NIS 2: From Obligation to Opportunity

As cyber threats evolve and advance, the spotlight has fallen on the European Commission to focus on regulatory issues, to address this threat.
We have seen the Cyber Resilience Act; the AI Act; the Digital Operational Resilience Act, and most pressing, the second Network and Information Security framework - NIS 2.
NIS 2: a necessary evolution of the regulatory framework.
Going well beyond the objectives of NIS 1, which provided a minimum of adequate security conditions for entities and sectors targeted by cyber attacks, the objective of NIS is to strengthen resilience by addressing new sectors and entities.
This is a necessary development in view of the growing threats, targeting local authorities, public health establishments, higher education establishments and all parties in the supply chain, not included in NIS 1.
For EU Member states, NIS2 will also address the lack of coherence and fragmentation in the treatment of cyber attacks for sensitive sectors on a European scale.
Stronger overall security, with strict and proportional criteria depending on the categorisation of the given organisation, between essential or important entities.
There are elements that must be considered, based on NIS 1.
Appropriate and reinforced detection measures, as well as incident response and management measures, must be in place to maintain business continuity in a crisis should a cyber attack occur.
NIS 2 considers these areas, but there is a delay for details at European and national level, particularly in terms of integration with other legislation.
Once the risks and challenges are identified, especially those around sensitive data, it is important to control access and comply with security policies, especially on restricted and confidential networks.
Today, compliance must be a strategic opportunity for companies, not an additional constraint or tick box exercise to merely meet new regulatory standards.
Achieving compliance is not only reactive, enabling a business to establish a comprehensive, up-to-date response to compliance needs, but also to anticipate future regulatory developments.
Beyond compliance, NDR enables organisations to raise overall levels of cybersecurity and optimise investments for the most effective detection of and response to threats.
Building a cybersecurity strategy with NDR as a cornerstone means choosing a long-term cyber path, with anticipation as the keystone.
The aim is to be able to respond effectively to potential future threats, thanks to an adapted and responsive defence system.
Think of NIS 2 as a guide to identifying and prioritizing the risks and areas of weakness, as well as cybersecurity strengths, to draw up a dynamic strategy to combat attacks.
When approached strategically, compliance transforms from a necessity into a real opportunity and competitive advantage.
Gatewatcher is a leader in the detection of cyber threats, and has been protecting the critical networks of worldwide large companies and public institutions since 2015.
Combining Network Detection and Response and Cyber Threats Intelligence solutions, with AI-powered, dynamic analysis techniques, Gatewatcher delivers a real-time 360-degree view of threats, covering both cloud and on-premise infrastructures.


This Cyber News was published on www.cyberdefensemagazine.com. Publication date: Sun, 11 Feb 2024 14:13:04 +0000


Cyber News related to NIS 2: From Obligation to Opportunity

NIS 2: From Obligation to Opportunity - As cyber threats evolve and advance, the spotlight has fallen on the European Commission to focus on regulatory issues, to address this threat. We have seen the Cyber Resilience Act; the AI Act; the Digital Operational Resilience Act, and most ...
1 year ago Cyberdefensemagazine.com
UK, ROK sound alarm over North Korean supply chain attacks The Register - The national cybersecurity organizations of the UK and the Republic of Korea have issued a joint advisory warning of an increased volume and sophistication of North Korean software supply chain attacks. "In an increasingly digital and interconnected ...
1 year ago Theregister.com
How GPL-1 Drug Success Transforms Healthcare Revenue - The huge revenue opportunity stemming from recent success of GLP-1 drugs is not just for the pharmaceutical companies. The new category of Diabetes, weight loss and obesity drugs called GLP-1s is predicted to be a game-changing innovation in ...
1 year ago Feedpress.me
CVE-2005-3140 - Procom NetFORCE 800 4.02 M10 Build 20 and possibly other versions sends the NIS password map (passwd.nis) as a file attachment in diagnostic e-mail messages, which allows remote attackers to obtain the cleartext NIS password hashes. ...
1 year ago
CVE-2010-0015 - nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote attackers to obtain the encrypted passwords ...
8 years ago
CVE-2021-2116 - Vulnerability in the Oracle Application Express Opportunity Tracker component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User ...
4 years ago
CVE-1999-0797 - NIS finger allows an attacker to conduct a denial of service via a large number of finger requests, resulting in a large number of NIS queries. ...
16 years ago
CVE-2009-2029 - Unspecified vulnerability in rpc.nisd in Sun Solaris 8 through 10, and OpenSolaris before snv_104, allows remote authenticated users to cause a denial of service (NIS+ daemon hang) via unspecified vectors related to NIS+ callbacks. ...
7 years ago
CVE-1999-0300 - nis_cachemgr for Solaris NIS+ allows attackers to add malicious NIS+ servers. ...
6 years ago
CVE-2005-1591 - Unknown vulnerability in NIS+ on Solaris 7, 8, and 9 allows remote attackers to cause a denial of service (rpc.nisd disabled and NIS+ unavailable) via unknown vectors. ...
6 years ago
U.S DOE Announces $70 Million Funding for Improving - Funding that will support research into tech Today, the U.S. Department of Energy announced funding of up to $70 million to support research into technologies intended to reduce risks and increase resilience to energy delivery infrastructure from a ...
1 year ago Cysecurity.news
The Momentum, the Margin and the "Magic" with Cisco MSP Partners - The momentum of Cisco's Managed Service Provider partners is undeniable. A recent Canalys study¹ indicates that a striking 79% of partners anticipate growth in this sector in 2023, with 56% expecting growth rates to exceed 10%. By 2027, the managed ...
1 year ago Feedpress.me
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
1 year ago Securityboulevard.com
Honoring Cisco Designated VIPs at Cisco Live Amsterdam 2024 - Every Cisco Live, we have the opportunity to meet our esteemed Cisco Designated VIPs in person. It is one of the most significant highlights for the Cisco Learning Network's community managers and the Cisco Learning & Certifications organization's ...
1 year ago Feedpress.me
SANS Institute Launches AI Cybersecurity Hackathon - Running from February 15 to March 15, 2025, this hackathon provides an opportunity for cybersecurity professionals, ethical hackers, developers, and students to cultivate the critical skills and develop the open-source tools needed to address ...
3 days ago Darkreading.com
CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent - CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. These accomplishments demonstrate our ...
1 year ago Crowdstrike.com
As Meta rolls out end-to-end encryption, police warn keeping children safe 'no longer possible' - The move will ensure that Meta's users are protected from abusive legal requests from non-democratic governments. Globally the company receives hundreds of thousands of government requests for user data annually, according to its transparency center ...
1 year ago Therecord.media
Recent Surveillance Revelations, Enduring Latin American Issues: 2023 Year in Review - The challenges in ensuring strong privacy safeguards, proper oversight of surveillance powers, and effective remedy for those arbitrarily affected continued during 2023 in Latin America. Amidst the Argentinian presidential elections, a thorny ...
1 year ago Eff.org
SentinelOne to Expand Cloud Security Capabilities With Acquisition of PingSafe - PRESS RELEASE. MOUNTAIN VIEW, CA - January 3, 2024 - SentinelOne, a global leader in AI-powered security, today announced that it has agreed to acquire PingSafe. The acquisition of PingSafe's cloud native application protection platform, when ...
1 year ago Darkreading.com
An Argument for Coordinated Disclosure of New Exploits - There were more than 23,000 vulnerabilities discovered and disclosed. While not all of them had associated exploits, it has become more and more common for there to be a proverbial race to the bottom to see who can be the first to release an exploit ...
8 months ago Darkreading.com
18,000 Nissan Customers Affected by Data Breach at Third-Party Software Developer - Nissan recently announced that 18,000 of its U.S. customers have been affected by a data breach involving a third-party software developer. The breach was initially discovered by Nissan in January and affected customers who purchased or leased ...
2 years ago Securityweek.com
System Breach at MailChimp -Notifying Affected Companies - MailChimp, a popular cloud-based email marketing platform, recently experienced a system breach incident. The data breach was found to have potentially compromised the personal information of some MailChimp customers. As such, MailChimp is required ...
2 years ago Securityweek.com
CVE-2024-23674 - The Online-Ausweis-Funktion eID scheme in the German National Identity card through 2024-02-15 allows authentication bypass by spoofing. A man-in-the-middle attacker can assume a victim's identify for access to government, medical, and financial ...
1 year ago
Two Russians indicted for hacking JFK taxi dispatch system The Register - For a period of two years between September 2019 and September 2021, two Americans and two Russians allegedly compromising the taxi dispatch system at John F. Kennedy International Airport in New York to sell cabbies a place at the front of the ...
1 year ago Theregister.com
500k Irish National Police records exposed by third party The Register - A third-party contractor running a database without password protection exposed more than 500,000 records related to vehicle seizures by the Irish National Police. Security researcher Jeremiah Fowler found various records dating back to 2017 ...
1 year ago Theregister.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)