Tic Tac Cybersecurity Services For NIS2 Compliance
Tic Tac Cybersecurity Services For NIS2 Compliance
1
common level of cybersecurity across the
European Union.
1 Introduction
NIS2 will further enhance the
work started in the NIS Directive
It places obligations on Member
States AND individual companies in
in building a high common level of critical sectors.
cybersecurity across the European
Union.
New in NIS2
✔ More Sectors
✔ More entities
✔ Extra requirements
2
“Important” depending on factors such as
size, sector and criticality.
www.ncsc.gov.ie
2 Essential and Important Entities
SECTOR SUB-SECTOR LARGE
ENTITIES
MEDIUM
ENTITIES
SMALL &
MICRO
ENTITIES
(>= 250 employees (50-249 employees
or more than 50 or more than
million revenue) 10million revenue)
TRANSPORT Air (commercial carriers; airports; Air traffic control [ATC]); rail (infra and undertakings); water (transport companies; ports; Vessel traffic services [VTS]); road (ITS) ESSENTIAL IMPORTANT NOT IN SCOPE
Special case: public transport: only if identified as CER (see notes on page 2) ESSENTIAL IMPORTANT NOT IN SCOPE
BANKING Credit institutions (attention: DORA lex specialis – see note on page 2) ESSENTIAL IMPORTANT NOT IN SCOPE
FINANCIAL MARKET Trading venues, central counterparties (attention: DORA lex specialis – see note on page 2) ESSENTIAL IMPORTANT NOT IN SCOPE
INFRASTRUCTURE
HEALTH Healthcare providers; EU reference laboratories; R&D of medicinal products; manufacturing basic pharma products and preparations; manufacturing of medical ESSENTIAL IMPORTANT NOT IN SCOPE
Special case: entities holding a distribution authorization for medicinal products: only if identified as CER (see note on page 2) ESSENTIAL IMPORTANT NOT IN SCOPE
WASTE WATER (only if it is an essential part of their general activity) ESSENTIAL IMPORTANT NOT IN SCOPE
DNS service providers (excluding root name servers) ESSENTIAL ESSENTIAL ESSENTIAL
ICT-SERVICE Managed service providers, managed security service providers ESSENTIAL IMPORTANT NOT IN SCOPE
MANAGEMENT (B2B)
PUBLIC Of central governments (excluding judiciary, parliaments, central banks; defence, national or public security). ESSENTIAL ESSENTIAL ESSENTIAL
ADMINISTRATION
ENTITIES Of regional governments: risk based.(Optional for Member States: of local governments) IMPORTANT IMPORTANT IMPORTANT
SPACE Operators of ground-based infrastructure (by Member State) ESSENTIAL IMPORTANT NOT IN SCOPE
SECTOR SUB-SECTOR LARGE MEDIUM SMALL &
ENTITIES ENTITIES MICRO
ENTITIES
(>= 250 (50-249
employees or employees or
more than 50 more than 10
million revenue) million revenue)
distribution
education institutions)
(Optional for Member States:
education institutions)
Notes:
Entities designated as Critical entities under Directive (EU) There are certain exceptions to the above guide, please consult
2022/2557, (CER Directive) shall be considered Essential the text of the Directive for a full and comprehensive list of all
entities under NIS2. exceptions.
Lex Specialis may apply where sectoral regulations are at
least equivalent.
Sectors in scope
3
of entities than currently covered by the NIS
Directive
www.ncsc.gov.ie
3 Sectors in scope
NIS2 will apply to a wider and deeper pool of entities than currently covered
by the NIS Directive. NIS2 includes new sectors whilst broadening the criteria
for inclusion of entities, categorized as essential or important, within existing
sectors. The sectors are divided into two groups: “Sectors of High Criticality”
and “Other Critical Sectors”.
Annex 1 -
Sectors of High
Criticality HEALTH ENERGY TRANSPORT
DIGITAL
INFRASTRUCTURES
(INCLUDING ISP
DRINKING AND CLOUD)
WATER
WASTE
WATER SPACE BANKING
NEW DORA
FINANCIAL Digital Operations
MARKET
INFRASTRUCTURE Resilience Act
ICT SERVICE
PUBLIC MANAGEMENT
ADMIN (B2B)
Annex 2 -
Other Critical FOOD
Sectors DIGITAL
PROVIDERS RESEARCH
PRODUCTION &
DISTRIBUTION
POSTAL &
COURIER WASTE MANUFACTURING
MANAGEMENT
SERVICES
MANUFACTURE
PRODUCTION AND NEW
DISTRIBUTION OF
CHEMICALS
Incident Notification
4
4 Incident Notification
NIS2 imposes notification obligations in phases, for incidents which have
a ‘significant impact’ on the provision of their services. These notifications
must be made to the relevant competent authority or CSIRT (Computer
Security Incident Response Team).
EARLY WARNING
Is it a suspected malicious act with potential cross-border impacts?
FINAL REPORT
Or if incident ongoing at time of final report a progress report
and final report 1 month after end
Where appropriate, entities shall notify the recipients of their services of significant incidents.
When in the public interest, the CSIRT or relevant competent authority may inform the public about the
significant incident or may require the entity to do so.
Cyber Security Risk Management Measures
5
manage the risks posed to the systems
www.ncsc.gov.ie
5 Cyber Security Risk Management Measures
Essential and Important entities must take appropriate and
proportional technical, operational and organizational measures to
manage the risks posed to the systems which underpin their services,
and prevent or minimize the impact of incidents on their and other
services.
Such measures shall be based on an all-hazards approach that aims to protect the network and
information systems and the physical environment of those systems from incidents, and must
include at least the following:
2 Incident handling
6
original NIS Directive is replaced by a
distinction between “essential” and
“important” entities
6 Essential and Important Entities - Supervision
The former distinction between “operators of essential services” (OES)
and “digital service providers” (DSP) in the original NIS Directive is
replaced by a distinction between “essential” and “important” entities.
On-site inspections and off-site supervision On-site and off-site inspections after incident
7
7 Enforcement and Penalties
NIS2 provides national authorities with a minimum list of
enforcement powers for non-compliance, including:
E Order to inform the natural or legal person(s) to whom they provide services or activities which
are potentially affected by a significant cyber threat
G Designate a monitoring officer with well-defined tasks over a determined period of time to
oversee the compliance
K And those responsible for discharging managerial responsibilities at chief executive officer or
legal representative level can be temporarily prohibited from exercising managerial functions
(applicable to essential entities only, not important entities).
8
essential and important entities
8 Management Responsibilities
Senior management have ultimate responsibility for cybersecurity
risk management in essential and important entities. Failure by
management to comply with NIS2 requirements could result in
serious consequences,
including liability, temporary bans and administrative fines as provided
for inthe implementation of national legislation.
Management bodies of
essentialand important entities
must:
9
9 Tic Tac Cybersecurity and NIS2
Tic Tac Cybersecurity has created a services portfolio targeted
specifically for NIS2 compliance. With the use of advanced tools and
reports, Tic Tac Cybersecurity elevates your security posture and
attains high levels Compliance with NIS2.
Enhance accessibility
Leverage automation
Automatic backups and disaster recovery ensure that critical data can
be recovered quickly. This minimizes downtime and keeps your
business running without any interruption. Additionally, we relieve the
burden of managing your backups and disaster recovery protocols to
give you better reliability, reduced risk and more time to focus on your
business.
We’re proud to say that our data centers meet the most rigorous
security and regulatory compliance requirements, including
SOX, PCI, CIPA, HIPAA, and others.
Cloud backups cost a lot less than managing your own backup as they
are fully automated. No need to waste time and resources making discs
or updating drives to keep off-site.
• You’re in Control
You can set the frequency of backups to suit your requirements, from
‘constant’ to ‘daily’. Email notification follows every backup, keeping
you in the loop and giving you complete control of the process.
A business is responsible for its own cyber security, but in the event of
a cyber-attack, having the right insurance will mean you aren’t alone.
Cyber cover can provide crucial support to help your business stay
afloat.
For the business involved, the first-party cover includes the cost of:
• Investigating a cybercrime
• Recovering data lost in a security breach
• The restoration of computer systems
• Reputation management
• Extortion payments demanded by hackers
• Notification costs, in the case you are required to notify third parties
affected.
Some of our cyber insurance policies also offer support with income
loss if your business needs to close temporarily because of a cyber-
attack.
F. Cyber Awareness Training by Tic Tac Cybersecurity
Old-school awareness training does not hack it anymore. Your email filters have an average
7-10% failure rate; you need a strong human firewall as your last line of defense.
• Send fully automated simulated phishing attacks, using numerous customizable templates
with unlimited usage
• Train your users with access to always-fresh awareness training content
• AI-Driven phishing recommendations based on your users' phishing and training history
• Use Assessments to gauge proficiency of your users in security knowledge
• Easy user management using Active Directory Integration
Contact Us
Tic Tac Cybersecurity
9, Tripoleos Street, 17237, Imittos, Athens, Greece
info@tictac.gr
www.tictaclabs.com | www.tictac.gr