
IAM in the spotlight: Mastering the challenges of NIS2, DORA and eIDAS2
IAM in the context of NIS2, DORA, eIDAS2: Security for digital identities, regulatory requirements, and best practices.
Topic
Cloud SecurityLegislation, standards, regulationsGovernance, Riskmanagement and ComplianceIdentity and access management
When & Where
Details
Format:
Technology lecture
Session description
This presentation focuses on Identity Access Management (IAM) and its relevance concerning the European regulatory frameworks NIS2, DORA, and eIDAS2. IAM encompasses the management of user identities and access rights, user verification and authorization, and monitoring of access attempts.
NIS2 (Network and Information Security Directive 2) aims to enhance cybersecurity in the EU by requiring organizations to implement robust, risk-based IAM systems and report security incidents. DORA (Digital Operational Resilience Act) focuses on digital operational resilience in the financial sector, setting requirements for robustness and risk management of IAM systems. eIDAS2 (Electronic Identification, Authentication, and Trust Services Regulation 2) improves the interoperability and s ...
NIS2 (Network and Information Security Directive 2) aims to enhance cybersecurity in the EU by requiring organizations to implement robust, risk-based IAM systems and report security incidents. DORA (Digital Operational Resilience Act) focuses on digital operational resilience in the financial sector, setting requirements for robustness and risk management of IAM systems. eIDAS2 (Electronic Identification, Authentication, and Trust Services Regulation 2) improves the interoperability and s ...
Moderator
