Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of SUSE
Congress@it-sa Lecture programme

What needs to be considered when implementing NIS-2 requirements?

Live discussion with Dr Justus Gaden, Michael Hojnacki and Knut Trepte about the current requirements of NIS-2.

calendar_today Wed, 23.10.2024, 14:30 - 15:30

event_available On site

place Room Oslo, NCC Ost

Action description

south_east

Speaker

south_east

Themes

Cloud Security Legislation, standards, regulations Governance, Riskmanagement and Compliance Trend topic

Key Facts

  • NIS-2
  • Supply Chain Security
  • Incident Reporting

Event

This action is part of the event Congress@it-sa

Action description

In the live discussion, Dr Justus Gaden, lawyer and co-editor of the specialist journal "International Cybersecurity Law Review", Michael Hojnacki, board member at ProtoSoft and Lead Auditor for Information Security, and Knut Trepte, Senior Product Manager Security at SUSE, will talk about the current status of NIS-2.
The following will be examined in detail:
-Supply Chain Security: learn how to continuously assess cyber risks in your supply chain and take appropriate security measures.
-Encryption technologies: Implement current encryption standards to ensure the security and integrity of sensitive data.
-Edge computing and IoT security: Protecting critical infrastructure and applications in edge environments and the importance of these measures for NIS-2.
-Vulnerability and risk management: End-to-end security approaches for modern application landscapes and cloud-native applications.
-Incident Reporting: Extended reporting obligations for security incidents and effective strategies for implementing these requirements.

Take the opportunity to exchange ideas directly with experts in order to be optimally prepared for the requirements of NIS-2.
... read more

Participation Limit: 55

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.