Ο “Hellenic Association of Risk Managers” (www.harima.gr), μέλος της FERMA (Federation European of Risk Management Associations, www.ferma.eu) & της FECMA (Federation of European Credit Management Associations, www.fecma.eu), με την υποστήριξη του “Academics University of London Worldwide”, του ΣΕΒ και σε συνεργασία με το “Risk Training Institute” της ICAP CRIF, παρουσιάζουν το “NIS2 Compliance”.
Το πρόγραμμα έχει σχεδιαστεί για να παρέχει τις δεξιότητες που χρειάζονται για την κατανόηση και την υποστήριξη της συμμόρφωσης με την οδηγία / κανονισμό NIS 2. Παρέχει επίσης τις δεξιότητες που χρειάζονται για να μπορέσετε να αναπτύξετε, εφαρμόσετε και παρακολουθήσετε τα κατάλληλα μέτρα και ελέγχους συμμόρφωσης με το απαιτητικό αυτ’ο ρυθμιστικό / κανονιστικό πλαίσιο.
Ο στόχος του προγράμματος είναι να ενημερώσει και εκπαιδεύσει κατάλληλα τους συμμετέχοντες ώστε να είναι σε θέση (έκαστος στο ρόλο του) να ανταπεξέλθει πλήρως στις απαιτήσεις του Κανονισμού μέσω ανάπτυξης, εφαρμογής και παρακολούθησης ενός ολοκληρωμένου πλαισίου κανονιστικής συμμόρφωσης NIS2.
Understanding the key requirements and objectives of the Directive to enhance cybersecurity in critical sectors such as energy, transport, healthcare and digital infrastructure.
Training on strategies and measures required to protect information systems and manage risks arising from cyber threats.
Understanding of the risk analysis tactics and methodologies, identification of potential weaknesses in systems and applications.
Incident management includes detection, response, and recovery from cyberattacks. Organizations must have plans in place to respond promptly to incidents to minimize service disruption and limit damage.
Maintaining business continuity requires backup, developing disaster recovery strategies and establishing crisis management procedures.
Supply chain security is critical to protecting information systems from threats emanating from third-party vendors. Organizations must carefully evaluate and select their partners, ensuring that they also follow high security standards.
Security in the acquisition, development and maintenance of systems is essential to protect against vulnerabilities and threats. Organizations must incorporate protective measures throughout the lifecycle of their systems and handle vulnerabilities responsibly.
The use of encryption is necessary to protect data from unauthorized access. Organizations must develop policies for the appropriate use of encryption technologies, ensuring that their data remains secure.
Human resource security includes implementing access control policies and managing business assets.
Organizations must implement measures to ensure the secure exchange of information, particularly in emergencies.
Information on the responsibilities of the members of the management in case of non-compliance with the Directive and the consequences that may arise1.
Understanding supply chain security requirements and supplier risk management1.
Training in advanced skills such as threat detection and response, vulnerability management and incident response.
Plan for continuous updating and development of employees’ skills on cybersecurity issues
Hours Live Online