2.5h length

Helping Great Companies Get Better at Compliance

Course Overview

If your organization qualifies as an essential or important entity, you're now required to implement comprehensive cybersecurity measures. Not guidelines. Not best practices. Mandatory requirements backed by significant penalties for non-compliance.

The problem? 

NIS2 doesn't hand you a checklist. It requires you to build a risk-based security program covering everything from access control and encryption to supply-chain security and crisis management.

Where do you even start?

This masterclass gives you a practical roadmap to implement the 10 core security measures required by NIS2 to without wasting budget on unnecessary controls or missing critical gaps.

 

What you'll learn:

  • The 13 mandatory cybersecurity measures (and what each one actually means)
  • How to determine what "proportionate to risk" looks like for YOUR organization
  • Access control and identity management: practical approaches
  • Cryptography requirements: what to encrypt and how
  • Asset management: building an accurate inventory
  • Leadership accountability: what the board and management must do
  • Policies and procedures: templates and examples
  • Human resources security: vetting, training, awareness
  • Supply-chain risk management: vendor assessment frameworks
  • Building an incident response plan that meets NIS2 timelines
  • Notification requirements: who to tell, when, and what to include
  • Business continuity and disaster recovery essentials
  • Learning from recent breaches (real case studies)
  • Monitoring and reporting obligations

 

Includes a template for each of the 13 cybersecurity measures:

  • Cybersecurity Policy
  • Asset Management Policy 
  • Risk Management Policy
  • Human Resource Security Policy
  • Basic Cyber Hygiene Policy
  • Cryptography Policy
  • Network Cybersecurity Policy
  • Access Control Policy
  • Supply Chain Security Policy
  • Policy on Secure Development and Maintenance of Network and Information Systems
  • Incident Handling policy
  • Business Continuity and Cyber Crisis Management Policy
  • Physical security policy 

 

By the end, you'll have:

  • Ready-to-use templates and frameworks you can adapt
  • Confidence to brief leadership on budget and timeline
  • Documentation that demonstrates compliance to regulators

This course ensures you implement the right controls, in the right order, without blowing your budget or missing critical requirements.


Modules

  • Commitment and Accountability – Understanding the role and accountability of key individuals in carrying out cybersecurity measures and building a security-oriented culture.
  • Asset Management – Effective management of digital assets through identification, protection, and control over hardware and software resources.
  • Risk Management – Practical approaches to identifying, assessing, and mitigating risks to ensure resilience against cyber threats.
  • Human Resources Security – Ensuring the protection of employee data, managing digital identities, and preventing human-related security threats.
  • Basic Cyber Hygiene Practices – Overview of essential measures for maintaining cybersecurity and minimizing everyday threats.
  • Ensuring Network Cybersecurity – Strategies for protecting networks, including encryption, safeguarding data in transit, and implementing security protocols.
  • Access Control – Managing system access by defining rules for physical and logical access to ensure data security.
  • Supply Chain Security – Protecting supply channels and ensuring that partners and suppliers comply with security standards.
  • Security in Network and Information Systems – Integrating security measures throughout system development and maintenance to minimize vulnerability risks.
  • Incident Handling – Developing strategies for rapid detection, response, and recovery from cybersecurity incidents.
  • Business Continuity and Cyber Crisis Management – Planning and implementing measures to maintain operations and recover in the event of a cyber crisis.
  • Physical Security – Ensuring the physical protection of facilities and equipment critical to cybersecurity.


Lessons

  1. Chapter 1

    Poglavlje 1

    Commitment and Accountability

  2. Chapter 2

    Poglavlje 2

    Asset Management

  3. Chapter 3

    Poglavlje 3

    Risk management

  4. Chapter 4

    Poglavlje 4

    Human Resources Security

  5. Chapter 5

    Poglavlje 5

    Basic Cyber Hygiene Practices

  6. Chapter 6

    Poglavlje 6

    Ensuring Network Cybersecurity

Why Register?

  • Understand AI security risks - Learn how AI systems introduce new attack surfaces and what that means for cybersecurity.

  • Protect critical systems and data - Gain practical strategies to defend AI models, data pipelines, and infrastructure from threats.

  • Build resilience into AI projects - Learn how to apply security principles throughout the AI lifecycle, from design to deployment.

  • Support secure implementation across teams - Become a trusted resource for integrating cybersecurity into AI development and procurement.

  • Advance your career - Earn a certification that demonstrates your ability to manage cybersecurity challenges in AI-enabled environments.

Reach your full potential.