Board Education on Cybersecurity
As required by NIS2 Directive and country laws
Board Education on Cybersecurity as required by NIS2 Directive and country laws
Bring leadership to executives on cybersecurity decision making. Catch-up with essentials and embark with those who have the know-how.
Short education series for Board and executives with four sessions of two hours.
Get a completion certificate and remain aligned with NIS2 Article 20.
Available for in-house sessions in organizations or as open sessions.
NIS 2 - Article 20 – Governance
1. Member States shall ensure that the management bodies of essential and important entities approve the cybersecurity risk-management measures taken by those entities to comply with Article 21...
2. Member States shall ensure that the members of the management bodies of essential and important entities are required to follow training, and shall encourage essential and important entities to offer similar training...
DORA Article 5 - Governance and Organisation
1. Financial entities shall have in place an internal governance and control framework that ensures an effective and prudent management of ICT risk, in accordance with Article 6, in order to achieve a high level of digital operational resilience.
2. The management body of the financial entity shall define, approve, oversee and be responsible for the implementation of all arrangements related to the ICT risk management framework referred to in Article 6.
3. Financial entities, other than microenterprises, shall establish a role in order to monitor the arrangements concluded with ICT third-party service providers on the use of ICT services, or shall designate a member of senior management as responsible for overseeing the related risk exposure and relevant documentation.
4. Members of the management body of the financial entity shall actively keep up to date with sufficient knowledge and skills to understand and assess ICT risk and its impact on the operations of the financial entity, including by following specific training on a regular basis, commensurate to the ICT risk being managed.