
What needs to be considered when implementing NIS-2 requirements?
Live discussion with Dr Justus Gaden, Michael Hojnacki and Knut Trepte about the current requirements of NIS-2.
Topic
Cloud SecurityLegislation, standards, regulationsGovernance, Riskmanagement and ComplianceTrend topic
When & Where
Details
Format:
Lecture
Session description
In the live discussion, Dr Justus Gaden, lawyer and co-editor of the specialist journal "International Cybersecurity Law Review", Michael Hojnacki, board member at ProtoSoft and Lead Auditor for Information Security, and Knut Trepte, Senior Product Manager Security at SUSE, will talk about the current status of NIS-2.
The following will be examined in detail:
-Supply Chain Security: learn how to continuously assess cyber risks in your supply chain and take appropriate security measures.
-Encryption technologies: Implement current encryption standards to ensure the security and integrity of sensitive data.
-Edge computing and IoT security: Protecting critical infrastructure and applications in edge environments and the importance of these measures for NIS-2.
The following will be examined in detail:
-Supply Chain Security: learn how to continuously assess cyber risks in your supply chain and take appropriate security measures.
-Encryption technologies: Implement current encryption standards to ensure the security and integrity of sensitive data.
-Edge computing and IoT security: Protecting critical infrastructure and applications in edge environments and the importance of these measures for NIS-2.