In this advanced session, we will explore how to implement the NIS Directive successfully. We will analyse the Cyber Assessment Framework to better understand which appropriate and proportionate organisational and technical security measures can lead to achieve compliance.
In this 4-day training, participants will learn the requirements of the NIS Directive and better understand how to approach the Cyber Assessment Framework and its objectives. For each objective and contributing outcome of the CAF, we present the topic, why it is important, and how it relates with other objectives. We also focus on the Indicator of Good Practices tables (IGP tables) and discuss how to reach the levels "partially achieved" and/or "achieved".
- Understand the requirements of the NIS Directive
- Discover the Cyber Assessment Framework
- Know how to use CAF profiles
- Understand the Security Objectives of the CAF
- Know how the CAF outcomes interact with each other
- Analyse the requirements behind Indicators of Good Practices (IGP) and the IGP tables
- Be able to understand your security posture in regards with the CAF
- Be able to implement appropriate and proportionate security measures
- Be able to complete a self-assessment "not achieved" / "partially achieved" / "achieved"
- Better prepare to a NIS Directive assessment.
- Introduction to the NIS Directive and explain why it exists
- The obligations of the NIS Regulations (UK implementation)
- Introduction to the Cyber Assessment Framework
- Objective A of the CAF: Managing Security Risk
- Objective B of the CAF: Protecting against Cyber Attacks
- Objective C of the CAF: Detecting Cyber Security Events
- Objective D of the CAF: Minimising the Impact of Cyber Security Incidents
To receive a quote or to register, please contact us.