mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

10K
active users

#NIS2directive

0 posts0 participants0 posts today
Daniel Kuhl 📯<p>Die NIS2-Umsetzung kommt näher:</p><p><a href="https://www.security-insider.de/nis2-umsetzungsgesetz-update-auswirkungen-unternehmen-a-c7282a16efff52830dc053969abf45ca/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security-insider.de/nis2-umset</span><span class="invisible">zungsgesetz-update-auswirkungen-unternehmen-a-c7282a16efff52830dc053969abf45ca/</span></a></p><p>Check Point Software Technologies hat dazu eine NIS2 Bereitschaftsbewertung:</p><p><a href="https://www.checkpoint.com/de/services/infinity-global/nis2-readiness-assessment/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">checkpoint.com/de/services/inf</span><span class="invisible">inity-global/nis2-readiness-assessment/</span></a></p><p><a href="https://infosec.exchange/tags/CheckPoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CheckPoint</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/NIS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2</span></a> <a href="https://infosec.exchange/tags/nis2directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nis2directive</span></a> <a href="https://infosec.exchange/tags/readiness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>readiness</span></a> <a href="https://infosec.exchange/tags/assessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>assessment</span></a></p>
eicker.news ᳇ tech news<p>»The <a href="https://eicker.news/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> Agency for Cybersecurity (<a href="https://eicker.news/tags/ENISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ENISA</span></a>) has developed the <a href="https://eicker.news/tags/EuropeanVulnerabilityDatabase" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EuropeanVulnerabilityDatabase</span></a> (<a href="https://eicker.news/tags/EUVD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EUVD</span></a>) as provided for by the <a href="https://eicker.news/tags/NIS2Directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2Directive</span></a>. The service is now operational.« <a href="https://www.enisa.europa.eu/news/consult-the-european-vulnerability-database-to-enhance-your-digital-security?eicker.news" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">enisa.europa.eu/news/consult-t</span><span class="invisible">he-european-vulnerability-database-to-enhance-your-digital-security?eicker.news</span></a> <a href="https://eicker.news/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://eicker.news/tags/media" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>media</span></a> <a href="https://eicker.news/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Harry Sintonen<p>In case you haven't noticed <a href="https://infosec.exchange/tags/nis2directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nis2directive</span></a> is in effect in Finland now:</p><p>"Finnish Parliament has passed the government proposal for a national <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> Act to implement the EU Cybersecurity Directive (NIS 2 Directive). As regards public administration, the relevant requirements included in the Directive are laid down in the Act on Information Management in Public Administration."</p><p>Interestingly this also increases the duties and responsibilities of The Finnish Transport and Communications Agency Traficom:</p><p>"The Cybersecurity Act also entails new supervisory duties for Traficom compared to the old NIS Directive. In future, Traficom will be the competent authority supervising cybersecurity issues also in the following sectors: postal and courier services, space, public administration, managed service providers, managed security service providers, research, and the manufacture of vehicles and other transport equipment."</p><p>ref: <a href="https://traficom.fi/en/news/cybersecurity-act-passed-parliament-obligations-under-nis-2-directive-enter-force-8-april-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">traficom.fi/en/news/cybersecur</span><span class="invisible">ity-act-passed-parliament-obligations-under-nis-2-directive-enter-force-8-april-2025</span></a></p>
Daniel Kuhl 📯<p>❓Interested in a NIS2 Readiness Assessment❓</p><p>EU has released NIS2 to all countries within the European Union. In 2024 NIS will be adopted to local law enforcement and become relevant for a large amount of companies. Check Point can help you preparing your company for NIS2 and assist you in improving your security standards and procedures.</p><p>A team of senior Check Point consultants will analyze your business for compliance with the NIS2 directive. The assessment is typically done on site but can also be performed remotely on request. We will summarize the findings in a report and provide a recommended action plan to increase compliance with the NIS2 directive.</p><p>Benefits: </p><p>✅ Determine what areas of your cyber landscape are impacted<br>✅ Get an overview of the necessary technical requirements<br>✅ Present the processes needed for full compliance<br>✅ Risk management<br>✅ Asset management<br>✅ Business continuity management<br>✅ Vulnerability management<br>✅ Supply chain management<br>✅ Incident response procedures<br>✅ Current security architecture and controls review<br>✅ Obtain details to help train your security team</p><p><a href="https://www.checkpoint.com/services/infinity-global/nis2-readiness-assessment/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">checkpoint.com/services/infini</span><span class="invisible">ty-global/nis2-readiness-assessment/</span></a> </p><p><a href="https://infosec.exchange/tags/NIS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2</span></a> <a href="https://infosec.exchange/tags/nis2directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nis2directive</span></a> <a href="https://infosec.exchange/tags/riskassessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>riskassessment</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/supplychain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supplychain</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a></p>
Pyrzout :vm:<p>Risk and Regulation: Preparing for the Era of Cybersecurity Compliance <a href="https://www.securityweek.com/risk-and-regulation-preparing-for-the-era-of-cybersecurity-compliance/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/risk-and-regu</span><span class="invisible">lation-preparing-for-the-era-of-cybersecurity-compliance/</span></a> <a href="https://social.skynetcloud.site/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a>&amp;Compliance <a href="https://social.skynetcloud.site/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/NIS2Directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2Directive</span></a> <a href="https://social.skynetcloud.site/tags/compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compliance</span></a></p>
Pyrzout :vm:<p>Risk and Regulation: Preparing for the Era of Cybersecurity Compliance <a href="https://www.securityweek.com/risk-and-regulation-preparing-for-the-era-of-cybersecurity-compliance/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/risk-and-regu</span><span class="invisible">lation-preparing-for-the-era-of-cybersecurity-compliance/</span></a> <a href="https://social.skynetcloud.site/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a>&amp;Compliance <a href="https://social.skynetcloud.site/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/NIS2Directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2Directive</span></a> <a href="https://social.skynetcloud.site/tags/compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compliance</span></a></p>
Mattis van 't Schip<p>De Rijksinspectie Digital Infrastructuur heeft een tool gepubliceerd waarmee organisaties kunnen beoordelen of ze onder het toepassingsbereik van NIS2 zullen vallen. Nuttig werk, gezien de vrij grote uitbreiding van het toepassingsgebied van NIS1 naar NIS2! Ben benieuwd of het alle gevallen dekt/kan dekken.</p><p><a href="https://regelhulpenvoorbedrijven.nl/NIS-2-NL/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">regelhulpenvoorbedrijven.nl/NI</span><span class="invisible">S-2-NL/</span></a></p><p><a href="https://eupolicy.social/tags/NIS2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2</span></a> <a href="https://eupolicy.social/tags/nis2directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nis2directive</span></a></p>
Patrick Donegan<p>Confused by the wave of new EU cybersecurity regulations impacting the telecom sector? </p><p>Can't distinguish the obligations of the NIS2 Directive from those of NIS1? The Cyber Resilience Act (CRA) from the Critical Entity Resilience Act (CER)? And whatever happened to the European Electronic Communications Code (EECC)? </p><p>Telecom operators in the EU have to comply with all of these but the NIS2 Directive is the central one now. It ushers in by far the most substantial changes in telco cybersecurity strategy and day to day cybersecurity operations. Read more in this new HardenStance White Paper:<br> <a href="https://www.hardenstance.com/wp-content/uploads/2023/11/Telco-Takeaways-from-the-NIS2-Directive-FINAL.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hardenstance.com/wp-content/up</span><span class="invisible">loads/2023/11/Telco-Takeaways-from-the-NIS2-Directive-FINAL.pdf</span></a></p><p><a href="https://infosec.exchange/tags/nis2directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nis2directive</span></a> <a href="https://infosec.exchange/tags/incidentreporting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentreporting</span></a> <a href="https://infosec.exchange/tags/vulnerabilitydisclosure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitydisclosure</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a></p>
Patrick Donegan<p>Join me, @Nokia's Nils Ahrlich and Cyber Threat Alliance's President Michael Daniel as we discuss the opportunities and pitfalls for EU-based telcos and ISPs preparing to align with the new <a href="https://infosec.exchange/tags/NIS2Directive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NIS2Directive</span></a>. 
<br>Register for this HardenStance webinar on November 8th right here: <br><a href="https://events.hardenstance.com/nis2directive-webinar/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">events.hardenstance.com/nis2di</span><span class="invisible">rective-webinar/</span></a></p>
GÉANT<p>The deadline for implementation of the EU Network and Information Systems Security <a href="https://mstdn.social/tags/NIS2" class="mention hashtag" rel="tag">#<span>NIS2</span></a> directive is set for 17 October 2024.</p><p>Which steps do <a href="https://mstdn.social/tags/NRENs" class="mention hashtag" rel="tag">#<span>NRENs</span></a> need to follow to implement it and minimise its impact on their organisations?</p><p>GÉANT worked with Stratix to produce a report to help NRENs and their stakeholders in the preparation and decision process 👉 <a href="https://connect.geant.org/2023/07/19/network-and-information-systems-security-nis2-recommendations-for-nrens" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">connect.geant.org/2023/07/19/n</span><span class="invisible">etwork-and-information-systems-security-nis2-recommendations-for-nrens</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="tag">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/NIS2directive" class="mention hashtag" rel="tag">#<span>NIS2directive</span></a> <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="tag">#<span>Security</span></a> <a href="https://mstdn.social/tags/EU" class="mention hashtag" rel="tag">#<span>EU</span></a> <a href="https://mstdn.social/tags/Network" class="mention hashtag" rel="tag">#<span>Network</span></a> <a href="https://mstdn.social/tags/Information" class="mention hashtag" rel="tag">#<span>Information</span></a> <a href="https://mstdn.social/tags/compliance" class="mention hashtag" rel="tag">#<span>compliance</span></a> <a href="https://mstdn.social/tags/CyberSec" class="mention hashtag" rel="tag">#<span>CyberSec</span></a> <a href="https://mstdn.social/tags/regulation" class="mention hashtag" rel="tag">#<span>regulation</span></a> <a href="https://mstdn.social/tags/EUdirective" class="mention hashtag" rel="tag">#<span>EUdirective</span></a></p>