
NIS-2 and DORA: How ISMS and BCM interact in an emergency
Cyberattack – now what? How ISMS and BCM work together to ensure resilience and compliance – in practice with the GRC tool HiScout.
Tickets
Get your expo ticket now!Topic
Governance, Riskmanagement and Compliance
When & Where
Details
Format:
Management lecture
Language:
German
Session description
Cyber attacks will continue to be one of the biggest business risks worldwide in 2025 – and the trend is even on the rise in particularly sensitive industries such as financial services, technology, media, and critical infrastructure. Those affected by NIS2 and DORA must not only act quickly, but also comply with legally defined reporting deadlines – under high pressure and with clear requirements for documentation, coordination, and communication.
In this presentation, we will use a realistic scenario to show how the interaction between information security management (ISMS) and business continuity management (BCM) works in all phases of a cyber incident:
Before the incident: How prevention, risk analyses, and business impact analyses are prepared &nd ...
In this presentation, we will use a realistic scenario to show how the interaction between information security management (ISMS) and business continuity management (BCM) works in all phases of a cyber incident:
Before the incident: How prevention, risk analyses, and business impact analyses are prepared &nd ...
Organized by