CBP BIO

Managing NIS2: Bridging the cybersecurity GAP to compliance.

NIS2 (CNIS2)

The BIO standards

The Van Haren Group, is the publisher and professional certification provider for CNIS2. We facilitate cooperation and individuals in their learning and application of CNIS2 professionals.

Take the next step with NIS2

Certified NIS2 Professional Courseware (Expected soon)

Excl. Tax: € 102,35

Managing NIS2 - briding the cyber security GAP (Expected soon)

Excl. Tax: € 49.55

Certified NIS2 Professional exam (Expected soon)

Excl. Tax: € 250,00

Article 20 requires to be trained in cybersecurity decision-making, including those executing the program and those liable for the organization’s compliance

Related standards to NIS2

Stay informed!

Subscribe to our monthly (subject-related) newsletter and benefit from e-books, HQ content, discounts, and more!

 

Managing NIS2: Bridging the cybersecurity GAP to compliance.

 

Overview NIS2

Management bodies must be trained to understand cybersecurity risks and be able to make decisions to keep risks acceptable and in compliance with Directive 2022/2555. This training brings the understanding of information security risks and provides indispensable support for assessing the compliance status through the included GAP assessment.

 

Target Audience

This training is for management bodies that article 20 requires to be trained in cybersecurity decision-making, including those executing the program and those liable for the organization’s compliance.

 

Training Objectives

The training will provide an understanding of the purpose and intent of the Directive from the perspective of the European Union. Attendees will gain an understanding of the content of the particularly the provisions relevant to the entities that fall under the scope of Directive 2022/2555. The learning outcomes include an understanding of the compliance state of their own organization and the requirements to become compliant.

 

NIS2 Course content:

Day 1: Basics

  • EU programs background
  • outline
  • Security concepts
  • Public bodies and institutes
  • Obligations
  • Supervision and enforcement
  • Roles and responsibilitiesDay 2: Gap assessment
  • GAP assessment explanation
  • Cybersecurity program
  • Cybersecurity training
  • Risk management
  • Policies
  • Resilience planning
  • Organizational controls
  • Technical controls

Prerequisites

This training does not require any technical knowledge. Basic business acumen and a user’s understanding of the digital world provide sufficient knowledge to successfully follow the course.

 

Recommended Follow-Up Trainings

Attendees interested in more detailed implementation guidance can follow a number of managerial or  technical security trainings on topics such as general information security management and governance, risk management, cloud security, secure development, and threat intelligence.

Related Products

The training contains a courseware manual and is associated with a book published under the title: “Managing NIS2: Bridging the cybersecurity GAP to compliance”. Day 2: Gap assessment

•           GAP assessment explanation

•           Cybersecurity program

•           Cybersecurity training

•           Risk management

•           Policies

•           Resilience planning

•           Organizational controls

•           Technical controls