MANAGING NIS2: BRIDGING THE CYBERSECURITY GAP TO COMPLIANCE.
Certified NIS2 (CNIS2)
The NIS2 standards
The Van Haren Group, is the publisher and professional certification provider for CNIS2. We facilitate cooperation and individuals in their learning and application of NIS2 professionals.
Take the next step with NIS2
Find one of the main NIS2 products here
Article 20 requires to be trained in cybersecurity decision-making, including those executing the program and those liable for the organization’s compliance
Related standards
Overview NIS2
Management bodies must be trained to understand cybersecurity risks and be able to make decisions to keep risks acceptable and in compliance with Directive 2022/2555. This training brings the understanding of information security risks and provides indispensable support for assessing the compliance status through the included GAP assessment.
Target Audience
This training is for management bodies that article 20 requires to be trained in cybersecurity decision-making, including those executing the program and those liable for the organization’s compliance.
Training Objectives
The training will provide an understanding of the purpose and intent of the Directive from the perspective of the European Union. Attendees will gain an understanding of the content of the particularly the provisions relevant to the entities that fall under the scope of Directive 2022/2555. The learning outcomes include an understanding of the compliance state of their own organization and the requirements to become compliant.
NIS2 Course content:
Day 1: Basics
EU programs background
outline
Security concepts
Public bodies and institutes
Obligations
Supervision and enforcement
Roles and responsibilitiesDay 2: Gap assessment
GAP assessment explanation
Cybersecurity program
Cybersecurity training
Risk management
Policies
Resilience planning
Organizational controls
Technical controls
Prerequisites
This training does not require any technical knowledge. Basic business acumen and a user’s understanding of the digital world provide sufficient knowledge to successfully follow the course.
Recommended Follow-Up Trainings
Attendees interested in more detailed implementation guidance can follow a number of managerial or technical security trainings on topics such as general information security management and governance, risk management, cloud security, secure development, and threat intelligence.
Related Products
The training contains a courseware manual and is associated with a book published under the title: “Managing NIS2: Bridging the cybersecurity GAP to compliance”. Day 2: Gap assessment
• GAP assessment explanation
• Cybersecurity program
• Cybersecurity training
• Risk management
• Policies
• Resilience planning
• Organizational controls
• Technical controls