The “Hellenic Association of Risk Managers” (www.harima.gr) member of FERMA (Federation European of Risk Management Associations, www.ferma.eu) & FECMA (Federation of European Credit Management Associations, www.fecma.eu), with the support of “Academics University of London Worldwide” and SEV and in collaboration with the “Risk Training Institute” of ICAP CRIF, present the “NIS2 Compliance”.
The program is designed to provide the skills needed to understand and support the NIS Directive/Regulation 2, in order to be fully compliant. It also provides the skills needed to be able to develop, implement and monitor the appropriate compliance measures and controls, for this demanding regulatory framework.
The aim of the program is to inform and train participants appropriately to be able (each in their role) to fully meet the requirements of the Regulation, through the development - implementation and monitoring of an integrated NIS2 compliance framework.
Understanding the key requirements and objectives of the Directive to enhance cybersecurity in critical sectors such as energy, transport, healthcare and digital infrastructure.
Training on strategies and measures required to protect information systems and manage risks arising from cyber threats.
Understanding of the risk analysis tactics and methodologies, identification of potential weaknesses in systems and applications.
Incident management includes detection, response, and recovery from cyberattacks. Organizations must have plans in place to respond promptly to incidents to minimize service disruption and limit damage.
Maintaining business continuity requires backup, developing disaster recovery strategies and establishing crisis management procedures.
Supply chain security is critical to protecting information systems from threats emanating from third-party vendors. Organizations must carefully evaluate and select their partners, ensuring that they also follow high security standards.
Security in the acquisition, development and maintenance of systems is essential to protect against vulnerabilities and threats. Organizations must incorporate protective measures throughout the lifecycle of their systems and handle vulnerabilities responsibly.
The use of encryption is necessary to protect data from unauthorized access. Organizations must develop policies for the appropriate use of encryption technologies, ensuring that their data remains secure.
Human resource security includes implementing access control policies and managing business assets.
Organizations must implement measures to ensure the secure exchange of information, particularly in emergencies.
Information on the responsibilities of the members of the management in case of non-compliance with the Directive and the consequences that may arise1.
Understanding supply chain security requirements and supplier risk management1.
Training in advanced skills such as threat detection and response, vulnerability management and incident response.
Plan for continuous updating and development of employees’ skills on cybersecurity issues
Hours Live Online