Practical Approach to the National Cybersecurity System Act for Operators of Essential Services and Digital Service Providers.

A professionally prepared training covering key issues in the field of Cybersecurity, which will enable participants to ensure the required level of security for the provided essential/digital services.

About the training

An effective training for those who want to expand their knowledge of the practical approach to the requirements of the National Cybersecurity System Act.

The training is conducted in the form of lectures and workshops, ensuring the effective application of new knowledge and skills to practical actions. We focus not only on delivering theoretical knowledge but, above all, on providing effective, practical methods and techniques, as well as valuable experiences and best practices. The training lasts one day, and upon completion, participants will receive a certificate of attendance. During the training, key issues related to the KSC for Operators of Essential Services and Digital Service Providers will be discussed. The materials and exercises provided during the training will prepare participants to meet their responsibilities within the KSC framework.

Training program

Day 1
9:00 - 16:00

  • Welcome Participants
  • Introduction to the Practical Approach to the National Cybersecurity System (KSC) Act Requirements.
  • Main assumptions and practical requirements of the KSC Act.
  • Basic terms and definitions needed for daily operations.
  • Specific challenges and needs related to meeting the requirements of the KSC and the organization.
  • Essential Service Operators
  • The need to address the KSC requirements.
  • The biggest threats faced in daily operations.
  • How to ensure a high level of security?
  • Digital Service Providers
  • Understanding the obligations of digital service providers.
  • Essential vs. Digital Service Operators – What are the differences?
  • What should digital service providers ensure in their services?
  • Compliance Audit Challenges
  • The audit process.
  • Identifying non-compliance.
  • Scope and documentation of audits.
  • Lunch Break
  • Cybersecurity Management Processes – A Systematic Approach
  • Ensuring continuous compliance with KSC obligations.
  • Main challenges in effectively managing KSC-related activities.
  • NIS 2 Directive – What to Expect?
  • New areas covered by the NIS 2 Directive.
  • Changes NIS 2 will bring to cybersecurity within the EU internal market.
  • Difficult Questions and Discussions
  • Open Q&A session and discussion.

Training price

Price per Participant: 2,250.00 PLN (net)

Registration for the In-Person Training

Fill out this form if you would like to participate in the Open In-Person Training. If you’re interested in online participation, please sign up here: Online Training Registration Form.

It is also possible to organize a closed training tailored to your specific needs: send an inquiry and receive a quote.

Submitting the registration means you accept the terms and conditions of participation.

Training program

Day 1
9:00 - 16:00

  • Welcome to Participants
    Practical Approach to the Requirements of the National Cybersecurity System Act (KSC):
  • What are the main assumptions and requirements of the KSC Act in practice?
  • Basic terms and definitions needed for daily work.
  • Specific daily challenges and needs related to meeting organizational requirements.
  • Critical Service Operators – the need to face the requirements.
  • The greatest threats that may be encountered in daily operations.
  • How to ensure a high level of security?
  • Digital Service Providers – understanding the obligations.
  • Critical Services Operators vs Digital Service Providers – what are the differences?
  • What should a digital service provider ensure within the scope of their services?
  • Challenges of compliance audits.
  • The auditing process.
  • Identifying non-compliance.
  • Scope and documentation of the audit.
    Lunch Break
    Cybersecurity Management Processes – A Systematic Approach.
  • How to ensure continuous fulfillment of obligations under KSC?
  • What are the main challenges related to properly managing KSC-related activities?
    NIS 2 – What’s Ahead?
  • New areas in NIS 2 detection.
  • What changes will NIS 2 bring for cybersecurity in the EU internal market?
    Questions Regarding Difficult Issues.
    Questions and Discussion.

Training price

The price per participant: 1,150.00 PLN (net)

Online training registration

Fill out this form if you would like to participate in the online training. If you’re interested in in-person training, please sign up here: Offline Training Registration Form.

It is also possible to organize a closed training tailored to your specific needs: send an inquiry and receive a quote.

Submitting the registration means you accept the terms and conditions of participation.

Dedicated Exclusively for Your Organization – This approach ensures comfort and flexibility, allowing us to thoroughly discuss specific issues and situations within your organization. We understand that every company is different, and in order to effectively translate the acquired knowledge into your organization’s context, we tailor the presented examples to suit your unique needs and business situation.

Training program

Day 1
9:00 - 16:00

  • Welcome to the Participants
    Practical Approach to the Requirements of the National Cybersecurity System Act (Ustawa o KSC):
  • What are the main principles and requirements of the KSC Act in practice?
  • Key terms and definitions necessary for daily operations.
  • The specifics of daily challenges and needs related to meeting the organization’s requirements.
  • Critical Service Operators – the necessity to meet the requirements.
  • The biggest threats faced in everyday operations.
  • How to ensure a high level of security?
  • Digital Service Providers – understanding the obligations.
  • Differences between Critical Service Operators and Digital Service Providers.
  • What should a Digital Service Provider ensure within its services?
  • Challenges of compliance auditing.
  • The auditing process.
  • Identifying non-compliance.
  • Scope and documentation of the audit.
  • Lunch Break
  • Cybersecurity Management Processes – A Systemic Approach.
  • How to ensure continuous compliance with KSC requirements?
  • What are the main challenges related to conducting KSC-related activities properly?
  • NIS 2 – what to expect.
  • New areas in NIS 2 detection.
  • What changes will it introduce to cybersecurity in the EU internal market?
  • Difficult Topics Q&A
  • Questions and Discussion

How does it work?

Step 1

APPOINTMENT

In the first step, fill out the registration form to express your interest in organizing a dedicated training session for your company.

Step 2

DATE

We will set the date and location of the training – we will adapt to your availability and individual expectations.

Step 3

PRICE

We will present you with the commercial terms for organizing the training based on the agreed parameters and the number of participants.

Step 4

TRAINING

We will carry out the tailored training according to the agreed conditions.

Would you like to request a quote for an internal training session?