CINXE.COM

NIS 2 Directive Trained Professional (NIS2DTP) - online training and certification

<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <style> .responsive { width: 100%; height: auto; } </style> <title>NIS 2 Directive Trained Professional (NIS2DTP) - online training and certification</title> <meta name="description" content="Distance learning, online exam, certificate of completion - Become a NIS 2 Directive Trained Professional (NIS2DTP). Acquire the skills to pass the NIS2DTP exam, and to receive the certificate of completion that provides independent evidence to firms and organizations that you have a quantifiable understanding of the subject matter."> <meta name="keywords" content="NIS 2 Directive Trained Professional (NIS2DTP), NIS 2 Directive Trained Professional, NIS2DTP, NIS 2 Directive, NIS 2 Training, NIS 2 Directive training, NIS 2 compliance, Cyber Risk GmbH"> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Index", "item": " https://www.nis-2-directive.com" }, { "@type": "ListItem", "position": 2, "name": "NIS 2 Directive Trained Professional (NIS2DTP)", "item": " https://www.nis-2-directive.com/NIS_2_Directive_Trained_Professional_(NIS2DTP).html" }, { "@type": "ListItem", "position": 3, "name": " NIS 2 Directive (Final Text)", "item": "https://www.nis-2-directive.com/NIS_2_Directive_Articles.html" }, { "@type": "ListItem", "position": 4, "name": " NIS 2 Directive Links", "item": "https://www.nis-2-directive.com/Links.html" }, { "@type": "ListItem", "position": 5, "name": "Cyber Risk GmbH", "item": "https://www.cyber-risk-gmbh.com" } ] } </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Organization", "name": "Cyber Risk GmbH", "url": "https://www.cyber-risk-gmbh.com", "logo": "https://www.cyber-risk-gmbh.com/Cyber_Risk_GmbH_Logo.jpg", "sameAs": [ "https://www.linkedin.com/company/71474270/admin/page-posts/published/", "https://x.com/Cyber_Risk_GmbH" ], "contactPoint": { "@type": "ContactPoint", "telephone": "+41-79-5058960", "contactType": "Customer Service", "areaServed": "Worldwide", "availableLanguage": "English" }, "founder": { "@type": "Person", "name": "George Lekatis" }, "description": "Cyber Risk GmbH is a leading provider of NIS 2 Training in Switzerland and worldwide.", "address": { "@type": "PostalAddress", "streetAddress": "Dammstrasse 16", "addressLocality": "Horgen", "addressRegion": "Canton of Zürich", "postalCode": "8810", "addressCountry": "CH" } } </script> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> <meta name="google-site-verification" content="I0CDxLn5hun_Esd7Gf8jIPUBQ1eIIcVNsUQQ9d4Dq8Q"> <style> .wrapper-banner { background: url("NIS2DTP.jpg"); background-size: cover; background-position: center; } </style> <meta name="msvalidate.01" content="3992470AA0B488CE9CF07B1CD73A76D7"> <link rel="stylesheet" href="./style2.css"> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.disinformation.ch/"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.nis-2-directive.com" target="_blank" >Index</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Trained_Professional_(NIS2DTP).html" target="_blank" >NIS2DTP Training</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Training.html" target="_blank" >NIS 2 Directive Training</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Board_of_Directors_Training.html" target="_blank" >NIS 2 Board Training</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Articles.html" target="_blank" >Articles NIS 2 Directive</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Articles_(Proposal_16.12.2020).html" target="_blank" >Articles NIS 2 Directive (Proposal)</a></li> <li><a href="https://www.nis-2-directive.com/Links.html" target="_blank" >NIS 2 Directive Links</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Transposition.html" target="_blank" >NIS 2 Transposition</a></li> <li><a href="https://www.cyber-risk-gmbh.com" target="_blank">Cyber Risk GmbH</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a></li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h1>NIS 2 Directive Trained Professional (NIS2DTP) program </h1> <br> <p class="text-left"><b>Overview</b></p> <p class="text-left">The NIS 2 Directive gives the opportunity to risk and compliance managers to implement new and more stringent cybersecurity rules, and to dramatically improve risk prevention, detection, response, incident handling, business continuity, supply chain security, vulnerability handling and disclosures.</p> <p class="text-left">According to Article 20 (Governance), the <b>management bodies </b>of essential and important entities must approve the cybersecurity risk-management measures taken by those entities, oversee its implementation, and can be held liable for infringements.</p> <p class="text-left"> According to Article 20, Member States shall ensure that the members of the management bodies of essential and important entities are required to follow training, and shall encourage essential and important entities to offer similar training to their employees on a regular basis, in order that they gain sufficient knowledge and skills to enable them to identify risks and assess cybersecurity risk-management practices and their impact on the services provided by the entity.</p> <p class="text-left"> According to Article 21 (Cybersecurity risk-management measures), essential and important entities must take appropriate and proportionate technical, operational and organisational measures to manage the risks posed to the security of network and information systems which those entities use for their operations or for the provision of their services, and to prevent or minimise the impact of incidents on recipients of their services and on other services.</p> <p class="text-left"> Taking into account the <b>"state-of-the-art" </b>and, where applicable, relevant European and international standards, as well as the cost of implementation, the measures referred shall ensure a level of security of network and information systems appropriate to the risks posed. When assessing the proportionality of those measures, due account shall be taken of the degree of the entity’s exposure to risks, the entity’s size and the likelihood of occurrence of incidents and their severity, including their societal and economic impact.</p> <p class="text-left"> The measures shall be based on an <b>"all-hazards approach"</b> that aims to protect network and information systems and the physical environment of those systems from incidents, and shall include <b>"at least" </b>the following:</p> <p class="text-left"> (a) policies on risk analysis and information system security;</p> <p class="text-left"> (b) incident handling;</p> <p class="text-left"> (c) business continuity, such as backup management and disaster recovery, and crisis management;</p> <p class="text-left"> (d) supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers;</p> <p class="text-left"> (e) security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure;</p> <p class="text-left"> (f) policies and procedures to assess the effectiveness of cybersecurity risk-management measures;</p> <p class="text-left"> (g) basic cyber hygiene practices and cybersecurity training;</p> <p class="text-left"> (h) policies and procedures regarding the use of cryptography and, where appropriate, encryption;</p> <p class="text-left"> (i) human resources security, access control policies and asset management;</p> <p class="text-left"> (j) the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.</p> <br> <p class="text-left"><b>Objectives </b></p> <p class="text-left">The program has been designed to provide with the skills needed to understand and support compliance with the NIS 2 Directive. </p> <p class="text-left"> It also provides with the skills needed to pass the NIS 2 Directive Trained Professional (NIS2DTP) exam, and to receive the Certificate of Completion, that provides independent evidence to firms and organizations that you have a quantifiable understanding of the subject matter.</p> <br> <p class="text-left"><b>Target Audience</b></p> <p class="text-left">The program is beneficial to risk and compliance managers and professionals, auditors, consultants, suppliers and service providers that:</p> <p class="text-left"> - work for EU companies and organizations that have to comply with the NIS 2 Directive, <p class="text-left"> - work for non-EU companies and organizations that have operations in EU Member States or provide services to EU citizens, and have to comply with the NIS 2 Directive.</p> <p class="text-left">The Directive applies to "essential" and "important" public and private entities, as described below.</p> <br> <p class="text-left"> <b>Who must comply with the NIS 2 directive?</b></p> <p class="text-left">According to Article 2 (Scope) of the NIS 2 Directive, NIS 2 applies to:</p> <p class="text-left">1: Public or private entities of a type referred to in Annex I or II (follows) which qualify as <b> medium-sized enterprises, or exceed the ceilings for medium-sized enterprises, </b> and which provide their services or carry out their activities within the European Union.</p> <p class="text-left">A <b>microenterprise </b> is defined as an enterprise which employs fewer than 10 persons and whose annual turnover and/or annual balance sheet total does not exceed EUR 2 million. NIS 2 does not apply there.</p> <p class="text-left">A <b>small enterprise </b> is defined as an enterprise which employs fewer than 50 persons and whose annual turnover and/or annual balance sheet total does not exceed EUR 10 million. NIS 2 does not apply there too.</p> <p class="text-left">A <b>medium-sized enterprise </b> is defined as an enterprise which employ between 50 and 250 persons and which have an annual turnover between EUR 10 million and EUR 50 million, and/or an annual balance sheet total not exceeding EUR 43 million. NIS 2 applies there.</p> <br> <p class="text-left"><b>In ANNEX I we have:</b></p> <p class="text-left"><b>1. Energy.</b></p> <p class="text-left"> a. Electricity.<br> — Electricity undertakings.<br> — Distribution system operators. <br> — Transmission system operators. <br> — Producers. <br> — Nominated electricity market operators. <br> — Market participants. </p> <p class="text-left">b. District heating and cooling.<br> — Operators of district heating or district cooling.</p> <p class="text-left">c. Oil.<br> — Operators of oil transmission pipelines.<br> — Operators of oil production, refining and treatment facilities, storage and transmission.<br> — Central stockholding entities.</p> <p class="text-left">d. Gas.<br> — Supply undertakings. <br> — Distribution system operators. <br> — Transmission system operators. <br> — Storage system operators. <br> — LNG system operators. <br> — Natural gas undertakings. <br> — Operators of natural gas refining and treatment facilities.</p> <p class="text-left">e. Hydrogen.<br> — Operators of hydrogen production, storage and transmission.</p> <br> <p class="text-left"><b>2. Transport.</b></p> <p class="text-left">a. Air.<br> — Air carriers used for commercial purposes.<br> — Airport managing bodies, airports, including the core airports and entities operating ancillary installations contained within airports.<br> — Traffic management control operators providing air traffic control (ATC) services. </p> <p class="text-left">b. Rail.<br> — Infrastructure managers. <br> — Railway undertakings, including operators of service facilities. </p> <p class="text-left">c. Water.<br> — Inland, sea and coastal passenger and freight water transport companies.<br> — Managing bodies of ports, including their port facilities, and entities operating works and equipment contained within ports.<br> — Operators of vessel traffic services (VTS). </p> <p class="text-left">d. Road.<br> — Road authorities responsible for traffic management control, excluding public entities for which traffic management or the operation of intelligent transport systems is a non-essential part of their general activity.<br> — Operators of Intelligent Transport Systems. </p> <br> <p class="text-left"><b>3. Banking.</b><br> — Credit institutions. </p> <br> <p class="text-left"><b>4. Financial market infrastructures. </b><br> — Operators of trading venues. <br> — Central counterparties (CCPs). </p> <br> <p class="text-left"><b>5. Health. </b><br> — Healthcare providers. <br> — EU reference laboratories. <br> — Entities carrying out research and development activities of medicinal products. <br> — Entities manufacturing basic pharmaceutical products and pharmaceutical preparations. <br> — Entities manufacturing medical devices considered to be critical during a public health emergency (public health emergency critical devices list). </p> <br> <p class="text-left"><b>6. Drinking water.</b><br> — Suppliers and distributors of water intended for human consumption, excluding distributors for which distribution of water for human consumption is a non-essential part of their general activity of distributing other commodities and goods.</p> <br> <p class="text-left"><b>7. Waste water.</b><br> — Undertakings collecting, disposing of or treating urban waste water, domestic waste water or industrial waste water, excluding undertakings for which collecting, disposing of or treating urban waste water, domestic waste water or industrial waste water is a non-essential part of their general activity.</p> <br> <p class="text-left"><b>8. Digital infrastructure.</b> <br> — Internet Exchange Point providers.<br> — DNS service providers, excluding operators of root name servers.<br> — TLD name registries.<br> — Cloud computing service providers.<br> — Data centre service providers.<br> — Content delivery network providers.<br> — Trust service providers.<br> — Providers of public electronic communications networks.<br> — Providers of publicly available electronic communications services.</p> <br> <p class="text-left"><b>9. ICT service management (business-to-business). </b><br> — Managed service providers.<br> — Managed security service providers.</p> <br> <p class="text-left"><b>10. Public administration. </b><br> — Public administration entities of central governments as defined by a Member State in accordance with national law.<br> — Public administration entities at regional level as defined by a Member State in accordance with national law.</p> <br> <p class="text-left"><b>11. Space. </b><br> Operators of ground-based infrastructure, owned, managed and operated by Member States or by private parties, that support the provision of space-based services, excluding providers of public electronic communications networks.</p> <br> <p class="text-left"><b>ANNEX II</b></p> <br> <p class="text-left"><b>1. Postal and courier services. </b></p> <br> <p class="text-left"><b>2. Waste management.</b><br> — Undertakings carrying out waste management, excluding undertakings for whom waste management is not their principal economic activity.</p> <br> <p class="text-left"><b>3. Manufacture, production and distribution of chemicals.</b><br> — Undertakings carrying out the manufacture of substances and the distribution of substances or mixtures, and undertakings carrying out the production of articles.</p> <br> <p class="text-left"><b>4. Production, processing and distribution of food. </b><br> — Food businesses which are engaged in wholesale distribution and industrial production and processing.</p> <br> <p class="text-left"><b>5. Manufacturing.</b><br> <p class="text-left">(a) Manufacture of medical devices and in vitro diagnostic medical devices.<br> — Entities manufacturing medical devices, and entities manufacturing in vitro diagnostic medical devices. <br> <p class="text-left">(b) Manufacture of computer, electronic and optical products.</p> <p class="text-left">(c) Manufacture of electrical equipment.<br> <p class="text-left">(d) Manufacture of machinery and equipment.<br> <p class="text-left">(e) Manufacture of motor vehicles, trailers and semi-trailers.<br> <p class="text-left">(f) Manufacture of other transport equipment.</p> <br> <p class="text-left"><b>6. Digital providers.</b> <br> — Providers of online marketplaces.<br> — Providers of online search engines.<br> — Providers of social networking services platforms.</p> <br> <p class="text-left"><b>7. Research. </b><br> — Research organisations. </p> <br> <p class="text-left"><b>Important note: </b>This is an overview, not a detailed list of activities. Depending on their products or services, and where their products or services belong in <b>NACE (the statistical classification of economic activities in the European Union),</b> entities must carefully consider if they must comply with the NIS 2 Directive or not. </p> <p class="text-left"><b>For example, </b>in the scope of the NIS 2 Directive, we have the activity "manufacture of computer, electronic and optical products". What exactly does NIS 2 mean? According to NIS 2, these are "undertakings carrying out any of the economic activities referred to in section C division 26 of NACE Rev. 2":</p> <p class="text-left">We have to visit section C division 26 of NACE Rev. 2, and find: </p> <p class="text-left">26.1 Manufacture of electronic components and boards.<br> 26.2 Manufacture of computers and peripheral equipment.<br> 26.3 Manufacture of communication equipment.<br> 26.4 Manufacture of consumer electronics.<br> 26.5. Manufacture of instruments and appliances for measuring, testing and navigation; watches and clocks.<br> 26.6. Manufacture of irradiation, electromedical and electrotherapeutic equipment.<br> 26.7 Manufacture of optical instruments and photographic equipment.<br> 26.8. Manufacture of magnetic and optical media.</p> <p class="text-left"><b>Another example,</b> in the category "banking" belong "Credit institutions as defined in Article 4, point (1), of Regulation (EU) No 575/2013". In Regulation (EU) No 575/2013, "credit institution" means an undertaking the business of which is to take deposits or other repayable funds from the public and to grant credits for its own account. </p> <br> <p class="text-left"> <b>Non-EU entities must also comply with the NIS 2 directive.</b></p> <p class="text-left">In cases where a DNS service provider, TLD name registry, content delivery network provider, cloud computing service provider, data centre service provider and digital provider <b>not established in the EU </b>offers services within the EU, it should <b>designate a representative. </b></p> <p class="text-left"> In order to determine whether such an entity is offering services within the Union, it should be ascertained whether it is apparent that the entity is planning to offer services to persons in one or more Member States. </p> <p class="text-left">The mere accessibility in the Union of the entity’s or an intermediary's website or of an email address and of other contact details, or the use of a language generally used in the third country where the entity is established, is as such insufficient to ascertain such an intention. </p> <p class="text-left">However, factors such as the use of a language or a currency generally used in one or more Member States with the possibility of ordering services in that other language, or the mentioning of customers or users who are in the Union, may make it apparent that the entity is planning to offer services within the Union. </p> <p class="text-left">The representative should act on behalf of the entity and it should be possible for competent authorities or the CSIRTs to contact the representative. The representative should be explicitly designated by a written mandate of the entity to act on the latter's behalf with regard to the latter's obligations under this Directive, including incident reporting.</p> <br> <p class="text-left"><b>Non-EU entities that offer services to EU citizens must also be aware of Article 24. </b></p> <p class="text-left"> <b> Article 24, Jurisdiction and territoriality.</b></p> <p class="text-left">1. DNS service providers, TLD name registries, cloud computing service providers, data centre service providers and content delivery network providers referred to in point 8 of Annex I, as well as digital providers referred to in point 6 of Annex II shall be deemed to be under the jurisdiction of the Member State in which they have their main establishment in the Union.</p> <p class="text-left">2. For the purposes of this Directive, entities referred to in paragraph 1 shall be deemed to have their main establishment in the Union in the Member State where the decisions related to the cybersecurity risk management measures are taken. If such decisions are not taken in any establishment in the Union, the main establishment shall be deemed to be in the Member State where the entities have the establishment with the highest number of employees in the Union.</p> <p class="text-left">3. If an entity referred to in paragraph 1 is <b>not established in the Union, but offers services within the Union, </b>it shall designate a representative in the Union. The representative shall be established in one of those Member States where the services are offered. Such entity shall be deemed to be under the jurisdiction of the Member State where the representative is established. </p> <p class="text-left">In the <b>absence</b> of a representative, <b>any Member State in which the entity provides services may take legal actions against the entity for the infringement </b>of this Directive.</p> <br> <p class="text-left"> <b> Course Synopsis</b> </p> <br> <p class="text-left"> <b> Introduction. </b> <br> - The NIS 2 Directive Trained Professional (NIS2DTP) exam. <br> - The certificate of completion. </p> <br> <p class="text-left"> <b> Part 1</b> </p> <p class="text-left"> <b> The European Union (EU). How does the legislative process work? </b> <br> - Key institutions. <br> - The European Commission, the most important institution for risk and compliance professionals. <br> - How does the legislative process work? <br> - The European System of Financial Supervision (ESFS). <br> - Legal acts after the Treaty of Lisbon. <br> - Delegated acts, supplementing or amending certain non-essential elements of a basic act. <br> - Implementing acts. <br> - Regulatory technical standards (RTS), Implementing technical standards (ITS). <br> - The European Data Protection Supervisor and the European Data Protection Board. <br> - The Committee of European Auditing Oversight Bodies (CEAOB). <br> - The European External Action Service. <br> - The Common Foreign and Security Policy (CFSP). <br> - The Common Security and Defence Policy (CSDP). <br> - The European Network and Information Security Agency (ENISA). <br> - The European Multidisciplinary Platform Against Criminal Threats. (EMPACT). <br> - The European framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU). <br> - The Euro Cyber Resilience Board for pan-European Financial Infrastructures (ECRB). <br> - The Cyber Information and Intelligence Sharing Initiative (CIISI-EU). <br> - The High-Level Expert Group on Artificial Intelligence (AI HLEG). </p> <br> <p class="text-left"> <b> Part 2</b> </p> <p class="text-left"> <b>“An Open, Safe and Secure Cyberspace”, the EU's vision on how to prevent cyber disruptions and attacks, and respond to them. </b> <br> - 1. Achieving cyber resilience. <br> - 2. Drastically reducing cybercrime. <br> - 3. Developing cyber defence policy and capabilities related to the Common Security and Defence Policy (CSDP). <br> - 4. Developing the industrial and technological resources for cyber-security. <br> - 5. Establishing an international cyberspace policy for the European Union and promote EU core values. </p> <br> <p class="text-left"> <b> The NIS Directive (EU 2016/1148), the first piece of EU-wide cybersecurity legislation.</b> <br> - 1. National capabilities. <br> - 2. Cross-border collaboration. <br> - 3. National supervision of critical sectors. <br> - The NIS Cooperation Group. <br> - The NIS Directive, important parts. <br> - Transposition of the NIS Directive. </p> <br> <p class="text-left"> <b> Part 3</b> </p> <p class="text-left"> <b>Introduction to the NIS 2 Directive.</b> <br> - The “lex specialis derogat legi generali” (special law repeals general laws) doctrine, accepted by the EU and international law.<br> - NIS 2 as lex generalis, a general law.<br> - NIS 2 is a legal obligation only when there is no special law for a sector.<br> - NIS 2 and Regulation (EU) 2022/2554 (the Digital Operational Resilience Act - DORA).<br> - NIS 2 and Directive (EU) 2022/2557 (the Critical Entities Resilience Directive - CER).<br> - NIS 2 and Directive 95/46/EC (General Data Protection Regulation - GDPR). <br> - Before discussing Article 1 of the NIS 2 Directive. <br> - NACE Rev. 2. <br> - Annex I, Sectors of High Criticality. <br> - Annex II, Other Critical Sectors. </p> <br> <p class="text-left"> <b> The Articles of the NIS 2 Directive</b> </p> <p class="text-left"><b>CHAPTER I, GENERAL PROVISIONS. </b> <br> - Subject matter. <br> - Scope. <br> - Essential and important entities. <br> - Sector-specific Union legal acts. <br> - Minimum harmonisation. <br> - Definitions. </p> <br> <p class="text-left"><b>CHAPTER II, COORDINATED CYBERSECURITY FRAMEWORKS. </b> <br> - National cybersecurity strategy. <br> - Competent authorities and single points of contact. <br> - National cyber crisis management frameworks. <br> - Computer security incident response teams (CSIRTs). <br> - Requirements, technical capabilities and tasks of CSIRTs. <br> - Coordinated vulnerability disclosure and a European vulnerability database. <br> - Cooperation at national level. </p> <br> <p class="text-left"><b>CHAPTER III, COOPERATION AT UNION AND INTERNATIONAL LEVEL. </b> <br> - Cooperation Group. <br> - CSIRTs network. <br> - European cyber crisis liaison organisation network (EU-CyCLONe). <br> - International cooperation. <br> - Report on the state of cybersecurity in the Union. <br> - Peer reviews. </p> <br> <p class="text-left"><b>CHAPTER IV, CYBERSECURITY RISK-MANAGEMENT MEASURES AND REPORTING OBLIGATIONS. </b> <br> - Governance. <br> - Cybersecurity risk-management measures. <br> - Union level coordinated security risk assessments of critical supply chains. <br> - Reporting obligations. <br> - Use of European cybersecurity certification schemes. <br> - Standardisation. </p> <br> <p class="text-left"><b>CHAPTER V, JURISDICTION AND REGISTRATION. </b> <br> - Jurisdiction and territoriality. <br> - Registry of entities. <br> - Database of domain name registration data. </p> <br> <p class="text-left"><b>CHAPTER VI, INFORMATION SHARING. </b> <br> - Cybersecurity information-sharing arrangements. <br> - Voluntary notification of relevant information. </p> <br> <p class="text-left"><b>CHAPTER VII, SUPERVISION AND ENFORCEMENT. </b> <br> - General aspects concerning supervision and enforcement. <br> - Supervisory and enforcement measures in relation to essential entities. <br> - Supervisory and enforcement measures in relation to important entities. <br> - General conditions for imposing administrative fines on essential and important entities. <br> - Infringements entailing a personal data breach. <br> - Penalties. <br> - Mutual assistance. </p> <br> <p class="text-left"><b>CHAPTER VIII, DELEGATED AND IMPLEMENTING ACTS. </b> <br> - Exercise of the delegation. <br> - Committee procedure. </p> <br> <p class="text-left"><b>CHAPTER IX, FINAL PROVISIONS. </b> <br> - Review. <br> - Transposition. <br> - Amendments. <br> - Repeal. <br> - Entry into force. </p> <br> <p class="text-left"><b>The NIS 2 Directive for non-EU entities. </b> <br> - Does NIS 2 apply to companies not established in the EU? <br> - Article 6 and Article 26 (Jurisdiction and territoriality). <br> - Preamble 116, Preamble 133. </p> <br> <p class="text-left"> <b> Other new EU Directives and Regulations. </b> <br> - The Digital Operational Resilience Act (DORA). <br> - The Artificial Intelligence Act. <br> - The Critical Entities Resilience Directive (CER). <br> - The European Data Act. <br> - The European Data Governance Act (DGA). <br> - The European Cyber Resilience Act (CRA). <br> - The Digital Services Act (DSA). <br> - The Digital Markets Act (DMA). <br> - The European Chips Act. <br> - The Artificial Intelligence Liability Directive. <br> - The Framework for Artificial Intelligence Cybersecurity Practices (FAICP). <br> - The EU Cyber Solidarity Act. <br> - The Digital Networks Act (DNA). <br> - The European ePrivacy Regulation. <br> - The European Digital Identity Regulation. <br> - The European Media Freedom Act (EMFA). <br> - The Corporate Sustainability Due Diligence Directive (CSDDD). <br> - The Systemic Cyber Incident Coordination Framework (EU-SCICF). <br> - The European Health Data Space (EHDS). <br> - The European Financial Data Space (EFDS). <br> - The Financial Data Access (FiDA) Regulation. <br> - The Payment Services Directive 3 (PSD3), Payment Services Regulation (PSR). <br> - Internal Market Emergency and Resilience Act (IMERA). <br> - The European Space Law (EUSL). </p> <br> <p class="text-left"><b>NIS 2, DORA, or both? </b> <br> - The Commission's Guidelines about the relationship between the NIS 2 Directive and the Digital Operational Resilience Act (DORA), from 18 September 2023.</p> <br> <p class="text-left"><b>Commission Implementing Regulation (EU) 2024/2690 of 17 October 2024.</b> <br> <p class="text-left">- Understanding the The Commission Implementing Regulation (EU) 2024/2690 of 17 October 2024 laying down rules for the application of Directive (EU) 2022/2555 as regards technical and methodological requirements of cybersecurity risk-management measures and further specification of the cases in which <b>an incident is considered to be significant </b>with regard to DNS service providers, TLD name registries, cloud computing service providers, data centre service providers, content delivery network providers, managed service providers, managed security service providers, providers of online market places, of online search engines and of social networking services platforms, and trust service providers.</p> <p class="text-left"><b>Note: </b>There are 223 slides that cover the Commission Implementing Regulation (EU) 2024/2690. There are no exam questions from this part of the program.</p> <p class="text-left">Closing remarks. </p> <hr> <p class="text-left"><b>Become a NIS 2 Directive Trained Professional (NIS2DTP)</b></p> <p class="text-left">This is a Distance Learning with Certificate of Completion program, provided by Cyber Risk GmbH. The General Terms and Conditions for all legal transactions made through the Cyber Risk GmbH websites (hereinafter “GTC”) can be found at: <a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">https://www.cyber-risk-gmbh.com/Impressum.html</a></p> <p class="text-left">Each Distance Learning with Certificate of Completion program (hereinafter referred to as “distance learning program”) is provided at a fixed price, that includes VAT. There is no additional cost, now or in the future, for any reason.</p> <p class="text-left">We will send the distance learning program via email up to 24 hours after the payment (working days). Please remember to check the spam folder of your email client too, as emails with attachments are often landed in the spam folder.</p> <p class="text-left">You have the option to ask for a full refund up to 60 days after the payment. If you do not want one of our distance learning programs for any reason, all you must do is to send us an email, and we will refund the payment, no questions asked.</p> <p class="text-left">Your payment will be received by Cyber Risk GmbH (Dammstrasse 16, 8810 Horgen, Switzerland, Handelsregister des Kantons Zürich, Firmennummer: CHE-244.099.341). Cyber Risk GmbH will also send the certificates of completion to all persons that will pass the exam.</p> <p class="text-left">The all-inclusive cost is 297 USD (US Dollars). There is no additional cost, now or in the future, for this program.</p> <br> <p class="text-left"><b>First option: You can purchase the NIS 2 Directive Trained Professional (NIS2DTP) program with VISA, MASTERCARD, AMEX, Apple Pay, Google Pay etc.</b></p> <a class="btn-payrexx-modal" href="https://cyberriskgmbh.payrexx.com/pay?tid=c3bdd792"> Purchase the NIS2DTP program here (VISA, MASTERCARD, AMEX, Apple Pay, Google Pay etc.) </a> <script type="text/javascript" src="https://media.payrexx.com/modal/v1/modal.min.js?v=1.41"></script> <script type="text/javascript"> jQuery(".btn-payrexx-modal").payrexxModal(); </script> <br> <br> <a href="https://cyberriskgmbh.payrexx.com/pay?tid=c3bdd792"><img src="Credit_Cards.JPG" width="506" height="28" alt=""></a><br> <br> <br> <br> <p class="text-left"><b>Second option: QR code payment.</b></p> <p class="text-left">i. Open the camera app or the QR app on your phone. </p> <p class="text-left">ii. Scan the QR code and possibly wait for a few seconds. </p> <p class="text-left">iii. Click on the link that appears, open your browser, and make the payment. </p> <img src="NIS2DTP_QR_Payment.png" width="160" height="160" alt=""> <br> <br> <p class="text-left"><b>Third option: You can purchase the NIS 2 Directive Trained Professional (NIS2DTP) program with PayPal</b></p> <p class="text-left">When you click <i>"PayPal"</i> below, you will be redirected to the PayPal web site. If you prefer to pay with a card, you can click <i>"Debit or Credit Card"</i> that is also powered by PayPal. </p> <div id="smart-button-container"> <div style="text-align: center;"> <div id="paypal-button-container"></div> </div> </div> <script src="https://www.paypal.com/sdk/js?client-id=AVxAEYbhCI2hLvKvwPN69Bu_dE8rh1Edzd6eRSjYXCGJlzZDgqa7vRjbgmz1sNjRTiuCz385_JhNchmV&enable-funding=venmo&currency=USD" data-sdk-integration-source="button-factory"></script> <script> function initPayPalButton() { paypal.Buttons({ style: { shape: 'rect', color: 'gold', layout: 'vertical', label: 'paypal', }, createOrder: function(data, actions) { return actions.order.create({ purchase_units: [{"description":"NIS 2 Directive Trained Professional (NIS2DTP) program","amount":{"currency_code":"USD","value":297}}] }); }, onApprove: function(data, actions) { return actions.order.capture().then(function(orderData) { // Full available details console.log('Capture result', orderData, JSON.stringify(orderData, null, 2)); // Show a success message within this page, e.g. const element = document.getElementById('paypal-button-container'); element.innerHTML = ''; element.innerHTML = '<h3>Thank you for your payment!</h3>'; // Or go to another URL: actions.redirect('thank_you.html'); }); }, onError: function(err) { console.log(err); } }).render('#paypal-button-container'); } initPayPalButton(); </script> <br> <br> <p class="text-left"><b>What is included in the cost of the distance learning program:</b></p> <br> <p class="text-left"><b>A. The official presentations (1033 slides).</b></p> <p class="text-left">There 223 additional slides that cover the Commission Implementing Regulation (EU) 2024/2690 of 17 October 2024, laying down rules for the application of the NIS 2 Directive. There are no exam questions from this part of the program.</p> <p class="text-left">The presentations are effective and appropriate to study online or offline. Busy professionals have full control over their own learning and are able to study at their own speed. They are able to move faster through areas of the course they feel comfortable with, but slower through those that they need a little more time on. </p> <br> <p class="text-left"><b>B. Up to 3 online exam attempts per year.</b></p> <p class="text-left">Candidates must pass only one exam. If they fail, they must study the official presentations and retake the exam. Candidates are entitled to 3 exam attempts every year.</p> <p class="text-left"> If candidates do not achieve a passing score on the exam the first time, they can retake the exam a second time.</p> <p class="text-left"> If they do not achieve a passing score the second time, they can retake the exam a third time.</p> <p class="text-left"> If candidates do not achieve a passing score the third time, they must wait at least one year before retaking the exam. There is no additional cost for additional exam attempts. </p> <p class="text-left">To learn more, you may visit: </p> <p class="text-left"><a href="https://www.nis-2-directive.com/Distance_Learning_Programs_Exam_Certificate_of_Completion.pdf" target="_blank">https://www.nis-2-directive.com/Distance_Learning_Programs_Exam_Certificate_of_Completion.pdf</a></p> <br> <p class="text-left"><b>C. The certificate of completion, with a scannable QR code for verification.</b></p> <p class="text-left"> You will receive your certificate via email in Adobe Acrobat format (pdf), with a scannable QR code for verification, 7 business days after you pass the exam. A business day refers to any day in which normal business operations are conducted (in our case Monday through Friday), excluding weekends and public holidays. </p> <br> <img src="Monika_Meier_NIS2DTP.png" alt="NIS 2 Directive Trained Professional (NIS2DTP)" width="491" height="347"> <br> <br> <p class="text-left"><b>D. Cyber Risk GmbH will develop a web page dedicated to each certified professional (https://www.cyber-risk-gmbh.com/Your_Name.htm).</b></p> <p class="text-left">When third parties scan the QR code on your certificate, they will visit this web page (https://www.cyber-risk-gmbh.com/Your_Name.htm), and they will be able to verify that you are a certified professional, and your certificates are valid and legitimate.</p> <p class="text-left">In this web page we will have your name, all the certificates you have received from us, and pictures of your certificates. <p class="text-left">This is an example:</p> <p class="text-left"><a href="https://www.cyber-risk-gmbh.com/Monika_Meier.html" target="_blank">https://www.cyber-risk-gmbh.com/Monika_Meier.html</a></p> <p class="text-left">You can print your certificate that you will receive in Adobe Acrobat format (pdf). With the scannable QR code, all third parties can verify the authenticity of each certificate in a matter of seconds. Professional certificates are some of the most frequently falsified documents. Employers and third parties need an easy, effective, and efficient way to check the authenticity of each certificate. QR code verification is a good response to this demand.</p> <br> <p class="text-left"><b>E. If you purchase the NIS2DTP program now, you can receive all the updated and amended NIS2DTP programs at no cost until January 31, 2028. </b> </p> <p class="text-left">Every time we have important developments that affect regulatory compliance with the NIS 2 Directive (NIS2), we will update and amend this training program, especially when we have important: </p> <p class="text-left">- <b>Joint final draft technical standards, </b> from the European Supervisory Authorities (ESAs) – the European Banking Authority (EBA), the European Insurance and Occupational Pensions Authority (EIOPA), the European Securities and Markets Authority (ESMA). <p class="text-left">- <b>Regulatory Technical Standards (RTS), </b> <p class="text-left"> - <b>Implementing Technical Standards (ITS), </b> <p class="text-left"> - <b> Delegated Acts, </b>that supplement or amend non‑essential parts of EU legislative acts, and </p> <p class="text-left"> - <b> Implementing Acts, </b>that ensure that EU laws are applied uniformly. </p> <p class="text-left"> The all-inclusive cost of your first program is $297. The all-inclusive cost of your second (and each additional) program is $197. It includes the exam, the certificate of completion, and all the updated and amended programs at no cost until January 31, 2028. <b>You can take the exam and receive the certificate of completion only once. </b>You cannot take the exam again, and it is not possible to receive a new certificate of completion every time you receive an updated and amended program at no cost. </p> <p class="text-left"> If you want to take the exam again, to receive a certificate of completion having a later date on it, and to have both certificates of completion with different dates at your dedicated web page, you must purchase the updated program at a discounted cost ($197). <b> This is not required, your original certificate will not expire. </b> </p> <p class="text-left"><b>In order to receive the updated and amended program (you have purchased the program in the past, and now you want to receive the updated and amended program at no cost), please follow the simple steps: </b> </p> <p class="text-left">Please check the “Course synopsis” of the program at the registration page, to check if you have the latest version. </p> <p class="text-left"> If we have updated the program, please send us an email with title: “Please send me the updated NIS2DTP program.”</p> <p class="text-left">In the email, please let us know which was the name and email address of the person or legal entity that had initially purchased the program. </p> <p class="text-left">You will receive the updated program in less than 48 hours (working days). Please remember to check your spam folder too. </p> <hr> <br> <p class="text-left"><b>Frequently Asked Questions for the distance learning programs.</b></p> <br> <p class="text-left"><b>1. I want to know more about Cyber Risk GmbH.</b></p> <br> <p class="text-left"><b>“Cyber Risk GmbH” </b>is a company incorporated in Switzerland. <br> <b>Registered address: </b>Dammstrasse 16, 8810 Horgen, Switzerland. <br> <b>Company number: </b>CHE-244.099.341. <br> <b>Cantonal Register of Commerce: </b>Canton of Zürich. <br> <b>Swiss VAT number: </b>CHE-244.099.341 MWST. <br> <b>EU VAT number: </b>EU276036462. Cyber Risk GmbH is registered for EU VAT purposes in Germany (Bundeszentralamt für Steuern, One-Stop-Shop, Nicht EU-Regelung) for the sale of services in the EU. Cyber Risk GmbH declares and pays EU VAT in a single electronic quarterly return submitted to Germany, and the German Bundeszentralamt für Steuern forwards the EU VAT due to each member State of the EU.</p> <br> <p class="text-left">Cyber Risk GmbH was founded in Horgen, Switzerland, by George Lekatis, an acclaimed expert in risk and compliance management. The company specializes in providing advanced cybersecurity and compliance training, helping organizations navigate and implement complex European, U.S., and international cybersecurity regulations. Additionally, Cyber Risk GmbH supports professionals in completing online training programs, passing exams, and obtaining Certificates of Completion, which serve as independent verification of their expertise for firms and organizations.</p> <p class="text-left">George Lekatis serves as the General Manager of Compliance LLC, a company incorporated in Wilmington, NC, with offices in Washington, DC. Compliance LLC provides risk and compliance training in 58 countries. Several of its business units function as highly successful associations, offering a wide range of services to their members, including membership programs, regular updates (weekly or monthly), specialized training, certification, Authorized Certified Trainer (ACT) programs, advocacy, and other professional services.</p> <p class="text-left">George is the president of the International Association of Risk and Compliance Professionals (IARCP, <a href="http://www.risk-compliance-association.com" target="_blank"> https://www.risk-compliance-association.com</a>). He leads the team responsible for developing and maintaining the Certified Risk and Compliance Management Professional (CRCMP) program. The CRCMP certification is widely regarded as a preferred credential by companies and organizations. For more information on the demand for CRCMPs, you may visit: <a href="https://www.risk-compliance-association.com/CRCMP_Jobs_Careers.pdf" target="_blank">https://www.risk-compliance-association.com/CRCMP_Jobs_Careers.pdf</a></p> <br> <a href="https://www.risk-compliance-association.com/CRCMP_Jobs_Careers.pdf"><img src="CRCMP_101.JPG" width="575" height="373" alt="CRCMP careers" class="responsive img-responsive"></a> <br> <br> <p class="text-left">George has acquired over 20,000 hours of experience as a seminar leader, providing training and executive coaching in information security and risk management to leading global organizations across 36 countries. He holds a Master of Laws (LL.M.) in International Business Law from the University of London (Queen Mary and UCL). Beginning his career as a mathematician, George has since earned 60 professional certifications in information security, risk management, and IT. His credentials include the Certified Information Systems Security Professional (CISSP) lead instructor, Steganography Investigator, and certifications from the Internet Security Systems (ISS) in Internet Scanner, Database Scanner, and System Scanner. He is also a Checkpoint Certified Security Administrator (CCSA), Microsoft Certified Systems Engineer (MCSE), and Microsoft Certified Trainer (MCT). As an expert witness and litigation consultant, he is qualified to investigate and provide testimony on compliance with European, U.S., and international regulations.</p> <p class="text-left">George Lekatis is a highly sought-after expert on Basel III, with deep expertise in helping international firms and financial conglomerates develop controls and systems to meet complex regulatory requirements. He serves as the President of the Basel III Compliance Professionals Association (BiiiCPA, <a href="https://www.basel-iii-association.com" target="_blank"> https://www.basel-iii-association.com</a>), the world’s largest association of Basel III professionals, dedicated to supporting compliance across the global financial sector. </p> <p class="text-left">George also serves as the President of the Sarbanes-Oxley Compliance Professionals Association (SOXCPA, <a href="https://www.sarbanes-oxley-association.com" target="_blank">https://www.sarbanes-oxley-association.com</a>), the world’s largest association of Sarbanes-Oxley professionals. </p> <p class="text-left">Our instructors are professionals with extensive, real-world experience in their respective fields. They are equipped to deliver full-time, part-time, or short-form programs, all customized to suit your specific requirements. Beyond teaching, our instructors provide hands-on guidance, offering real-world insights that help bridge the gap between theory and practice. You will always be informed ahead of time about the instructor leading your program. </p> <br> <br> <p class="text-left"><b>“Cyber Risk GmbH Training Programs” </b>are training programs developed, updated and provided by Cyber Risk GmbH, and include: <br> a) In-House Instructor-Led Training programs, <br> b) Online Live Training programs, <br> c) Video-Recorded Training programs, <br> d) Distance Learning with Certificate of Completion programs.</p> <br> <p class="text-left"><b>“Cyber Risk GmbH websites” </b>are all websites that belong to Cyber Risk GmbH, and include the following:</p> <br> <p class="text-left"><b>a. Sectors and Industries.</b></p> <p class="text-left">1. <a href="https://www.cyber-risk-gmbh.com/" target="_blank">Cyber Risk GmbH</a></p> <p class="text-left">2. <a href="https://www.social-engineering-training.ch" target="_blank">Social Engineering Training </a></p> <p class="text-left">3. <a href="https://www.healthcare-cybersecurity.ch" target="_blank">Healthcare Cybersecurity</a></p> <p class="text-left">4. <a href="https://www.airline-cybersecurity.ch" target="_blank">Airline Cybersecurity</a></p> <p class="text-left">5. <a href="https://www.railway-cybersecurity.com/" target="_blank"> Railway Cybersecurity</a></p> <p class="text-left">6. <a href="https://www.maritime-cybersecurity.com" target="_blank">Maritime Cybersecurity</a></p> <p class="text-left">7. <a href="https://www.oil-cybersecurity.com" target="_blank">Oil Cybersecurity</a></p> <p class="text-left">8. <a href="https://www.electricity-cybersecurity.com" target="_blank">Electricity Cybersecurity</a></p> <p class="text-left">9. <a href="https://www.gas-cybersecurity.com" target="_blank">Gas Cybersecurity</a></p> <p class="text-left">10. <a href="https://www.hydrogen-cybersecurity.com" target="_blank">Hydrogen Cybersecurity</a></p> <p class="text-left">11. <a href="https://www.transport-cybersecurity.com" target="_blank">Transport Cybersecurity</a></p> <p class="text-left">12. <a href="https://www.transport-cybersecurity-toolkit.com" target="_blank">Transport Cybersecurity Toolkit </a></p> <p class="text-left">13. <a href="https://www.hotel-cybersecurity.ch" target="_blank">Hotel Cybersecurity</a></p> <p class="text-left">14. <a href="https://www.sanctions-risk.com" target="_blank">Sanctions Risk</a></p> <p class="text-left">15. <a href="https://www.american-privacy-rights-act.com" target="_blank">American Privacy Rights Act of 2024 (APRA)</a></p> <p class="text-left">16. <a href="https://www.travel-security.ch" target="_blank">Travel Security</a></p> <br> <p class="text-left"><b>b. Understanding Cybersecurity.</b></p> <p class="text-left">1. <a href="https://www.disinformation.ch" target="_blank">What is Disinformation?</a></p> <p class="text-left">2. <a href="https://www.steganography.ch" target="_blank">What is Steganography?</a></p> <p class="text-left">3. <a href="https://www.cyberbiosecurity.ch" target="_blank">What is Cyberbiosecurity?</a></p> <p class="text-left">4. <a href="https://www.synthetic-identity-fraud.com" target="_blank">What is Synthetic Identity Fraud?</a></p> <p class="text-left">5. <a href="https://www.romance-scams.ch" target="_blank">What is a Romance Scam?</a></p> <p class="text-left">6. <a href="https://www.cyber-espionage.ch" target="_blank">What is Cyber Espionage?</a></p> <p class="text-left">7. <a href="https://www.sexspionage.ch" target="_blank" >What is Sexspionage?</a></p> <p class="text-left">8. <a href="https://www.restrict-act.com" target="_blank">What is the RESTRICT Act?</a></p> <br> <p class="text-left"><b>c. Understanding Cybersecurity in the European Union.</b></p> <p class="text-left">1. <a href="https://www.nis-2-directive.com" target="_blank">The NIS 2 Directive</a></p> <p class="text-left">2. <a href="https://www.digital-operational-resilience-act.com" target="_blank">The Digital Operational Resilience Act (DORA)</a></p> <p class="text-left">3. <a href="https://www.critical-entities-resilience-directive.com" target="_blank">The Critical Entities Resilience Directive (CER)</a></p> <p class="text-left">4. <a href="https://www.eu-data-act.com" target="_blank">The European Data Act </a></p> <p class="text-left">5. <a href="https://www.european-data-governance-act.com" target="_blank">The European Data Governance Act (DGA) </a></p> <p class="text-left">6. <a href="https://www.european-cyber-resilience-act.com" target="_blank">The European Cyber Resilience Act (CRA) </a></p> <p class="text-left">7. <a href="https://www.eu-digital-services-act.com" target="_blank">The Digital Services Act (DSA)</a></p> <p class="text-left">8. <a href="https://www.eu-digital-markets-act.com" target="_blank">The Digital Markets Act (DMA)</a></p> <p class="text-left">9. <a href="https://www.european-chips-act.com" target="_blank">The European Chips Act </a></p> <p class="text-left">10. <a href="https://www.artificial-intelligence-act.com" target="_blank">The Artificial Intelligence Act </a></p> <p class="text-left">11. <a href="https://www.ai-liability-directive.com" target="_blank">The Artificial Intelligence Liability Directive </a></p> <p class="text-left">12. <a href="https://www.faicp-framework.com" target="_blank">The Framework for Artificial Intelligence Cybersecurity Practices (FAICP) </a></p> <p class="text-left">13. <a href="https://www.eu-cyber-solidarity-act.com" target="_blank">The EU Cyber Solidarity Act</a></p> <p class="text-left">14. <a href="https://www.digital-networks-act.com" target="_blank">The Digital Networks Act (DNA)</a></p> <p class="text-left">15. <a href="https://www.european-eprivacy-regulation.com" target="_blank">The European ePrivacy Regulation </a></p> <p class="text-left">16. <a href="https://www.european-digital-identity-regulation.com" target="_blank">The European Digital Identity Regulation </a></p> <p class="text-left">17. <a href="https://www.media-freedom-act.com" target="_blank">The European Media Freedom Act (EMFA) </a></p> <p class="text-left">18. <a href="https://www.corporate-sustainability-due-diligence-directive.com/" target="_blank">The Corporate Sustainability Due Diligence Directive (CSDDD) </a></p> <p class="text-left">19. <a href="https://www.eu-scicf.com" target="_blank">The Systemic Cyber Incident Coordination Framework (EU-SCICF)</a></p> <p class="text-left">20. <a href="https://www.european-health-data-space.com" target="_blank">The European Health Data Space (EHDS)</a></p> <p class="text-left">21. <a href="https://www.european-financial-data-space.com/" target="_blank">The European Financial Data Space (EFDS)</a></p> <p class="text-left">22. <a href="https://www.financial-data-access.com" target="_blank">The Financial Data Access (FiDA) Regulation</a></p> <p class="text-left">23. <a href="https://www.payment-services-directive-3.com" target="_blank">The Payment Services Directive 3 (PSD3), Payment Services Regulation (PSR)</a></p> <p class="text-left">24. <a href="https://www.internal-market-emergency-resilience-act.com" target="_blank">Internal Market Emergency and Resilience Act (IMERA)</a></p> <p class="text-left">25. <a href="https://www.european-cyber-defence-policy.com" target="_blank">The European Cyber Defence Policy</a></p> <p class="text-left">26. <a href="https://www.strategic-compass-european-union.com" target="_blank">The Strategic Compass of the European Union</a></p> <p class="text-left">27. <a href="https://www.european-space-law.com" target="_blank">The European Space Law (EUSL) </a></p> <p class="text-left">28. <a href="https://www.data-privacy-framework.com" target="_blank">The EU-US Data Privacy Framework </a></p> <p class="text-left">29. <a href="https://www.cyber-diplomacy-toolbox.com" target="_blank">The EU Cyber Diplomacy Toolbox </a></p> <br> <br> <p class="text-left"><b>2. Is there any discount available for the distance learning programs?</b></p> <p class="text-left">We do not offer a discount for your first program. You have a $100 discount for your second and each additional program.</p> <p class="text-left">After you purchase the NIS 2 Directive Trained Professional (NIS2DTP) program at $297, you can purchase:</p> <p class="text-left">a. The Artificial Intelligence Act Trained Professional (AIActTPro) program at $197. You can find more about the program at: <a href=" https://www.artificial-intelligence-act.com/Artificial_Intelligence_Act_Trained_Professional_(AIActTPro).html" target="_blank"> https://www.artificial-intelligence-act.com/Artificial_Intelligence_Act_Trained_Professional_(AIActTPro).html </a>. </p> <p class="text-left">b. The Digital Operational Resilience Act Trained Professional (DORATPro) program at $197. You can find more about the program at: <a href="https://www.digital-operational-resilience-act.com/Digital_Operational_Resilience_Act_Trained_Professional_(DORATPro).html" target="_blank">https://www.digital-operational-resilience-act.com/Digital_Operational_Resilience_Act_Trained_Professional_(DORATPro).html </a>. </p> <p class="text-left">c. The Critical Entities Resilience Directive Trained Professional (CERDTPro) program at $197. You can find more about the program at: <a href="https://www.critical-entities-resilience-directive.com/Critical_Entities_Resilience_Directive_Trained_Professional_(CERDTPro).html" target="_blank">https://www.critical-entities-resilience-directive.com/Critical_Entities_Resilience_Directive_Trained_Professional_(CERDTPro).html</a>. </p> <p class="text-left">d. The Digital Services Act Trained Professional (DiSeActTPro) program at $197. You can find more about the program at: <a href="https://www.eu-digital-services-act.com/DiSeActTPro_Training.html" target="_blank">https://www.eu-digital-services-act.com/DiSeActTPro_Training.html</a>. </p> <p class="text-left">e. The Digital Markets Act Trained Professional (DiMaActTPro) program at $197. You can find more about the program at: <a href="https://www.eu-digital-markets-act.com/DiMaActTPro_Training.html" target="_blank">https://www.eu-digital-markets-act.com/DiMaActTPro_Training.html</a>. </p> <p class="text-left">f. The Data Governance Act Trained Professional (DatGovActTP) program at $197. You can find more about the program at: <a href="https://www.european-data-governance-act.com/DatGovActTP_Training.html" target="_blank">https://www.european-data-governance-act.com/DatGovActTP_Training.html</a>. </p> <p class="text-left">g. The European Chips Act Trained Professional (EChipsActTPro) program at $197. You can find more about the program at: <a href="https://www.european-chips-act.com/European_Chips_Act_Trained_Professional_(EChipsActTPro).html" target="_blank">https://www.european-chips-act.com/European_Chips_Act_Trained_Professional_(EChipsActTPro).html </a>. </p> <p class="text-left">h. The Data Act Trained Professional (DataActTPro) program at $197. You can find more about the program at: <a href="https://www.eu-data-act.com/Data_Act_Trained_Professional_(DataActTPro).html" target="_blank">https://www.eu-data-act.com/Data_Act_Trained_Professional_(DataActTPro).html </a>. </p> <p class="text-left">In order to receive the URL for the discounted cost for your second and each additional program, please send us an email with title: “Please send me the URL for the discounted cost.”</p> <p class="text-left">In the email, please let us know: </p> <p class="text-left">a. Which was the name and email address of the person or legal entity that had purchased the first program. </p> <p class="text-left">b. Which is the program you want to purchase now at $197 instead of $297. </p> <p class="text-left">You will receive the URL for the discounted cost for your second and each additional program in less than 48 hours (working days). Please remember to check your spam folder too. </p> <br> <br> <p class="text-left"><b>3. Are there any entry requirements or prerequisites required for enrolling in the training programs? </b></p> <p class="text-left">There are no entry requirements or prerequisites for enrollment. Our programs give the opportunity to individuals of all levels to learn, grow, and develop new skills without the need for prior qualifications or specific experience. </p> <br> <br> <p class="text-left"><b>4. I want to learn more about the exam.</b></p> <p class="text-left">You can take the exam online from your home or office, in all countries. </p> <p class="text-left">It is an open book exam. Risk and compliance management is something you must understand and learn, not memorize. You must acquire knowledge and skills, not commit something to memory.</p> <p class="text-left">You will be given <b>90 minutes</b> to complete a <b>35-question </b>exam. You must score <b>70% or higher.</b> </p> <p class="text-left">The exam contains only questions that have been clearly answered in the official presentations.</p> <p class="text-left">All exam questions are multiple-choice, composed of two parts: </p> <p class="text-left">a. A stem (a question asked, or an incomplete statement to be completed).</p> <p class="text-left">b. Four possible responses.</p> <p class="text-left">In multiple-choice questions, <b>you must not look for a correct answer, you must look for the best answer. </b>Cross out all the answers you know are incorrect, then focus on the remaining ones. Which is the best answer? With this approach, you save time, and you greatly increase the likelihood of selecting the correct answer.</p> <p class="text-left"><b>TIME LIMIT</b> - This exam has a 90-minute time limit. You must complete this exam within this time limit, otherwise the result will be marked as an unsuccessful attempt.</p> <p class="text-left"><b>BACK BUTTON</b> - When taking this exam you are NOT permitted to move backwards to review/change prior answers. Your browser back button will refresh the current page instead of moving backward. </p> <p class="text-left"><b>RESTART/RESUME </b>– You CANNOT stop and then resume the exam. If you stop taking this exam by closing your browser, your answers will be lost, and the result will be marked as an unsuccessful attempt.</p> <p class="text-left"><b>SKIP </b>- You CANNOT skip answering questions while taking this exam. You must answer all the questions in the order the questions are presented.</p> <p class="text-left">When you are ready to take the exam, you must follow the steps described at <b>"Question h. I am ready for the exam. What must I do?",</b> at: </p> <p class="text-left"><a href="https://www.nis-2-directive.com/Distance_Learning_Programs_Exam_Certificate_of_Completion.pdf" target="_blank">https://www.nis-2-directive.com/Distance_Learning_Programs_Exam_Certificate_of_Completion.pdf</a></p> <br> <br> <p class="text-left"><b>5. How comprehensive are the presentations? Are they just bullet points?</b></p> <p class="text-left">The presentations are not bullet points. They are effective and appropriate to study online or offline.</p> <br> <br> <p class="text-left"><b>6. Do I need to buy books to pass the exam?</b></p> <p class="text-left">No. If you study the presentations, you can pass the exam. All the exam questions are clearly answered in the presentations. If you fail the first time, you must study more. Print the presentations and use Post-it to attach notes, to know where to find the answer to a question.</p> <br> <br> <p class="text-left"><b>7. Is it an open book exam? Why?</b></p> <p class="text-left">Yes, it is an open book exam. Risk and compliance management is something you must understand and learn, not memorize. You must acquire knowledge and skills, not commit something to memory.</p> <br> <br> <p class="text-left"><b>8. Do I have to take the exam soon after receiving the presentations?</b></p> <p class="text-left">No. You can take the exam any time. Your account never expires. You have lifetime access to the training program. If there are any updates to the training material and you have not passed the exam, you will receive the updated program free of charge.</p> <br> <br> <p class="text-left"><b>9. Do I have to spend more money in the future to keep my certificate of completion valid?</b></p> <p class="text-left">No. Your certificate of completion will remain valid, without the need to spend money or to take another exam in the future.</p> <br> <br> <p class="text-left"><b>10. Ok, the certificate of completion never expires, but things change.</b></p> <p class="text-left">Recertification would be a great recurring revenue stream for Cyber Risk GmbH, but it would also be a recurring expense for our clients. We resisted the temptation to "introduce multiple recurring revenue streams to keep business flowing", as we were consulted. No recertification is needed for our programs.</p> <p class="text-left">Things change, and this is the reason you need to visit the "Reading Room" of Cyber Risk GmbH every month, and read the monthly newsletter with updates, alerts, and opportunities, to stay current. You may visit: <p class="text-left"><a href="https://www.cyber-risk-gmbh.com/Reading_Room.html" target="_blank">https://www.cyber-risk-gmbh.com/Reading_Room.html</a></p> <br> <br> <p class="text-left"><b>11. Which is your refund policy?</b></p> <p class="text-left">Cyber Risk GmbH has a very clear refund policy: You have the option to ask for a full refund up to 60 days after the payment. If you do not want one of our programs for any reason, all you must do is to send us an email, and we will refund the payment after one business day, no questions asked.</p> <br> <br> <p class="text-left"><b>12. I want to receive a printed certificate. Can you send me one?</b></p> <p class="text-left">Unfortunately this is not possible. You will receive your certificate via email in Adobe Acrobat format (pdf), with a scannable QR code for verification, 7 business days after you pass the exam. A business day refers to any day in which normal business operations are conducted (in our case Monday through Friday), excluding weekends and public holidays. </p> <p class="text-left">Cyber Risk GmbH will develop a dedicated web page for each professional (https://www.cyber-risk-gmbh.com/Your_Name.html). In your dedicated web page we will add your full name, all the certificates you have received from Cyber Risk GmbH, and the pictures of your certificates. </p> <p class="text-left">When third parties scan the QR code on your certificate, they will visit your dedicated web page, and they will be able to verify that you are a certified professional, and your certificates are valid and legitimate. </p> <p class="text-left">Professional certificates are some of the most frequently falsified documents. Employers and third parties need an easy, effective, and efficient way to check the authenticity of each certificate. QR code verification is a good response to this demand. </p> <p class="text-left">You can print your certificate that you will receive in Adobe Acrobat format. With the scannable QR code, all third parties can verify the authenticity of each certificate in a matter of seconds. </p> <br> <br> <p class="text-left"><b>13. Why should I choose your training programs?</b></p> <p class="text-left"><b>I. </b>There are many new Directives and Regulations in the EU, and our target audience is overwhelmed and has little time to spare. Cyber Risk GmbH has developed training programs that can assist them in understanding the new requirements, and in providing evidence that they are qualified, as they must pass an exam to receive their certificate of completion. </p> <p class="text-left"><b>II. </b>Our training programs are flexible and convenient. Learners can access the course material and take the exam at any time and from any location. This is especially important for those with busy schedules.</p> <p class="text-left"><b>III. </b>The all-inclusive cost of our programs is very low. There is no additional cost for each program, now or in the future, for any reason.</p> <p class="text-left"><b>IV. </b>If you purchase a second program, you have a $100 discount. The all-inclusive cost for your second (and each additional) program is $197.</p> <p class="text-left"><b>V. </b>There are 3 exam attempts per year that are included in the cost of each program, so you do not have to spend money again if you fail.</p> <p class="text-left"><b>VI. </b>No recertification is required. Your certificates of completion never expire.</p> <p class="text-left"><b>VII. </b> If you purchase the NIS2DTP program now, you can receive all the updated and amended NIS2DTP programs <b> at no cost </b> until January 31, 2028. </p> <p class="text-left">Every time we have important developments that affect regulatory compliance with the NIS 2 Directive (NIS2), we will update and amend this training program, especially when we have important: </p> <p class="text-left">- <b>Joint final draft technical standards, </b> from the European Supervisory Authorities (ESAs) – the European Banking Authority (EBA), the European Insurance and Occupational Pensions Authority (EIOPA), the European Securities and Markets Authority (ESMA). <p class="text-left">- <b>Regulatory Technical Standards (RTS), </b> <p class="text-left"> - <b>Implementing Technical Standards (ITS), </b> <p class="text-left"> - <b> Delegated Acts, </b>that supplement or amend non‑essential parts of EU legislative acts, and </p> <p class="text-left"> - <b> Implementing Acts, </b>that ensure that EU laws are applied uniformly. </p> <p class="text-left"><b>VIII. </b>The marketplace is clearly demanding qualified professionals in risk and compliance management. Certified professionals enjoy industry recognition and have more and better job opportunities.</p> <p class="text-left"><b>IX. </b>Firms and organizations hire and promote fit and proper professionals who can provide evidence that they are qualified. Employers need assurance that managers and employees have the knowledge and skills needed to mitigate risks and accept responsibility. Supervisors and auditors ask for <b>independent evidence </b>that the process owners are qualified, and that the controls can operate as designed, because the persons responsible for these controls have the necessary knowledge and experience.</p> <p class="text-left"><b>X. </b>Professionals that gain more skills and qualifications often become eligible for higher-paying roles. Investing in training can have a direct positive impact on a manager's or employee's earning potential.</p> <hr> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cyber Risk GmbH, some of our clients</h3> <br> <div class="logos"> <div class="logos-slide"> <img src="Logos/XMA8.png" alt="" > <img src="Logos/SYGNIA5.jpg" alt="" > <img src="Logos/DELL3.jpg" alt="" > <img src="Logos/VW.jpg" alt="" > <img src="Logos/Bosch9.png" alt="" > <img src="Logos/Swisslife3.JPG" alt="" > <img src="Logos/ATLAS8.png" alt="" > <img src="Logos/INSIG8.png" alt="" > <img src="Logos/SANT8.png" alt="" > <img src="Logos/NTT38.png" alt="" > <img src="Logos/EIB15.PNG" alt="" > <img src="Logos/SC8.JPG" alt="" > <img src="Logos/schindler.jpg" alt="" > <img src="Logos/AO9.png" alt="" > <img src="Logos/GS300.JPG" alt="" > <img src="Logos/DB8.png" alt="" > <img src="Logos/TM8.png" alt="" > <img src="Logos/OK8.png" alt="" > <img src="Logos/PWC5.JPG" alt="" > <img src="Logos/Fujitsu.png" alt="" > <img src="Logos/HO5.JPG" alt="" > <img src="Logos/FIN22.png" alt="" > <img src="Logos/SAN8.png" alt="" > <img src="Logos/BAH9.png" alt="" > <img src="Logos/AT32.png" alt="" > <img src="Logos/WINS25.png" alt="" > <img src="Logos/SKY12.png" alt="" > <img src="Logos/RB78.png" alt="" > <img src="Logos/WU8.png" alt="" > <img src="Logos/TDC.JPG" alt="" > <img src="Logos/BH18.png" alt="" > <img src="Logos/DeepSec_Conference7.png" alt="" > <img src="Logos/DC12.png" alt="" > <img src="Logos/BROAD8.png" alt="" > <img src="Logos/LEMON8.PNG" alt="" > <img src="Logos/SIK8.PNG" alt="" > <img src="Logos/KUMO8.PNG" alt="" > <img src="Logos/VEST8.PNG" alt="" > <img src="Logos/MOXA8.PNG" alt="" > <img src="Logos/TIET8.PNG" alt="" > <img src="Logos/UNI8.PNG" alt="" > <img src="Logos/BCC11.PNG" alt="" > <img src="Logos/SN8.PNG" alt="" > <img src="Logos/KYN8.PNG" alt="" > <img src="Logos/PG8.PNG" alt="" > <img src="Logos/MER8.PNG" alt="" > <img src="Logos/LIB8.PNG" alt="" > <img src="Logos/ALI8.PNG" alt="" > <img src="Logos/USA8.PNG" alt="" > <img src="Logos/MAR8.PNG" alt="" > <img src="Logos/ABB8.PNG" alt="" > </div> </div> <script> var copy = document.querySelector(".logos-slide").cloneNode(true); document.querySelector(".logos").appendChild(copy); </script> </div> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> </div> </div> </div> </div> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10