NIS2 Presentation
NIS2 Presentation
NETWORK
AND
INFORMATIO
N SECURITY
DIRECTIVE
June 4th 2024
AGENDA
2
Introducing NIS2
Also Town Hall
June 4th, 2024
• Conclusions
Microsoft Confidential
We live in the most complex threat landscape in history
250
$17.8T
30B $8T
$4.4T $4.2T new regulatory
3B updates tracked
every day
2022 2023 USA China Cybercrime Germany Japan
18
______
180K
NIS2 is the new European It is the most comprehensive Its purpose is to establish a
cybersecurity directive that will EU cybersecurity legislation to baseline of security measures
replace the existing NIS Directive date, covering 18 sectors and for digital service providers and
as from October 2024. over 180K+ companies. operators of essential services, to
mitigate the risk of cyber attacks
and to improve the overall level
of cybersecurity in the EU.
Member States have until October 17, 2024 to transpose the Directive
into national law. This means that each organization encompassed by
the Directive will be legally obligated to live up to its requirements by
Q4 2024.
Microsoft Confidential
Why is NIS1 expanding to NIS2?
Microsoft Confidential
NIS2 vs. NIS1
Microsoft Confidential
GDPR vs NIS2 | The Differences
Microsoft Confidential
NIS2 affects various sectors, including…
On September 14, the European Commission published new guidelines explaining which sectors will be considered critical and
what they should report to national authorities in the EU under the NIS2 directive.
Microsoft Confidential
Entity Categories vs Penalties
Essential Entity Important Entity
Large companies are part of the sectors Medium-sized enterprises operating in the sectors
of high criticality listed in Annex I of of high criticality of Annex I of the Directive,
the Directive.
---
Large or medium-sized enterprises that do not fall
A large entity is defined as a company with at least
into the essential entity category
250 employees
A medium-sized enterprise is defined as one with at least 50
employees
NIS2 Objectives
Minimizing The
Protecting
Impacts of Cyber
Against Cyber
Security
Attacks
Incidents
Microsoft Confidential
What does NIS2 mean for organizations?
Incident
handling Business Report incidents with significant* impact on the provision
Risk Security (prevention, continuity and of services
Management Policies detection & crisis
response to management
incidents) Within 24 hours Within 72 hours Within 1 month
an extensive a final report
report progress report
Supply chain Vulnerability Regular assessments to determine
security handling and the effectiveness of cybersecurity
consider disclosures risk management measures (e.g.,
supplier reflection of state of art – security *=An incident is significant if it has caused or is capable of causing severe
vulnerabilities posture) operational disruption of the services or financial loss for the entity
concerned or if it has affected or is capable of affecting other natural or
legal persons by causing considerable material or non-material damage
The use of
The use of
cryptography Basic
MFA or
and cybersecurity Computer
continuous Competent Recipients of
encryption hygiene & Security Incident
authentication Authority services
where training Response Team
warrante (CSIRT)
NIS 2.0 Top 10 Measures
A. Policies on risk analysis and information system security
B. Incident handling
C. Business continuity, such as backup management and disaster recovery, and crisis management
D. Supply chain security, including security-related aspects concerning the relationships between each entity
and its direct suppliers or service providers
E. Security in network and information systems acquisition, development and maintenance, including
vulnerability handling and disclosure
F. Policies and procedures to assess the effectiveness of cybersecurity risk-management measures
G. Basic cyber hygiene practices and cybersecurity training
H. Policies and procedures regarding the use of cryptography and, where appropriate, encryption
I. Human resources security, access control policies and asset management
J. The use of multi-factor authentication or continuous authentication solutions, secured voice, video and
text communications and secured emergency communication systems within the entity, where appropriate.
Microsoft Confidential
NIS2 COMPLIANCE
IS A ZERO TRUST
JOURNEY
Microsoft Confidential
Mapping NIS 2.0 Duties to the Zero
Trust Framework
Verify explicitly | Use least-privileged access | Assume breach
Governance
A&G
C&H Data
I&J
Identities
Zero Trust G, H & J Apps
policy
J
H&I D&H Infrastructure
Devices
E Network
SIEM
B, E, F & G
NIS2 Measures matched with Microsoft Products
Common best practices that we preach since years…
D Supply Chain Security Entra ID, Service Trust Portal, Granular Delegated Admin Priveleges
E Network Security Cloud Security Posture Management (CSPM), Defender Vulnerability Management (DVM),
Defender for IOT/OT
F Cybersecurity Effectiveness Assessment Microsoft Defender Secure Score, Cloud Secure Score, Purview Compliance Manager
G Cybersecurity Training & Practices Microsoft 365 Learn, Defender for Office 365 (attack simulation training), Defender Threat
Intelligence
H Encryption and Cryptography Microsoft Purview Information Protection, Purview Data Lifecycle Management
I Asset Management Microsoft Entra Lifecycle Management, Microsoft Entra Access Reviews, Privileged Identity
Management (PIM)
J Multi-factor Authentication Microsoft Entra Conditional Access, Microsoft Entra Risk Based Conditional Access,
https://www.itgovernance.co.uk/nis-regulations-cyber-assessment-framework
LET’S GO INTO SOME
EXAMPLES…
Microsoft Confidential
NIS2 COMPLIANCE IS A ZERO TRUST JOURNEY
Encryption is an important part of your file protection and information protection strategy. Encryption by itself doesn't
prevent content interception. Encryption is part of a larger information protection strategy for your organization. By
using encryption, you help ensure that only authorized parties can use the encrypted data.
Incident handling
Security incident handling is the process of identifying,
managing, recording and analyzing security threats or
incidents in real-time. It seeks to give a robust and
comprehensive view of any security issues within an IT
infrastructure.
Incident handling
Security CoPilot
Microsoft Security Copilot is an AI-powered security
analysis tool that enables analysts to respond to threats
quickly, process signals at machine speed, and assess risk
exposure in minutes.
Microsoft Confidential
Thanks
Microsoft Confidential
Appendix
Microsoft Confidential
Affected sectors full overview
Affected sectors full overview
Affected sectors full overview
Affected sectors full overview
A NIS 2 COMPLIANCE IS A ZERO TRUST JOURNEY
Explanation
Effective security policies must be implemented consistently across the organization to protect information systems
and customers. Security policies must also account for variations in business functions and information systems to be
universally applicable.
Incident handling
Security incident handling is the process of identifying,
managing, recording and analyzing security threats or
incidents in real-time. It seeks to give a robust and
comprehensive view of any security issues within an IT
infrastructure.
Incident handling
Security incident handling is the process of identifying,
managing, recording and analyzing security threats or
incidents in real-time. Leveraging AI solutions will enable
organizations to shorten time needed to analyze data and
logs as well as stop attacks based on ML patterns.
Security CoPilot
Microsoft Security Copilot is an AI-powered security analysis
tool that enables analysts to respond to threats quickly,
process signals at machine speed, and assess risk exposure in
minutes.
More information on
Microsoft 365 Backup & Archive
Microsoft 365 Backup Archive
C NIS 2 COMPLIANCE IS A ZERO TRUST JOURNEY
DAP vs GDAP
DAP (Delegated Admin Privileges) is the old way of granting
partners access to customers’ tenants, which gives them too
much power (Global Admin) and poses security risks.
The new GDAP (Granular Delegated Admin Privileges) grants
partners access to customers’ tenants but only to the
necessary roles and use permissions for a limited time.
Customers should check if their partner tenant has access to
their tenant leveraging GDAP instead of DAP to ensure that
they have more control and visibility over their data and
resources, and that they comply with the latest security best
practices.
Compliance manager
Compliance score measures progress towards completing
recommended actions that help reduce risks around data
protection and regulatory standards.
Protection
Purview Information Protection
H NIS 2 COMPLIANCE IS A ZERO TRUST JOURNEY
ENCRYPTION SETTINGS IN A MICROSOFT AZURE STORAGE ACCOUNT ENFORCING HARDDISK DRIVE ENCRYPTION THROUGH DEVICE POLICIES
H NIS 2 COMPLIANCE IS A ZERO TRUST JOURNEY
MICROSOFT AZURE KEY VAULT FOR MANAGED HMS DATA ENCRYPTION AT REST
Human resources security, access control policies and asset management (1)
Microsoft Entra ID Governance allows you to balance your
organization's need for security and employee productivity
with the right processes and visibility. It provides you with
capabilities to ensure that the right people have the right
access to the right resources.
Human resources security, access control policies and asset management (2)
With the new Entra ID Governance features
organizations have more control over standard
procedures as well as timed access reviews.
Human resources security, access control policies and asset management (2)
With the new Entra ID (Azure Active Directory) Governance features
organizations have more control over standard procedures as well
as timed access reviews.
Teams Premium
Microsoft Teams Premium is an enhanced version of
the popular collaboration platform, Microsoft Teams.
It offers advanced communication tools, improved
security, seamless integration with Microsoft 365
apps, increased storage, and priority support.
Customers should use it for boosted productivity,
enhanced security, and tailored collaboration
solutions to fit their specific needs.
Ella Gud
Global Partner Manager
ellag@qssolutions.nl
linkedin.com/in/ella-gud/
CYBERSECURITY ASSESSMENTS
WITH CSAT
Holistic view of the cybersecurity position together with fact-based
recommendations based on an internationally recognized cybersecurity framework.
CSAT collects and analyzes data from the hybrid IT environment in a short period of
time to provides data-driven recommendations.
Company score based on Mapping to NIS 2.0 Migration plans to improve Copilot Readiness
CIS controls v8 European guidelines cybersecurity based on
Zero Trust Architecture
Urgent Action Items and Risk-based action plan Total Cost of Ownership for Security Reports for both
Quick Wins with improvement actions IT and Business Management
CISV8 MATURITY SCORES BACKED
UP BY UNDISPUTABLE DATA
VALUE FOR YOU
Smart and justified investments in Alignment in between IT/Security Full awareness of current security
security which are focused on exact and Business Managements status and control over the weak
weaknesses of the organization and areas
potential threats
Proof of the security progress and
Saves time, effort and budget by work towards compliance Become Cyber resilient while
focusing on what is urgent and saving cost
relevant
IT’S TIME TO PREPARE
2.
The measures referred to in paragraph 1 shall be based on an all-hazards approach that aims to protect network and information systems and the physical
environment of those systems from incidents, and shall include at least the following:
(b)incident handling;
(c)business continuity, such as backup management and disaster recovery, and crisis management;
(d)supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service
providers;
(e)security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure;
(h)policies and procedures regarding the use of cryptography and, where appropriate, encryption;
(j)the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured
emergency communication systems within the entity, where appropriate.
DATA COLLECTION
Workstations and
Servers
Azure
Local Active Directory
Microsoft 365
Data Analysis
SharePoint
on-premises
Questionnaire
Email DNS
Recommendations
https://cloud.also.mp/also-security-assessment-
customer/
16
ALSO QS CSAT OFFER
• CSAT Full Scan is free of charge for all end customers approved by central team – please leave data so we can get in contact
• Cybersecurity consulting
17
LETS CONNECT
• Please take a survey and leave your contact data so we can get in contact to provide you all the
details on offers and proposed next steps:
• To have more secure company environment and get actionable insights on secure score
• NIS2 compliant support using CSAT
https://forms.office.com/e/BNdzRZnGn2
18
THANK YOU