<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-au/blog/authors/patrick-kaak/rss" /><link>https://www.ivanti.com/en-au/blog/authors/patrick-kaak</link><item><guid isPermaLink="false">50a3a2b2-3514-408b-94de-4bce208c27ad</guid><link>https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time</title><description>&lt;p&gt;In a previous blog post, I discussed the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time"&gt;two main areas to audit&lt;/a&gt;&amp;nbsp;before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would:&lt;/p&gt;

&lt;p&gt;Identify your gaps with the NIS2 directive’s requirements now.&lt;/p&gt;

&lt;p&gt;Review your current supply chain security flaws.&lt;/p&gt;

&lt;p&gt;Now that we’ve discovered these security flaws, we must fix them —&amp;nbsp;before&amp;nbsp;time runs out in October 2024.&lt;/p&gt;

&lt;p&gt;So, in this post, I’ll walk you through how to resolve your weakest security issues before the NIS2 Directive deadline hits by addressing these three key areas:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Inform&amp;nbsp;management about your cybersecurity gaps&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Correctly implementing new organisation and technical security measures&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Find time to train all of your employees&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;1. Inform management about your gaps – and get budget to remediate them&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3312-80-1" rel="noopener" target="_blank"&gt;imposes significant obligations&lt;/a&gt;&amp;nbsp;on organisations that fall under its scope, which may entail substantial costs and resources.&amp;nbsp;The Directive also introduces hefty fines and sanctions for non-compliance, up to a maximum of €10 million or 2% of an organisation's global annual revenue&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e4350-80-1" rel="noopener" target="_blank"&gt;Article 34&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;On top of this,&amp;nbsp;the new directive can extend liability&amp;nbsp;from entities to their individual representatives in certain situations. Moreover, when certain conditions are met, persons in management positions could be temporarily suspended (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3949-80-1" rel="noopener" target="_blank"&gt;Article 32-5b&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Therefore, following the NIS2 Directive is&amp;nbsp;a &lt;strong&gt;legal necessity&lt;/strong&gt;&amp;nbsp;and&amp;nbsp;a &lt;strong&gt;strategic priority&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To be in compliance, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Inform your management&amp;nbsp;&lt;/strong&gt;about its implications and benefits and convince them to allocate sufficient budget and resources for implementing compliance.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Present a clear business case&lt;/strong&gt;&amp;nbsp;that outlines the risks of non-compliance, the opportunities of compliance and the return on investment.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Demonstrate how compliance&lt;/strong&gt; will enhance&amp;nbsp;your organisation's reputation, trustworthiness, competitiveness and resilience.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Informing management and getting a budget is a challenging task, requiring a persuasive and evidence-based argument that showcases the value of cybersecurity for your organisation.&lt;/p&gt;

&lt;p&gt;The sooner you start this process, the more time you’ll have to secure buy-in and support from management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible business case benefits for NIS2 compliance&lt;/h3&gt;

&lt;p&gt;Some possible benefits that you can highlight in your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&amp;nbsp;&lt;/strong&gt;by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Innovating&lt;/strong&gt;&amp;nbsp;by adopting new technologies, developing new products or services, creating new markets and more.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Following other cybersecurity regulations or standards&amp;nbsp;beyond NIS2&lt;/strong&gt;&amp;nbsp;– such as&amp;nbsp;&lt;a href="https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en" rel="noopener" target="_blank"&gt;GDPR&lt;/a&gt;,&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO 27001&lt;/a&gt;,&amp;nbsp;&lt;a href="https://listings.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf" rel="noopener" target="_blank"&gt;PCI DSS&lt;/a&gt;&amp;nbsp;and others&amp;nbsp;&amp;nbsp;– since global frameworks often have a high overlap with the compliance requirements of NIS2.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential information sources for justifying your NIS2 compliance business case&lt;/h3&gt;

&lt;p&gt;Some sources you can use to support your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Statistics or facts&lt;/strong&gt;&amp;nbsp;showing the prevalence, impact or cost of cyberattacks in your sector or region.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Case studies or examples&lt;/strong&gt;&amp;nbsp;illustrating how other organisations have benefited from complying with the NIS2 Directive or similar regulations. For example, the&amp;nbsp;Enisa NIS Investments 2022 report&amp;nbsp;shows that for 62% of the organisations implementing the older NIS directive, such implementations helped them detect security incidents; for 21%, implementations helped during security incident recovery.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Testimonials or feedback&lt;/strong&gt;&amp;nbsp;from customers, partners, regulators or experts who endorse or recommend complying with the NIS2 Directive or similar regulations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Benchmarks or indicators&lt;/strong&gt;&amp;nbsp;revealing your current or projected cybersecurity performance or progress in relation to the NIS2 Directive or your competitors.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/resources/v/doc/ivi/2702/fa749d5d96a9"&gt;Ivanti’s 2023 Cyberstrategy Tool Kit for Internal Buy-In&lt;/a&gt;&amp;nbsp;is also a great resource that explains time-to-functionality and cost, how a solution helps defend against certain types of cyberattacks, and how to react to and overcome common objections.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;General business benefits of NIS2 Directive compliance&lt;/h3&gt;

&lt;p&gt;Some of the benefits of complying with the NIS2 Directive include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&lt;/strong&gt; by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits, et cetera. &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;According to a report by IBM&lt;/a&gt;, the average cost of a data breach in 2022 was US$4.82 million for critical infrastructure organisations and the average time to identify and contain a breach was 277 days. If you are taking measures to comply with the NIS2 Directive, the average time spent identifying and containing a breach will be much shorter, and costs of the attack will be lower.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality and similar factors. According to&amp;nbsp;&lt;a href="https://www.fisglobal.com/-/media/fisglobal/worldpay/docs/insights/consumer-intelligence-series-protectme.pdf" rel="noopener" target="_blank"&gt;a survey by PwC&lt;/a&gt;, 87% of consumers say they will take their business elsewhere if they don't trust a company's data practices, and 71% of consumers say they would stop using a company's products or services if they found out it was sharing their data without their permission, which could happen with a data leak.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors and so on.&amp;nbsp;&lt;a href="https://www.accenture.com/us-en/insights/security/state-cybersecurity" rel="noopener" target="_blank"&gt;Accenture&lt;/a&gt; has found that&amp;nbsp;companies that adopt advanced security technologies can reduce the cost of cybercrime by up to 48%.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Complying with other regulations or standards&lt;/strong&gt;&amp;nbsp;that require cybersecurity, such as GDPR, ISO 27001, PCI DSS or others.&amp;nbsp;&lt;a href="https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf" rel="noopener" target="_blank"&gt;Cisco&lt;/a&gt;&amp;nbsp;points out that 97% of organisations that follow GDPR see benefits such as gaining competitive advantage, achieving operational efficiency and reducing sales delays.&amp;nbsp;Similar results are probably achievable by following NIS2.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When it comes to budgeting,&amp;nbsp;the proposal for a directive by the European Commission&amp;nbsp;(&lt;a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12475-Cybersecurity-review-of-EU-rules-on-the-security-of-network-and-information-systems_en" rel="noopener" target="_blank"&gt;Anex 7 - 1.4.3&lt;/a&gt;)&amp;nbsp;mentions that for&amp;nbsp;companies&amp;nbsp;falling under the scope of the NIS2 framework, it’s estimated they would need an increase of a maximum 22% of their current ICT security spending for the first years following the introduction of the NIS2 framework.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, the proposal also mentions that this average increase of ICT security spending would lead to&amp;nbsp;a &lt;strong&gt;proportionate benefit&amp;nbsp;&lt;/strong&gt;from such investments, notably due to a considerable reduction in cost of cybersecurity incidents.&lt;/p&gt;

&lt;h2 id="two"&gt;2. Correctly implement new organisational and technical security measures&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;After researching the gaps and obtaining a budget, it’s time to close those gaps. The NIS2 Directive requires companies to implement appropriate organisational and technical measures to manage their cybersecurity risks and ensure a high level of security across their networks and information systems.&lt;/p&gt;

&lt;p&gt;These measures include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Adopting policies and procedures&lt;/strong&gt;&amp;nbsp;for risk management, incident response, business continuity, data protection, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establishing roles and responsibilities&lt;/strong&gt;&amp;nbsp;for cybersecurity governance, oversight, coordination and other areas.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Providing training and awareness programs&lt;/strong&gt; for staff, management, customers, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing basic cyber hygiene&lt;/strong&gt;&amp;nbsp;such as encryption, authentication (MFA), firewalls, antivirus software, patching, zero trust access and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting&lt;/strong&gt;&amp;nbsp;regular testing, monitoring, auditing and other measures.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Implementing those organisational and technical measures isn't a one-off or static task. It requires&amp;nbsp;&lt;strong&gt;establishing a continuous and dynamic process&lt;/strong&gt;&amp;nbsp;that adapts to changing threats, technologies, regulations and business needs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, the same advice applies for this process as for the other points we’ve already covered: the sooner you start, the more time you'll have to implement the necessary measures and ensure their effectiveness and efficiency.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;I would advise starting implementation&amp;nbsp;at least&amp;nbsp;in January 2024, so you’re ready before the summer holidays.&lt;/p&gt;

&lt;h3&gt;Next steps for NIS2 Directive implementations&lt;/h3&gt;

&lt;p&gt;Some possible steps that you can take to implement organisational and technical measures are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Developing and implementing&lt;/strong&gt; &lt;strong&gt;a risk-based management process&lt;/strong&gt;&amp;nbsp;that defines your objectives, scope, roles, responsibilities, resources, timelines and metrics for managing your cybersecurity risks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a security policy&lt;/strong&gt;&amp;nbsp;that establishes your principles, guidelines, standards and procedures for ensuring the security of your network and information systems.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting risk assessments&lt;/strong&gt; to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks; and prioritising your actions based on your risk appetite and tolerance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing security controls&lt;/strong&gt;&amp;nbsp;that protect your network and information systems from unauthorised access, use, disclosure, modification or destruction. These controls can be classified into three categories: preventive (e.g., encryption); detective, detective&amp;nbsp;&amp;nbsp;(e.g., monitoring), and corrective (e.g., backup).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing an incident response&lt;/strong&gt; &lt;strong&gt;plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for responding to cyberincidents effectively and efficiently.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a business continuity plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for maintaining or restoring your critical business processes during a cyber-related disruption or disaster.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a review and improvement plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for regularly evaluating, reporting and enhancing your cybersecurity measures.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing the technical controls&lt;/strong&gt; for asset management and &lt;strong&gt;basic cyber hygiene&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Directive’s reference to ‘basic cyberhygiene’ is a bit vague in&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt;, so we’ll dive into this in another blog post. For now, think about basic security measures such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;MFA.&lt;/li&gt;
	&lt;li&gt;Patching your OS and applications as quickly as possible.&lt;/li&gt;
	&lt;li&gt;Securing network connections on public networks.&lt;/li&gt;
	&lt;li&gt;Encryption of all drives (especially removable ones.)&lt;/li&gt;
	&lt;li&gt;Privilege management and education of all employees.&lt;/li&gt;
	&lt;li&gt;Subscribing to channels that give you information about the latest patches and priorities, like&amp;nbsp;Ivanti’s Patch Tuesday webinars.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="three"&gt;3. Fix the weakest link: find time to train every employee&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive recognises that human factors are crucial for cybersecurity and that employees are often&amp;nbsp;the &lt;strong&gt;weakest link&lt;/strong&gt;&amp;nbsp;— as well as the first line of defense – in preventing or detecting cyberattacks.&lt;/p&gt;

&lt;p&gt;The Directive requires organisations to &lt;strong&gt;provide&amp;nbsp;adequate training and awareness programs&lt;/strong&gt;&amp;nbsp;for their employees, users of digital services and other stakeholders on cybersecurity issues.&lt;/p&gt;

&lt;p&gt;Training all your employees is not a sporadic or optional task. It requires a regular and comprehensive program that covers topics such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Basic cybersecurity concepts and terminology.&lt;/li&gt;
	&lt;li&gt;Common cyberthreats and attack vectors.&lt;/li&gt;
	&lt;li&gt;Best practices and tips for cyberhygiene.&lt;/li&gt;
	&lt;li&gt;Cybersecurity policies and procedures, made relevant and simplified for end users.&lt;/li&gt;
	&lt;li&gt;Every user’s role and responsibilities for organisational cybersecurity.&lt;/li&gt;
	&lt;li&gt;How to report and respond to incidents.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is important to note that this training&amp;nbsp;&lt;strong&gt;should be received by everyone&lt;/strong&gt;&amp;nbsp;within the company, not only by IT employees. Even management should undergo this training.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A survey conducted for Ivanti&amp;nbsp;shows that a lot of employees are not even aware of mandatory cybersecurity training.&amp;nbsp;Just 27% of them feel “very prepared” to recognise and report threats like malware and phishing at work. 6% of them feel “very prepared” to recognize and report threats like malware and phishing at work.&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.enisa.europa.eu/publications/nis-investments-2022" rel="noopener" target="_blank"&gt;Enisa’s NIS Investments 2022 report&lt;/a&gt;, Enisa mentions that&amp;nbsp;40% of the surveyed OES (Operators of Essential Services) have no security awareness program for non-IT staff.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It is important to monitor who has&amp;nbsp;not&amp;nbsp;been trained yet and act on it. Training all your employees is not only beneficial for compliance but also for productivity, quality, innovation and customer satisfaction.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The best NIS2 advice we can give&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive is landmark legislation that aims to enhance the cybersecurity of critical sectors in the EU. It imposes significant obligations on organisations that fall under its scope, along with hefty fines and sanctions for non-compliance.&lt;/p&gt;

&lt;p&gt;Following the NIS2 Directive is a complex task. It demands&amp;nbsp;&lt;strong&gt;a proactive and comprehensive approach&lt;/strong&gt;&amp;nbsp;involving multiple steps,&amp;nbsp;stakeholders&amp;nbsp;and resources.&lt;/p&gt;

&lt;p&gt;The sooner you start preparing for it, the better prepared you will be when it becomes effective in October 2024.&lt;/p&gt;

&lt;p&gt;The best advice we can offer?&amp;nbsp;&lt;strong&gt;Do&amp;nbsp;not&amp;nbsp;wait till then: start&lt;/strong&gt;&amp;nbsp;preparing for the NIS2 Directive now!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Mon, 28 Aug 2023 17:43:02 Z</pubDate></item><item><guid isPermaLink="false">b7ea2db2-2ac1-4d6e-b11d-c540c6dfa52f</guid><link>https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part One: Audits Take Time</title><description>&lt;p&gt;You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But you might be tempted to think that October 2024 is far away, right?&amp;nbsp;Think twice.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;After all, how can you know if you have plenty of time to prepare&amp;nbsp;if you don’t know how well you currently comply&amp;nbsp;with the projected regulations?&lt;/p&gt;

&lt;p&gt;So, between now and October 2024, you must audit your current cybersecurity status. Specifically:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Identify gaps in meeting the NIS2 directive’s requirements, starting now&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Review your current supply chain security flaws&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In the second part of this series, I’ll review&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas you’ll need to address to fix&amp;nbsp;the gaps your audits uncover&lt;/a&gt;&lt;/em&gt;&amp;nbsp;— including how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Implement new organizational and technical security measures correctly.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id="one"&gt;1. Identify gaps in meeting the NIS2 Directive's requirements, starting now&lt;/h2&gt;

&lt;p&gt;The&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555" rel="noopener" target="_blank"&gt;NIS2 Directive&lt;/a&gt; is the EU-wide legislation on cybersecurity that provides legal measures to boost the overall level of cybersecurity in the EU. It modernises the existing legal framework to keep up with increased digitization and an evolving cybersecurity threat landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;&lt;a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2021)689333" rel="noopener" target="_blank"&gt;expands the scope of the cybersecurity rules&lt;/a&gt;&amp;nbsp;to new sectors and entities, improving the resilience and incident response capacities of public and private entities, competent authorities and the entire EU.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The NIS2 directive outlines increased measures for resilience against cyberattacks to minimize vulnerabilities and improve cyberdefense.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To comply with the NIS2 Directive, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Assess&amp;nbsp;&lt;/strong&gt;your cybersecurity posture&amp;nbsp;and identify any gaps or weaknesses that may expose you to cyber risks.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Map&lt;/strong&gt;&amp;nbsp;your existing policies, procedures and controls to the directive's requirements and see where to improve or update them.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Evaluate&lt;/strong&gt;&amp;nbsp;your incident response capabilities and reporting mechanisms and ensure they align with the directive's standards.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A big problem with the NIS2 is that it tells you what you&amp;nbsp;should&amp;nbsp;do, but not&amp;nbsp;how&amp;nbsp;you should do it. Luckily, multiple frameworks can help you with the how, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.nist.gov/cyberframework" rel="noopener" target="_blank"&gt;NIST CSF (Cybersecurity Framework)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;The&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO27001&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.iso.org/standard/75652.html" rel="noopener" target="_blank"&gt;ISO27002&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.cisecurity.org/controls" rel="noopener" target="_blank"&gt;CIS Controls&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" rel="noopener" target="_blank"&gt;IEC 62443&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In Belgium, the&amp;nbsp;&lt;a href="https://ccb.belgium.be/en/cyberfundamentals-framework" rel="noopener" target="_blank"&gt;CCB has created a Cyberfundamentals Framework&lt;/a&gt;&amp;nbsp;based on multiple frameworks with references to how the different parts of the frameworks relate to the GDPR and NIS2.&lt;/p&gt;

&lt;p&gt;After selecting the framework,&amp;nbsp;&lt;strong&gt;you must identify gaps&lt;/strong&gt;&amp;nbsp;in relation to the chosen framework and the directive's requirements. Identifying gaps is not a simple or quick task; it requires a thorough and systematic analysis of your organization's cybersecurity maturity and readiness.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You not only need to check your cybersecurity strategy and policies, but you also need to do a risk analysis to find the most critical assets and the cybersecurity risks they present, then consider security controls to bring down the risk score of those vital assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The sooner you start this process, the more time you’ll have&lt;/strong&gt;&amp;nbsp;to obtain the budget needed to address any issues and implement any necessary changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible NIS2 environment gaps&lt;/h3&gt;

&lt;p&gt;Some possible gaps that you may encounter in your environment are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a comprehensive cybersecurity strategy or policy&lt;/strong&gt;&amp;nbsp;that covers all aspects of risk management, incident response, business continuity, data protection, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a dedicated cybersecurity team or function&lt;/strong&gt;&amp;nbsp;that oversees, coordinates and monitors all cybersecurity activities and initiatives across the organization.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of adequate security controls or measures&lt;/strong&gt;&amp;nbsp;for protecting your network and information systems from unauthorized access, use, disclosure, modification or destruction.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of regular testing or auditing&lt;/strong&gt;&amp;nbsp;of your security controls or measures to ensure their effectiveness and compliance with the directive's requirements.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of proper training or awareness programs&lt;/strong&gt;&amp;nbsp;for your staff, management, other employees or other stakeholders on cybersecurity issues and best practices.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of clear communication or reporting channels&lt;/strong&gt;&amp;nbsp;for notifying relevant authorities or parties of any incidents or breaches that affect your services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential security solutions for your environment to comply with NIS2&lt;/h3&gt;

&lt;p&gt;To identify and fix these security gaps, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Run gap analysis frameworks or models&lt;/strong&gt;&amp;nbsp;that help you compare your current state with your desired state and identify areas for improvement.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement cybersecurity maturity models or standards&lt;/strong&gt;&amp;nbsp;that help you measure your level of cybersecurity performance and progress.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct a risk assessment&lt;/strong&gt;&amp;nbsp;to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Request external audits or assessments&lt;/strong&gt;&amp;nbsp;that help you validate your compliance status and identify any weaknesses or deficiencies.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="two"&gt;2. Review current supply chain security flaws with enough time to coordinate action with suppliers&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive also&amp;nbsp;introduces new provisions on supply&amp;nbsp;chain security&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e40-80-1" rel="noopener" target="_blank"&gt;chapter 0, point 54, 56&lt;/a&gt;), recognizing that cyber threats can originate from third-party providers or subcontractors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;requires organizations to ensure that their suppliers follow&amp;nbsp;appropriate security standards and practices&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21-2d&lt;/a&gt;) and regularly monitor their performance and compliance (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21–3&lt;/a&gt;).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This isn't without reason.&amp;nbsp;&lt;strong&gt;Supply chain attacks are on the rise&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2022/blackberry-commissioned-research-reveals-four-in-five-software-supply-chains-exposed-to-cyberattack-in-the-last-12-months" rel="noopener" target="_blank"&gt;BlackBerry research&lt;/a&gt;&amp;nbsp;with over 1500 IT decision-makers in 2022, four-fifths of respondents said they had been notified of an attack or vulnerability in their supply chain within the year. Seventy-seven percent said they uncovered hidden participants in their software supply chain that they weren't previously aware of.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.accenture.com/_acnmedia/PDF-116/Accenture-Cybersecurity-Report-2020.pd" rel="noopener" target="_blank"&gt;Accenture research&lt;/a&gt;&amp;nbsp;also reveals&amp;nbsp;40% of security breaches are indirect, occurring through the supply chain.&lt;/p&gt;

&lt;p&gt;Therefore,&amp;nbsp;&lt;strong&gt;securing your supply chain is essential&lt;/strong&gt;&amp;nbsp;for ensuring business continuity, resilience, reputation and trust.&lt;/p&gt;

&lt;p&gt;But in Ivanti’s&amp;nbsp;&lt;a href="/en-au/resources/v/doc/ivi/2732/7b4205775465"&gt;&lt;em&gt;Press Reset: A 2023 Cybersecurity Status Report&lt;/em&gt;&lt;/a&gt;,&amp;nbsp;we found that&amp;nbsp;only 42%&amp;nbsp;of the over 1,300 executive leaders and security professionals surveyed said they're prepared to safeguard against supply chain threats, even though 46% call it a high-level threat.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Supply chain threats not only come via attacks&amp;nbsp;on solution providers like&amp;nbsp;&lt;a href="https://www.theverge.com/2022/3/22/22990637/okta-breach-single-sign-on-lapsus-hacker-group" rel="noopener" target="_blank"&gt;Okta&lt;/a&gt;,&amp;nbsp;&lt;a href="https://techcrunch.com/2021/07/05/kaseya-hack-flood-ransomware/" rel="noopener" target="_blank"&gt;Kaseya&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know" rel="noopener" target="_blank"&gt;SolarWinds&lt;/a&gt;, but also through partners either directly connected to your IT infrastructure or who can log into it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And don’t forget about attacks on your resource suppliers that may cripple them so they're unable to deliver certain resources you need for your own operations. You have to be prepared and&amp;nbsp;&lt;strong&gt;have backup vendors available&lt;/strong&gt;&amp;nbsp;who can supply those resources if your primary supplier is out of action due to a cyberattack or other cause.&lt;/p&gt;

&lt;p&gt;Supply chain security is a complex and challenging issue involving multiple actors, dependencies and interconnections — and cannot be achieved overnight.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You need to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear and transparent communication channels&lt;/strong&gt;&amp;nbsp;with your suppliers and define your expectations and obligations regarding cybersecurity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct regular audits and assessments&lt;/strong&gt;&amp;nbsp;of your suppliers' security practices and verify that they meet the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establish contingency plans and backup solutions&lt;/strong&gt;&amp;nbsp;in case of a disruption or compromise of your supply chain.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Furthermore, you must start engaging with your suppliers&amp;nbsp;&lt;strong&gt;as soon as possible&lt;/strong&gt;&amp;nbsp;and work together with them to ensure your supply chain is secure and resilient.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Supply chain security challenges for NIS2&lt;/h3&gt;

&lt;p&gt;Some possible challenges that you may face in securing your supply chain are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of visibility or transparency&lt;/strong&gt;&amp;nbsp;into your suppliers' security practices, policies, or incidents.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of trust or cooperation&lt;/strong&gt;&amp;nbsp;among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of consistency or alignment&lt;/strong&gt;&amp;nbsp;in security standards, requirements, or expectations across your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of resources or capabilities&lt;/strong&gt;&amp;nbsp;to monitor, audit or verify your suppliers' security performance or compliance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of contingency plans or backup solutions&lt;/strong&gt;&amp;nbsp;to mitigate or recover from any disruptions or compromises of your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of information&lt;/strong&gt;&amp;nbsp;as to what you expect from your supplier’s security practices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Supply chain security solutions for NIS2&lt;/h3&gt;

&lt;p&gt;To overcome these supply chain security challenges, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear contracts or agreements&lt;/strong&gt;&amp;nbsp;with your suppliers that specify their security obligations, responsibilities and liabilities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Develop common security criteria, guidelines or frameworks&lt;/strong&gt;&amp;nbsp;that apply to all suppliers in your supply chain and align with the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement security controls, measures or tools&lt;/strong&gt;&amp;nbsp;that enable you to track, monitor or verify your suppliers' security activities, incidents or compliance status.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Create joint security teams, committees or forums&lt;/strong&gt;&amp;nbsp;that facilitate information sharing, collaboration and coordination among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Build trust and mutual understanding&lt;/strong&gt;&amp;nbsp;with your suppliers through regular communication, feedback&amp;nbsp;and recognition.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;When your NIS2 Directive audits are complete, now what?&lt;/h2&gt;

&lt;p&gt;Now that you’ve determined where you currently stand in relation to the NIS2 Directive, it’s time to implement critical changes to ensure compliance by October 2024. I’m certain that addressing the gaps that your audits identified will require all the time you have — and then some! – before the regulations are officially implemented in your country.&lt;/p&gt;

&lt;p&gt;But how can you systematically address these gaps in a timely fashion? We discuss&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas of security changes you’ll need for NIS2&lt;/a&gt;&lt;/em&gt; in our next blog post, as we examine how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Correctly implement new organization and technical security measures.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;</description><pubDate>Mon, 28 Aug 2023 17:14:55 Z</pubDate></item></channel></rss>