NIS 2 Directive
NIS 2 Foundation Training
- Understand the fundamental concepts and definitions of NIS2
- Learn the main requirements of for a cybersecurity program
- Identify the approaches and techniques used for the implementation
NIS 2 Lead Implementer
1. Understand NIS 2's core concepts and requirements.
2. Master principles, strategies, and tools for effective cybersecurity program management.
3. Learn to apply NIS 2 requirements within an organizational context.
4. Initiate and plan NIS 2 implementation using PECB's methodology and best practices.
5. Gain expertise to assist organizations in managing and sustaining a robust cybersecurity program.
Register now =>
Cyber Security
CISO Training
- Explain the fundamental principles of information security
- Comprehend the roles and responsibilities of the CISO and the ethical considerations involved, and address the challenges associated with the role
- Design and develop an effective information security program, tailored to the needs of the organization
- Adopt applicable frameworks, laws, and regulations and effectively communicate and implement policies to ensure information security compliance
- Identify, analyze, evaluate, and treat information security risks, using a systematic and effective approach
Certified Lead Cybersecurity Manager
2. Training in establishing and managing cybersecurity programs aligned with international standards like ISO/IEC 27032 and NIST Cybersecurity Framework.
3. Equips participants to improve their organization's cyber readiness and resilience.
4. Prepares them to contribute significantly to their organization's ongoing cybersecurity efforts in a rapidly changing cyber landscape.
CyBersecurity Refresh training
1. Get a refresh on the dynamic world of Cybersecurity and the Threat landscape
2. Update on the constantly evolving sphere of regulations and standardization in this sector.
3. Grasp essential concepts and terminologies underpinning EU regulations in cybersecurity.
4. Comprehend the primary components necessary for an effective cybersecurity program.
5. Explore various strategies and methods applicable in cybersecurity.
REGISTER NOW =>
Information Security & Privacy
ISO/IEC 27001 Lead Implementer
- Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001
- Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an implementer
- Initiate and plan the implementation of an ISMS based on ISO/IEC 27001, by utilizing PECB’s IMS2 Methodology and other best practices
- Support an organization in operating, maintaining, and continually improving an ISMS based on ISO/IEC 27001
- Prepare an organization to undergo a third-party certification audit
GDPR - Certified Data Protection Officer
- Understand the concepts of the GDPR and interpret its requirements
- Understand the content and the correlation between the General Data Protection Regulation and other regulatory frameworks and applicable standards, such as ISO/IEC 27701 and ISO/IEC 29134
- Acquire the competence to perform the role and daily tasks of the data protection officer in an organization
- Develop the ability to inform, advise, and monitor compliance with the GDPR and cooperate with the supervisory authority
BUSINESS CONTINUITY MANAGEMENT (ISO 22301)
- Explain the fundamental concepts and principles of a business continuity management system (BCMS) based on ISO 22301
- Interpret the ISO 22301 requirements for a BCMS from the perspective of an implementer
- Initiate and plan the implementation of a BCMS based on ISO 22301, by utilizing PECB’s IMS2 Methodology and other best practices
- Support an organization in operating, maintaining, and continually improving a BCMS based on ISO 22301
- Prepare an organization to undergo a third-party certification audit
REGISTER NOW =>
Other trainings
ISO 27001 Lead Auditor
ISO 27002 Lead Implementer
ISO 27035 Lead Incident Manager
ISO 27032 Lead Cybersecurity manager
ISO 27005 Risk Manager
ISO 22301 Business Continuity Management System
ISO 27701 Privacy Information Management System Lead Auditor
ISO 27701 Privacy Information Management System Lead Implementer
ISO 28000 Supply Chain security
PECB Chief Information Security Officer
Lead Cloud Security Manager
GDPR - Certified Data Protection Officer
All those trainings can be given in the various formats. Please contact us for practical details.
Need more information, want a specific training? At your premises, custom made? Ask us.
NIS Institute a Cyberminute trademark
© 2023-2024 CyberMinute All rights reserved.