, evolution, and objectives of the NIS Directive.
  • Reasons for introducing NIS2 and key differences compared to NIS 1.
  • Sectors covered by the directive and qualification criteria.
  • Scope of application – critical and important sectors.
  • Importance of the NIS2 Directive for the Company
  • Consequences for organizations in case of non-compliance with the regulations.
  • New obligations for company boards.
  • Key NIS2 Requirements
  • Board Obligations:
  • Responsibility of the board for managing cybersecurity risks.
  • Requirements for incident reporting and ensuring appropriate security measures.
  • Incident Reporting
  • Criteria and deadlines for reporting incidents.
  • Procedures and board responsibility for reporting.
  • The Board’s Role in Ensuring Compliance with the NIS2 Directive
  • Strategic approach to cybersecurity:
  • How the board can influence the cybersecurity culture within the organization.
  • Integrating cybersecurity into the overall business strategy.
  • Board responsibility:
  • Roles and obligations of the board under NIS2.
  • Legal and financial consequences of non-compliance.
  • Monitoring Compliance and Accountability:
  • Methods for monitoring compliance with NIS2.
  • Board responsibility for implementing and maintaining compliance.
  • Practical Aspects of Implementing NIS2
  • Planning and implementation schedule.
  • Steps to successfully implement NIS2 in the company.
  • The board’s role in the implementation process.
  • Analysis of Real Cybersecurity Breach Cases:
  • Discussion of known incidents and their impact on organizations.
  • Analysis of board responses and lessons learned.
  • Examples of breaches and their consequences.
  • Case studies from real-life incidents.
  • Discussion of real breach cases and their legal and financial impacts.
  • Analysis of consequences for the board and the company.
  • Discussion on potential consequences for the board and the company in case of breaches.

Training price

Price per participant: 1,550 PLN (net)

Registration for the online training

Please fill out this form if you wish to participate in the online training. If you are interested in attending the in-person training, please sign up here: Registration Form for Offline Training.

Submitting the registration form means acceptance of the terms and conditions of participation.

Dedicated exclusively for your organization – this approach ensures comfort and flexibility, allowing us to thoroughly discuss specific issues and situations relevant to your organization. We understand that every business is unique, so to effectively translate the acquired knowledge into your organization’s context, we adapt the presented examples to your specific needs and business situation.

Training program

Day 1

9.00-13.00

  • Welcome of participants
  • Introduction to the NIS2 Directive
  • What is the NIS2 Directive?
  • History, evolution, and objectives of the NIS Directive.
  • Reasons for the introduction of NIS2 and key differences from NIS 1.
  • Sectors covered by the directive and qualification criteria.
  • Scope of application – critical and important sectors.
  • Importance of the NIS2 Directive for the Company
  • Consequences for the organization in case of non-compliance with the regulations.
  • New obligations for company management boards.
  • Key NIS2 Requirements
  • Management board duties:
  • Responsibility of the management board for managing cybersecurity risks.
  • Requirements regarding incident reporting and ensuring adequate security measures.
  • Incident reporting
  • Criteria and deadlines for incident reporting
  • Procedures and management board’s responsibility for reporting
  • Role of the Management Board in ensuring compliance with the NIS2 Directive
  • Strategic approach to cybersecurity:
  • How the management board can influence the cybersecurity culture in the organization.
  • Integration of cybersecurity with the overall business strategy.
  • Responsibility of the management board
  • Roles and duties of the management board arising from NIS2
  • Legal and financial consequences of failing to meet obligations
  • Monitoring compliance and responsibility:
  • Methods of monitoring compliance with NIS2.
  • Responsibility of the management board for implementing and maintaining compliance.
  • Practical aspects of implementing NIS2
  • Planning and implementation schedule
  • Steps for effective implementation of NIS2 in the company
  • Role of the management board in the implementation process
  • Analysis of real cybersecurity breach cases:
  • Discussion of known incidents and their impact on organizations.
  • Analysis of management board reactions and conclusions drawn.
  • Examples of breaches and their consequences
  • Case studies from real life
  • Discussion of real-life breach cases and their legal and financial consequences.
  • Analysis of the impact on the management board and the company
  • Discussion of potential consequences for the management board and the company in the case of breaches.

How does it work?

Step 1

APPLICATION

In the first step, please fill out the registration form to express your interest in organizing a dedicated training session for your company.

Step 2

DATE

We will set the date and location for the training – we will adapt to your availability and individual expectations.

Step 3

PRICE

We will present the commercial terms for organizing the training based on the agreed parameters and number of participants.

Step 4

TRAINING

We will conduct the tailored training according to the agreed terms.

Ask for a quote for an internal training

Organizers