The NIS2 Navigator’s Handbook
Samenvatting
"More than 100,000 organizations throughout the European Union have to comply with the NIS2 Directive. Is your organization one of them? If so, what do you need to do to become compliant? Two questions that are easy to ask, but the answers are never as straightforward. With 46 articles, 144 provisions, and over 140 references to other documents, the NIS2 is anything but easy to read, let alone interpret.
This book provides an answer to your questions in a straightforward, easy-to-understand way. The NIS2 Navigator’s Handbook is written in plain English terms to help members of management bodies (including security and IT management) understand the Directive and its intentions. An extensive analysis of the scope specifications, with a clear Annex to support it, provides insight into the NIS2’s scope and an answer to the first question.
For the second question, the book walks you through the different requirements that organizations must comply with. A GAP assessment included in the Annexes of the book, that can be used at a high level or in depth, provides you with an understanding of your level of compliance and the steps you need to take to become compliant. The book also comes with access to an assessment tool that allows you to perform the assessment in a number of languages.
If you need to understand the impact of the NIS2 Directive on your organization, this book provides you the ultimate answer."
Trefwoorden
cybersecurity nis2 compliance management risicomanagement europees recht wetteksten wetgeving governance training gap analyse ict (informatie- en communicatietechnologie) ict bedrijfscontinuïteit organisatie toezicht strategie implementatie leiderschap sectoren incident management gap-analyse incidentmanagement naslagwerk verantwoordelijkheid kritieke infrastructuur digitale transformatie verandering europa rapportage
Trefwoorden
Specificaties
Thema classificatie
Inhoudsopgave
U kunt van deze inhoudsopgave een PDF downloaden
Endorsements
0. Purpose
1. Introduction
2. Background
3. Inside NIS2
4. Determining your state of compliance
5. Final note
Annex A Scope and entity type overview
Annex B Critical, essential and importance entities
Annex C NIS2 to ISO mappings
Annex D CISO job profile example
Annex E Cyber threat examples
Annex G GAP assessment
About the author
Index
Anderen die dit boek kochten, kochten ook
Rubrieken
- cadeauboeken
- computer en informatica
- economie
- filosofie
- flora en fauna
- geneeskunde
- geschiedenis
- gezondheid
- jeugd
- juridisch
- koken en eten
- kunst en cultuur
- literatuur en romans
- mens en maatschappij
- naslagwerken
- non-fictie informatief/professioneel
- paramedisch
- psychologie
- reizen
- religie
- schoolboeken
- spiritualiteit
- sport, hobby, lifestyle
- thrillers en spanning
- wetenschap en techniek
- woordenboeken en taal