Skip to content
  • Over 20 Year of Quick Impact Learning
  • Over 800 Students Trained with Fast Track Mastery
  • C-Level Trainers
  • Multilingual
NIS Institute Logo
  • Home
  • Trainings
  • Events
  • Contact
  • International
    • Nis Institute en français
    • CyberMinute
  • English
    • English
    • Nederlands
  • Home
  • Trainings
  • Events
  • Contact
  • International
    • Nis Institute en français
    • CyberMinute
  • English
    • English
    • Nederlands
NIS Institute Logo
  • Home
  • Trainings
  • Events
  • International
    • Nis Insinstitute en français
    • Cyberminute
  • Contact
  • Home
  • Trainings
  • Events
  • International
    • Nis Insinstitute en français
    • Cyberminute
  • Contact
  • English
  • Nederlands
  • English
  • Nederlands
  • NIS INSTITUTE
  • (a CyberMinute TM)
    37 rue du Congrès straat
    1000 Brussels

Blog

NIS2 Compliance

What is NIS2? Understanding the EU Cybersecurity Directive

iso 27001

ISO 27032 and ISO 27001

Nis Institute ISO 28000 PECB

ISO 28000 Strengthening Supply Chain Security

PECB Logo

PECB – start your training here

ISO27034

ISO 27034: Combine penetration testing with application security governance for maximum protection

Unique Training Formats Delivered by NIS Institute

Unique Training Formats

NIS LOGO Official colors no background
PECB Authorized
  • NIS Institute
  • Systemisch Coachen & Opleidingen
  • 37 Rue du Congrès, 1000 Brussels
  • + 32 477 33 06 21
  • nisinstitute@cyberminute.eu
  • Linkedin
  • CyberMinute trademark
  • Terms & Conditions - Algemene voorwaarden
  • Privacy Policy
  • Algemene Voorwaarden
  • Privacyverklaring
Management permission
To provide the best experience, we use technologies such as cookies to store and/or access information about your device. By consenting to these technologies, we may process data such as browsing habits or unique IDs on this site. If you do not consent or withdraw your consent, certain features and capabilities may be adversely affected.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service expressly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences not requested by the subscriber or user.
Statistics
Technical storage or access used exclusively for statistical purposes. Technical storage or access used solely for anonymous statistical purposes. Without subpoena, voluntary compliance by your Internet Service Provider, or additional data from a third party, information stored or retrieved solely for this purpose typically cannot be used to identify you.
Marketing
The technical storage or access is necessary to create user profiles for sending advertising, or to track the user on a site or across sites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}