<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/patrick-kaak/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/patrick-kaak</link><item><guid isPermaLink="false">0daaab79-4711-43fa-b067-dc20065425bc</guid><link>https://www.ivanti.com/en-gb/blog/modern-application-control-trusted-ownership-vs-allowlisting</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Trusted Ownership: How Ivanti Application Control scales beyond allowlisting</title><description>&lt;p&gt;Application control is one of those security topics where many people carry old assumptions. Traditional allowlisting feels safe but quickly becomes a maintenance burden. Blocklisting feels reactive and incomplete. And while tools like Microsoft AppLocker led many to believe that strict allowlisting is the gold standard, modern attacks have proven otherwise. Attackers increasingly rely on &lt;i&gt;legitimate, signed tools &lt;/i&gt;— used in the wrong context — to bypass list-based controls entirely.&lt;/p&gt;

&lt;p&gt;So when organisations evaluate &lt;a href="https://www.ivanti.com/en-gb/products/application-control"&gt;Ivanti Application Control&lt;/a&gt; or &lt;a href="https://www.ivanti.com/en-gb/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; and encounter Trusted Ownership, it may initially resemble blocklisting because explicit blocks are possible. In reality, Trusted Ownership is a far broader and far lighter operationally inspired‑ enforcement model that controls execution based on origin, not just identity.&lt;/p&gt;

&lt;p&gt;Instead of managing expanding lists, it enforces security on who has placed software on the system, aligning cleanly with modern software distribution practices and zero trust principles. It’s best understood not as another list mechanism, but as a provenance inspired enforcement model that controls execution based on origin, not just identity.&lt;/p&gt;

&lt;p&gt;That shift in thinking leads to a better question for modern application control: not only what a file &lt;i&gt;is&lt;/i&gt;, but &lt;i&gt;how it got there.&lt;/i&gt;&lt;/p&gt;

&lt;h2&gt;Beyond lists: why provenance control now matters&lt;/h2&gt;

&lt;p&gt;The question of how a file arrived on the system is at the core of provenance control. Instead of trusting files based on publisher, path or hash alone, provenance control evaluates the &lt;i&gt;origin and process&lt;/i&gt; that introduced them. &lt;i&gt;Who wrote the file to disc? Through which mechanism? Did the installation follow a controlled IT workflow?&lt;/i&gt; This evaluation shifts application control from object trust to process trust, creating a far stronger security boundary.&lt;/p&gt;

&lt;p&gt;In Ivanti Application Control, provenance control is implemented as &lt;a href="https://help.ivanti.com/ap/help/en_US/am/2025/Content/Application_Manager/Trusted_Owners.htm" target="_blank"&gt;Trusted Ownership&lt;/a&gt;. Any file placed by a trusted owner is allowed; anything introduced by a user is denied by default. This applies consistently across executables, DLLs, installers and scripts. Because identities like SYSTEM, TrustedInstaller and Administrators are trusted by default, software delivered through standard deployment channels such as MS Intune, MECM, Ivanti Endpoint Manager (EPM)or other enterprise tools runs immediately without rule maintenance or exceptions.&lt;/p&gt;

&lt;p&gt;This marks a fundamental break from classic allowlisting. AppLocker rules live or die based on exact publisher, path or hash definitions. It doesn't evaluate installation origin and doesn't automatically trust your deployment mechanisms. Software delivered by Intune still requires a preexisting allow rule, often relying on broad defaults that permit the Programme Files or Windows directories.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A flowchart illustrates an app provenance engine that allows trusted origins and blocks untrusted ones. On the left, a trusted IT admin provides a company app, which is allowed by the provenance engine and marked with a green check. On the right, a user tries to introduce an unknown executable (EXE), which is blocked by the provenance engine, marked with a red X. The blocked executable is shown again at the bottom with a cross mark. The diagram visually separates trusted, allowed content from untrusted, blocked content." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/02/actrustedownershipblog_image1.jpg"&gt;&lt;/p&gt;

&lt;p&gt;That distinction matters because modern attacks increasingly weaponize legitimate tools in improper contexts. Provenance control neutralises much of that risk by enforcing trust in &lt;i&gt;how&lt;/i&gt; software arrives, not just &lt;i&gt;what&lt;/i&gt; it is. It aligns with zero trust principles, reduces supply chain exposure, and dramatically narrows opportunities for Living off the Land (LotL) abuse by default.&lt;/p&gt;

&lt;p&gt;Once you understand the importance of origin, the next question becomes: how do you enforce it at scale?&lt;/p&gt;

&lt;p&gt;The answer: apply provenance consistently across all the ways software executes and all the ways it is delivered.&lt;/p&gt;

&lt;h2&gt;Beyond Blocklists: Broad coverage built for modern software deployment&lt;/h2&gt;

&lt;p&gt;Provenance control shifts application security away from managing endless lists and toward validating the process by which software arrives on the system. Once you adopt this perspective, it becomes clear that Trusted Ownership is not a blocklist approach. It's an origin-based trust boundary that behaves very differently from traditional allowlisting.&lt;/p&gt;

&lt;p&gt;A common misconception is that Trusted Ownership resembles blocklisting because administrators sometimes add targeted deny rules for well-known Windows tools. In practice, these deny rules are defensive hardening measures against Living off the Land techniques. Every serious application control method uses such targeted restrictions. The core of Trusted Ownership is the opposite of blocklisting. Software delivered through a controlled and trusted process is permitted by default, while user-introduced content is denied by default.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="lang" value="en"&gt;&lt;param name="id" value="cMWocpzF3Uo"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;A more important differentiator is coverage. Many organisations that rely on classic allowlists end up focusing almost entirely on executable files. They often avoid applying the same enforcement to DLLs, scripts and MSI packages because these file types make rule maintenance far more complex. This creates gaps that modern attackers frequently exploit.&lt;/p&gt;

&lt;p&gt;Trusted Ownership avoids these gaps by applying the same origin-based enforcement to the full execution chain. Executables, DLLs, scripts, MSI installers and related components are evaluated through the same trust model. Because trust is determined by who introduced the file, you do not need separate policies for each file type. A script in the Downloads folder, a DLL created in a temporary build directory or an EXE executed from a user profile all receive the same default deny treatment when they originate outside a controlled installation process.&lt;/p&gt;

&lt;p&gt;This trust model also aligns naturally with how modern endpoint management platforms deliver software. Solutions such as Intune, MECM, Ivanti Neurons for MDM, &lt;a href="https://www.ivanti.com/en-gb/products/endpoint-manager"&gt;Ivanti Endpoint Manager&lt;/a&gt; and similar systems typically instal applications using the SYSTEM identity or another trusted service account.&lt;/p&gt;

&lt;p&gt;Since these identities are already Trusted Owners, software deployed through these channels runs immediately without creating allow rules, maintaining file paths or updating policies. Only when you intentionally use alternative installation accounts, such as custom DevOps agents or scripted installations in user context, do you need to identify that identity as a Trusted Owner.&lt;/p&gt;

&lt;p&gt;The result is a model with broad and consistent coverage across all relevant file types. It works seamlessly with modern software distributions and avoids the operational overhead associated with classic allowlists that focus mainly on executable files.&lt;/p&gt;

&lt;p&gt;Trusted Ownership places trust not in individual objects but in the controlled processes through which software is delivered, creating a more scalable and more secure approach to application control.&lt;/p&gt;

&lt;h2&gt;Where WDAC (App Control for Business) fits in&lt;/h2&gt;

&lt;p&gt;Microsoft maintains two application control technologies: AppLocker and App Control for Business (formerly WDAC). Although both still exist, Microsoft is clear about their roles. AppLocker helps prevent users from running unapproved applications, but it does not meet the servicing criteria for modern security features and is therefore categorised as a &lt;a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/applocker/applocker-overview" rel="noopener" target="_blank"&gt;defense-in-depth mechanism rather than a strategic security control&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Microsoft’s forward path for application control is App Control for Business and explicitly states that AppLocker is feature-complete and no longer under active development, beyond essential security updates. This means all new capabilities are delivered only in WDAC and not in AppLocker.&lt;/p&gt;

&lt;p&gt;App Control for Business introduces the &lt;i&gt;Managed Installer&lt;/i&gt; concept. This allows Windows to automatically trust applications installed through designated deployment platforms such as Intune or MECM. Trust is derived from the distribution channel rather than individual files, reducing rule maintenance significantly.&lt;/p&gt;

&lt;p&gt;This aligns closely with Ivanti Application Control’s Trusted Ownership model. Both approaches trust software based on the controlled process that installed it rather than on discrete file attributes. However, Trusted Ownership applies this concept in a simpler and more operationally accessible way. Ivanti trusts identities such as SYSTEM and designated service accounts without requiring complex policy layers, XML definitions or deep WDAC expertise.&lt;/p&gt;

&lt;p&gt;Ivanti hears from many organisations that they struggle to operationalize WDAC. WDAC policies require careful design, lengthy testing in audit mode, driver and kernel exception management and ongoing maintenance of multiple policy sets. &lt;a href="https://www.reddit.com/r/Intune/comments/16oov9d/is_anyone_actually_successfully_deploying_wdac_as/" rel="noopener" target="_blank"&gt;This often leads organizations to combine WDAC with AppLocker&lt;/a&gt; to cover both low-level enforcement and day-to-day user space control and end up with administrative overhead.&lt;/p&gt;

&lt;p&gt;Ivanti Application Control offers a unified alternative. Through Trusted Ownership, Trusted Vendors and digital signature validation, it delivers a provenance-based default deny model with consistent coverage across executables, DLLs, scripts and MSI packages.&lt;/p&gt;

&lt;p&gt;Instead of maintaining two MS control planes with different scopes, organisations manage a single, streamlined policy that enforces trust based on how software is introduced into the system. This provides many of the practical goals customers attempt to achieve with a combined WDAC and AppLocker deployment, but with lower operational complexity and one cohesive trust model.&lt;/p&gt;

&lt;h2&gt;LOLBins and argument-level control&lt;/h2&gt;

&lt;p&gt;With broad coverage established, the issue then becomes how to handle the legitimate tools already on every machine that attackers like to abuse.&lt;/p&gt;

&lt;p&gt;Modern attackers often avoid using traditional malware and instead rely on the tools already present on every Windows device. These Living off the Land tools (LOLBins) are legitimate and necessary for normal operations, which makes them difficult to block without affecting productivity. Traditional allowlisting struggles here because broad blocking breaks workflows, while broad allowing leaves dangerous gaps.&lt;/p&gt;

&lt;p&gt;A provenance-based model such as Trusted Ownership changes this dynamic. Even if an attacker attempts to use a built-in tool, the content they try to run usually does not come from a trusted installation process. Since Ivanti evaluates the origin of that content, most misuse attempts fail automatically. The tool may be legitimate, but the content it is asked to run is not, and Trusted Ownership stops it before it executes.&lt;/p&gt;

&lt;p&gt;It is also important to understand not only which tools run but what they are being asked to do. Many interpreters and runtimes, such as PowerShell, Python, or Java, can be perfectly safe in one context and risky in another. A business application may rely on Java to start a specific, approved process, while a user downloaded JAR file is an entirely different scenario.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A diagram explains how PowerShell scripts are evaluated in two security layers: Ownership and Intent. The first layer uses a trusted ownership check to block malicious scripts, while allowing approved commands using argument-level control. The second layer, focused on intent, uses policy enforcement to block malicious activity while allowing legitimate processes to run. Icons represent scripts, commands, and shield checks, with arrows showing allowed and blocked paths." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/02/actrustedownershipblog_image2.jpg"&gt;&lt;/p&gt;

&lt;p&gt;Ivanti handles this through a layered approach. A JAR file is first evaluated using Trusted Ownership, which blocks it immediately if it was introduced by a user rather than through a controlled deployment process. Beyond that, administrators can create simple allow rules that specify exactly which Java commands are permitted, ensuring that only legitimate Java based applications run while attempts to launch unapproved JAR files are quietly denied.&lt;/p&gt;

&lt;p&gt;The same principle applies across other tools as well. Policies can approve the exact behaviour your organisation needs while blocking activities that fall outside those boundaries. This avoids broad, brittle rules and keeps daily work running smoothly.&lt;/p&gt;

&lt;p&gt;The result is a balanced and modern approach. Trusted Ownership stops untrusted content by default. Focused hardening aligns with government and community best practices for reducing living off the land abuse and intent aware controls ensure that legitimate processes continue to function without opening doors for attackers.&lt;/p&gt;

&lt;p&gt;This approach closely aligns with current community and government guidance on mitigating living off the land techniques. Agencies such as CISA, NSA, FBI and the &lt;a href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques#best-practice-recommendations" rel="noopener" target="_blank"&gt;Australian Cyber Security Centre&lt;/a&gt; emphasise reducing opportunities for attackers to use built-in tools by controlling how they are used and restricting the untrusted content they act upon. Their joint guidance highlights that LOTL attacks depend on abusing native tools and stresses the need for controls that limit this misuse without blocking legitimate system processes.&lt;/p&gt;

&lt;p&gt;Ivanti’s model reflects this guidance. Trusted Ownership automatically blocks the untrusted content that attackers rely on, while a small number of focused restrictions address the small set of tools that require extra care.&lt;/p&gt;

&lt;h2&gt;Trusted Ownership in action: Real-world scenarios&lt;/h2&gt;

&lt;p&gt;&lt;b&gt;Here are a few operational examples of how Ivanti Application Control and Trusted Ownership work in practice.&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;A portable application is copied into the user profile. Ivanti blocks it because it is user-owned. AppLocker only blocks if there are matching rules. Without the right path or publisher rules, the behaviour can differ.&lt;/li&gt;
	&lt;li&gt;An email attachment launches a PowerShell script from Downloads. Ivanti denies it because of user ownership. AppLocker depends on script rules and, on block events, forces PowerShell into Constrained Language Mode, which will still run the script.&lt;/li&gt;
	&lt;li&gt;Abuse of OS tools such as rundll32 or mshta. Both models need targeted deny hardening. Ivanti combines this with provenance control which generally reduces the number of exceptions you need. AppLocker relies on curated deny sets and requires periodic tuning.&lt;/li&gt;
	&lt;li&gt;A vendor update ships new signed files. Ivanti allows the update when it arrives via the trusted deployment channel due to Trusted Ownership. AppLocker can accommodate this with publisher rules, but signature reuse across multiple products or unusual instal paths often leads to extra maintenance and broader trust than intended.&lt;/li&gt;
	&lt;li&gt;A user downloads a JAR and tries to run it with Java. Ivanti blocks the attempt because the JAR is user-introduced and fails Trusted Ownership. If needed, admins can allow only the exact approved invocation by matching the full command line. AppLocker cannot match arguments and relies on publisher, path or hash rules.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;Provenance control shifts application control from a management problem to a trust model. Instead of trusting individual files, it trusts the process by which software arrives on a system, making security both scalable and workable.&lt;/p&gt;

&lt;p&gt;Trusted Ownership fits squarely into this approach. It is neither a blocklist nor a classic allowlist, but a model where software that arrives through a controlled IT process is allowed by default, while everything outside that process is denied by default. By enforcing on origin and ownership rather than on ad hoc files, &lt;a href="https://www.ivanti.com/en-gb/products/application-control"&gt;Ivanti Application Control&lt;/a&gt; and &lt;a href="https://www.ivanti.com/en-gb/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; align far better with modern attack techniques and today’s software distribution.&lt;/p&gt;

&lt;p&gt;If you keep treating application control as a list management exercise, you will feel the administrative burden. If you treat it as a trust boundary, you gain scalability, security, and operational workability.&lt;/p&gt;
</description><pubDate>Wed, 25 Feb 2026 14:25:15 Z</pubDate></item><item><guid isPermaLink="false">5fcd2944-6493-43b9-879a-b9a6010bdbc6</guid><link>https://www.ivanti.com/en-gb/blog/nis2-directives-boards-cybersecurity-governance</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Boards Talk Cybersecurity — but NIS2 Directive Says They Must Own It</title><description>&lt;p&gt;Cybersecurity finally has a seat in the boardroom. &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report" target="_blank" rel="noopener"&gt;Ivanti’s 2025 State of Cybersecurity&lt;/a&gt; research shows that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;89% of organisations now discuss cybersecurity at the board level.&lt;/li&gt;
	&lt;li&gt;81% of organisations have at least one director with cyber expertise.&lt;/li&gt;
	&lt;li&gt;88% of organisations include the CISO in strategic meetings.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On paper, that’s progress. But, many organisations struggle to convert board-level attention into sustained, measurable risk reduction.&lt;/p&gt;

&lt;p&gt;Ivanti’s data exposes the crux of the problem: only 40% of security teams say risk exposure is communicated to executives “very effectively” — a governance gap with &lt;a href="https://www.williamfry.com/knowledge/nis2-a-game-changer-for-senior-management-and-boards/" rel="noopener" target="_blank"&gt;legal and financial consequences under the EU’s NIS2 Directive&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Let’s take a deeper look at the data from Ivanti’s 2025 State of Cybersecurity Report to see what it tells us — and how to turn those insights into NIS2-ready governance.&lt;/p&gt;

&lt;h2&gt;Why NIS2 changes everything about cybersecurity risk management&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.enisa.europa.eu/sites/default/files/2025-06/ENISA_Technical_implementation_guidance_on_cybersecurity_risk_management_measures_version_1.0.pdf" rel="noopener" target="_blank"&gt;NIS2&lt;/a&gt; broadens the EU’s cybersecurity regime to 18 sectors, tightens supervision and — most consequentially — &lt;a href="https://www.williamfry.com/knowledge/nis2-a-game-changer-for-senior-management-and-boards/" rel="noopener" target="_blank"&gt;assigns direct accountability to the management body&lt;/a&gt;. Boards and senior leaders must approve, oversee and ensure that measures are proper to the risks and effective in practice.&lt;/p&gt;

&lt;p&gt;Failure carries consequences: &lt;a href="https://www.ivanti.com/en-gb/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time"&gt;audits&lt;/a&gt;, binding instructions and administrative fines up to €10 million or 2% of global turnover. In serious cases, leaders face temporary bans or personal liability.&lt;/p&gt;

&lt;p&gt;Rather than a one-size-fits-all checklist, &lt;a href="https://natlawreview.com/article/eu-nis-2-directive-expanded-cybersecurity-obligations-key-sectors" rel="noopener" target="_blank"&gt;NIS2 expects organizations to prove they manage risk across the lifecycle&lt;/a&gt; (analysis, incident handling and continuity, secure development and supply chain assurance, vulnerability management, training and safeguarded communications) in a manner that’s aligned with the state of the art and proportionate to business impact (per &lt;a href="https://www.nis2-info.eu/article-21-cybersecurity-risk-management-measures/" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt;).&lt;/p&gt;

&lt;h2&gt;Why boards struggle — and what’s at stake&lt;/h2&gt;

&lt;p&gt;When you translate risk into dashboards of CVE counts, patch rates and tool inventories that obscure business impact, your board of directors misses the CISO’s key points.&lt;/p&gt;

&lt;p&gt;Ivanti’s findings crystallise the disconnect: the conversation is happening, yet few feel exposure is conveyed in a way executives can act upon. The result is misguided prioritisation, diffuse budgets and latent exposures that go unaddressed — precisely the scenario &lt;a href="https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/raising-awareness-campaigns/network-and-information-systems-directive-2-nis2" rel="noopener" target="_blank"&gt;NIS2 seeks to prevent&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;When things go wrong, costs mount fast. Operational disruption from ransomware, reputational damage, escalating legal exposure and recovery bills often dwarf any administrative fine. With NIS2, ignorance is not a defence; and effective governance requires comprehension, communication and follow-through.&lt;/p&gt;

&lt;h2&gt;Top cybersecurity risks that demand board attention&lt;/h2&gt;

&lt;p&gt;Ivanti’s research highlights where organisations are least prepared and most exposed:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Ransomware and AI&lt;/li&gt;
	&lt;li&gt;End-of-life technology&lt;/li&gt;
	&lt;li&gt;Supply chain security&lt;/li&gt;
	&lt;li&gt;Blind spots (e.g., shadow IT)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each risk below maps to NIS2’s governance expectations. Read on to learn about the threat they pose and how to do better in practice.&lt;/p&gt;

&lt;h3&gt;1. Ransomware + AI: The perfect storm&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; &lt;a href="https://www.ivanti.com/en-gb/company/press-releases/2025/ivanti-research-shows-ransomware-is-the-top-predicted-threat-for-2025"&gt;Ransomware still dominates the 2025 threat landscape&lt;/a&gt; — and the stakes are rising. Over a third of security professionals (38%) believe AI will make attacks more dangerous, yet &lt;a href="https://www.channelfutures.com/security/ivanti-flashpoint-reports-show-increasing-cyber-challenges-ahead" rel="noopener" target="_blank"&gt;only 29% feel very prepared to respond&lt;/a&gt;.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21795381"&gt;&lt;/div&gt;

&lt;p&gt;This gap reflects a familiar pattern: adversaries accelerate with automation while defenders wrestle with fragmented telemetry, manual processes and untested response playbooks.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Under NIS2, resilience cannot be theoretical. Regulators expect response and crisis plans that have been exercised, continuity and recovery targets that are met in practice and preventive controls aligned to business impact (especially identity and patching for critical systems).&lt;/p&gt;

&lt;p&gt;When a significant incident hits, the standard is clear: prompt early warnings, coherent follow-ups within mandated windows and visible command of the situation from containment through recovery.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Treat ransomware as a recurring business risk, not a rare IT event. Rehearse the first 24–72 hours with top leadership, legal and communications so you can make fast, defensible decisions and produce the evidence a supervisor will ask for.&lt;/p&gt;

&lt;p&gt;Don’t just cycle backups — prove restorability of priority services under realistic constraints; tie RTO/RPO directly to revenue and safety. For prevention, orient around exposure: harden and patch critical assets and reduce blast radius with strong authentication, segmentation and least privilege.&lt;/p&gt;

&lt;p&gt;When the board asks for assurance, answer in outcomes: “order-to-cash restored in X hours, confirmed quarterly; stakeholder comms aligned to NIS2’s staged reporting.”&lt;/p&gt;

&lt;h3&gt;2. End-of-life technology: A compliance time bomb&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Over half (51%) of organisations continue to run end-of-life (EOL) software, and one in three organisations say their security is seriously compromised by legacy tech. These legacy blind spots create systemic risk and undermine any claim to state-of-the-art security.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21795414"&gt;&lt;/div&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; NIS2 does not dictate versions, but it does hold you to the principles of appropriateness and state of the art. That means:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You know where EOL sits.&lt;/li&gt;
	&lt;li&gt;You have a plan to retire it.&lt;/li&gt;
	&lt;li&gt;You mitigate risk while it stays and you decommission securely — including sanitising data — when it exits service.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Under Article 21, keeping unsupported tech in production without timeboxed, documented mitigations is hard to defend as proportionate risk management.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Move EOL from backlog item to board-owned exposure.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Maintain a live inventory that flags support status a year ahead.&lt;/li&gt;
	&lt;li&gt;Align the retirement path with business owners.&lt;/li&gt;
	&lt;li&gt;Where delay is unavoidable, approve temporary isolation on the network, restricted access and enhanced monitoring — with clear end dates.&lt;/li&gt;
	&lt;li&gt;Close the loop with verifiable data sanitization and auditable records at disposal.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most importantly, price the risk: “This legacy platform drives X% of revenue; extending nine months adds €Y expected loss unless we isolate and monitor it as follows...”&lt;/p&gt;

&lt;h3&gt;3. Supply chain security: Your weakest link&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Nearly half (48%) of organisations have not identified the third-party systems or components that are most vulnerable in their software supply chains.&amp;nbsp; Many still rely on static questionnaires — time consuming, self-reported and poor at surfacing live risk — particularly for software components and managed providers.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21446922"&gt;&lt;/div&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Accountability doesn’t stop at the perimeter. Supervisors will look for a defensible method to judge supplier security (including secure development and vulnerability disclosure), contractual duties that mirror that method, ongoing visibility into partner risk (not just annual forms) and the ability to detect and respond when an originating exposure sits with a vendor.&lt;/p&gt;

&lt;p&gt;Article 21 makes this explicit: Supply chain security must be risk-based and proportionate. Software security in the supply chain should be a shared responsibility.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Start by matching the depth of your security requirements to the risk the supplier introduces to your environment.&lt;/p&gt;

&lt;p&gt;A cloud provider hosting critical workloads requires far more stringent controls than a low-impact SaaS tool. For high-risk vendors, demand tangible evidence — SBOM availability, patch and disclosure cadence, participation in coordinated vulnerability disclosure — and make these obligations enforceable in contracts.&lt;/p&gt;

&lt;p&gt;Replace one-off surveys with near-real-time indicators, such as exploit telemetry, remediation timeliness and changes in the supplier’s attack surface. Finally, rehearse a supplier-originating incident together: confirm contacts, evidence sharing and public communications that satisfy NIS2’s staged notifications.&lt;/p&gt;

&lt;h3&gt;4. Blind spots: The hidden risk you can’t manage&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Shadow IT, legacy systems, unmanaged devices and third-party dependencies are persistent blind spots for many organisations.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21467845"&gt;&lt;/div&gt;

&lt;p&gt;These gaps slow response, obscure risk and leave organisations exposed to breaches and compliance failures.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Article 21 expects organisations to manage risk across the lifecycle — including asset inventory, vulnerability management and supply chain assurance.&lt;/p&gt;

&lt;p&gt;Blind spots undermine that mandate. Supervisors will ask: can you prove you know what is in your environment, what’s vulnerable and what is being done about it?&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Treat visibility as a governance priority, not a technical detail.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Conduct regular attack surface assessments.&lt;/li&gt;
	&lt;li&gt;Integrate IT and security data.&lt;/li&gt;
	&lt;li&gt;Use automation to correlate and normalise asset information.&lt;/li&gt;
	&lt;li&gt;Flag shadow IT, BYOD and legacy systems for board-level review.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most importantly, tie visibility gaps to business impact: “We lack patch compliance data for X% of endpoints, which affects SLA delivery and regulatory posture.”&lt;/p&gt;

&lt;h2&gt;Closing the communication gap: What CISOs and boards must do&lt;/h2&gt;

&lt;p&gt;Forty percent of security teams say IT doesn’t understand their organisation’s risk tolerance — that’s a cybersecurity governance red flag. The board cannot challenge, prioritise or allocate resources without clarity on business impact.&lt;/p&gt;

&lt;p&gt;Under NIS2 regulations, the management body needs to exercise informed oversight. The remedy starts with the CISO translating exposures into scenarios the board recognises:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“If we do not update those systems within 48 hours, there’s a very high probability of breach, and the health data of all our clients will be easy to extract. This will hurt our brand, create claims in court and stop our services for days.”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Strong briefings provide a time frame and tie investments to reductions in the top exposures (the exploits that would materially hurt revenue, safety or compliance).&lt;/p&gt;

&lt;p&gt;Boards should insist on a compact list of priorities, agree on risk appetite in economic terms and revisit progress quarterly. Over time, that discipline replaces tool-centric updates with a shared narrative of how the attack surface is shrinking and resilience is improving.&lt;/p&gt;

&lt;p&gt;Every board deck should answer these three simple questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What could go wrong that truly matters?&lt;/li&gt;
	&lt;li&gt;What are we doing about it?&lt;/li&gt;
	&lt;li&gt;How will we know it worked?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Anchor measurement to outcomes — time to isolate, time to recover and changes in the top-ten exposures — rather than raw patch or alert counts. When discussing technical debt, attach a price tag: “Keeping this EOL cluster another quarter preserves functionality but adds €X expected loss unless we isolate and monitor it.” That is the language of governance NIS2 expects to see in minutes and in decisions.&lt;/p&gt;

&lt;h2&gt;Training the board: A NIS2 imperative&lt;/h2&gt;

&lt;p&gt;The board can only close the communications gap when they really know the subject. NIS2 codifies what many already recognise: the management body needs regular cybersecurity training to discharge its duties.&lt;/p&gt;

&lt;p&gt;Effective programmes are pragmatic: They brief directors on evolving threats (such as AI-enabled ransomware and compromised software supply chains), clarify staged reporting and potential liabilities and practice decisions through realistic table-top exercises.&lt;/p&gt;

&lt;p&gt;Prioritise sessions that teach directors to read cyber metrics in business terms (e.g., what &lt;a href="https://www.ivanti.com/resources/research-reports/proactive-security" target="_blank" rel="noopener"&gt;the exposure picture&lt;/a&gt; implies for continuity, customers and compliance) and how to interrogate the plan until it is credible.&lt;/p&gt;

&lt;p&gt;Turn training into capability. Make board education a continuous competency, not a one-off seminar. Use short, focused modules that build fluency (e.g., one quarter on exposure prioritisation, the next on supplier oversight and CVD, then one on incident reporting mechanics).&lt;/p&gt;

&lt;p&gt;Base each session on a real scenario, like AI-assisted ransomware or a malicious vendor update and capture the specific decisions directors must make. Convert those decisions into concrete governance improvements (updated policies, contract clauses or metrics) so training shows traceable uplift rather than box-ticking.&lt;/p&gt;

&lt;h2&gt;Close the gap between intent and impact for NIS2-readiness&lt;/h2&gt;

&lt;p&gt;Ivanti’s research shows encouraging intent — boards talk about cybersecurity, budgets are growing and CISOs have a seat at the table. But, intent does not equal impact.&lt;/p&gt;

&lt;p&gt;That same data reveals preparedness gaps for ransomware, stubborn silos that slow response and weaken posture, a long tail of end-of-life technology and opaque supply chain risk that keeps material exposure on the books.&lt;/p&gt;

&lt;p&gt;NIS2 raises the bar from conversation to accountability: management bodies must ensure measures are proportionate, state of the art and effective — and they must prove it when incidents occur.&lt;/p&gt;

&lt;p&gt;Organisations that close the communication gap, retire or isolate legacy systems on a schedule and replace questionnaire-only oversight with evidence and rehearsal will find they are not only compliant, but resilient.&lt;/p&gt;
</description><pubDate>Mon, 29 Sep 2025 20:05:33 Z</pubDate></item><item><guid isPermaLink="false">a73d47a1-a10a-4e9f-9a07-53e2f0fa67d3</guid><link>https://www.ivanti.com/en-gb/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time</title><description>&lt;p&gt;In a previous blog post, I discussed the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time"&gt;two main areas to audit&lt;/a&gt;&amp;nbsp;before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would:&lt;/p&gt;

&lt;p&gt;Identify your gaps with the NIS2 directive’s requirements now.&lt;/p&gt;

&lt;p&gt;Review your current supply chain security flaws.&lt;/p&gt;

&lt;p&gt;Now that we’ve discovered these security flaws, we must fix them —&amp;nbsp;before&amp;nbsp;time runs out in October 2024.&lt;/p&gt;

&lt;p&gt;So, in this post, I’ll walk you through how to resolve your weakest security issues before the NIS2 Directive deadline hits by addressing these three key areas:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Inform&amp;nbsp;management about your cybersecurity gaps&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Correctly implementing new organisation and technical security measures&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Find time to train all of your employees&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;1. Inform management about your gaps – and get budget to remediate them&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3312-80-1" rel="noopener" target="_blank"&gt;imposes significant obligations&lt;/a&gt;&amp;nbsp;on organisations that fall under its scope, which may entail substantial costs and resources.&amp;nbsp;The Directive also introduces hefty fines and sanctions for non-compliance, up to a maximum of €10 million or 2% of an organisation's global annual revenue&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e4350-80-1" rel="noopener" target="_blank"&gt;Article 34&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;On top of this,&amp;nbsp;the new directive can extend liability&amp;nbsp;from entities to their individual representatives in certain situations. Moreover, when certain conditions are met, persons in management positions could be temporarily suspended (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3949-80-1" rel="noopener" target="_blank"&gt;Article 32-5b&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Therefore, following the NIS2 Directive is&amp;nbsp;a &lt;strong&gt;legal necessity&lt;/strong&gt;&amp;nbsp;and&amp;nbsp;a &lt;strong&gt;strategic priority&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To be in compliance, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Inform your management&amp;nbsp;&lt;/strong&gt;about its implications and benefits and convince them to allocate sufficient budget and resources for implementing compliance.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Present a clear business case&lt;/strong&gt;&amp;nbsp;that outlines the risks of non-compliance, the opportunities of compliance and the return on investment.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Demonstrate how compliance&lt;/strong&gt; will enhance&amp;nbsp;your organisation's reputation, trustworthiness, competitiveness and resilience.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Informing management and getting a budget is a challenging task, requiring a persuasive and evidence-based argument that showcases the value of cybersecurity for your organisation.&lt;/p&gt;

&lt;p&gt;The sooner you start this process, the more time you’ll have to secure buy-in and support from management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible business case benefits for NIS2 compliance&lt;/h3&gt;

&lt;p&gt;Some possible benefits that you can highlight in your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&amp;nbsp;&lt;/strong&gt;by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Innovating&lt;/strong&gt;&amp;nbsp;by adopting new technologies, developing new products or services, creating new markets and more.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Following other cybersecurity regulations or standards&amp;nbsp;beyond NIS2&lt;/strong&gt;&amp;nbsp;– such as&amp;nbsp;&lt;a href="https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en" rel="noopener" target="_blank"&gt;GDPR&lt;/a&gt;,&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO 27001&lt;/a&gt;,&amp;nbsp;&lt;a href="https://listings.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf" rel="noopener" target="_blank"&gt;PCI DSS&lt;/a&gt;&amp;nbsp;and others&amp;nbsp;&amp;nbsp;– since global frameworks often have a high overlap with the compliance requirements of NIS2.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential information sources for justifying your NIS2 compliance business case&lt;/h3&gt;

&lt;p&gt;Some sources you can use to support your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Statistics or facts&lt;/strong&gt;&amp;nbsp;showing the prevalence, impact or cost of cyberattacks in your sector or region.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Case studies or examples&lt;/strong&gt;&amp;nbsp;illustrating how other organisations have benefited from complying with the NIS2 Directive or similar regulations. For example, the&amp;nbsp;Enisa NIS Investments 2022 report&amp;nbsp;shows that for 62% of the organisations implementing the older NIS directive, such implementations helped them detect security incidents; for 21%, implementations helped during security incident recovery.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Testimonials or feedback&lt;/strong&gt;&amp;nbsp;from customers, partners, regulators or experts who endorse or recommend complying with the NIS2 Directive or similar regulations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Benchmarks or indicators&lt;/strong&gt;&amp;nbsp;revealing your current or projected cybersecurity performance or progress in relation to the NIS2 Directive or your competitors.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-gb/resources/v/doc/ivi/2702/fa749d5d96a9"&gt;Ivanti’s 2023 Cyberstrategy Tool Kit for Internal Buy-In&lt;/a&gt;&amp;nbsp;is also a great resource that explains time-to-functionality and cost, how a solution helps defend against certain types of cyberattacks, and how to react to and overcome common objections.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;General business benefits of NIS2 Directive compliance&lt;/h3&gt;

&lt;p&gt;Some of the benefits of complying with the NIS2 Directive include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&lt;/strong&gt; by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits, et cetera. &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;According to a report by IBM&lt;/a&gt;, the average cost of a data breach in 2022 was US$4.82 million for critical infrastructure organisations and the average time to identify and contain a breach was 277 days. If you are taking measures to comply with the NIS2 Directive, the average time spent identifying and containing a breach will be much shorter, and costs of the attack will be lower.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality and similar factors. According to&amp;nbsp;&lt;a href="https://www.fisglobal.com/-/media/fisglobal/worldpay/docs/insights/consumer-intelligence-series-protectme.pdf" rel="noopener" target="_blank"&gt;a survey by PwC&lt;/a&gt;, 87% of consumers say they will take their business elsewhere if they don't trust a company's data practices, and 71% of consumers say they would stop using a company's products or services if they found out it was sharing their data without their permission, which could happen with a data leak.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors and so on.&amp;nbsp;&lt;a href="https://www.accenture.com/us-en/insights/security/state-cybersecurity" rel="noopener" target="_blank"&gt;Accenture&lt;/a&gt; has found that&amp;nbsp;companies that adopt advanced security technologies can reduce the cost of cybercrime by up to 48%.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Complying with other regulations or standards&lt;/strong&gt;&amp;nbsp;that require cybersecurity, such as GDPR, ISO 27001, PCI DSS or others.&amp;nbsp;&lt;a href="https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf" rel="noopener" target="_blank"&gt;Cisco&lt;/a&gt;&amp;nbsp;points out that 97% of organisations that follow GDPR see benefits such as gaining competitive advantage, achieving operational efficiency and reducing sales delays.&amp;nbsp;Similar results are probably achievable by following NIS2.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When it comes to budgeting,&amp;nbsp;the proposal for a directive by the European Commission&amp;nbsp;(&lt;a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12475-Cybersecurity-review-of-EU-rules-on-the-security-of-network-and-information-systems_en" rel="noopener" target="_blank"&gt;Anex 7 - 1.4.3&lt;/a&gt;)&amp;nbsp;mentions that for&amp;nbsp;companies&amp;nbsp;falling under the scope of the NIS2 framework, it’s estimated they would need an increase of a maximum 22% of their current ICT security spending for the first years following the introduction of the NIS2 framework.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, the proposal also mentions that this average increase of ICT security spending would lead to&amp;nbsp;a &lt;strong&gt;proportionate benefit&amp;nbsp;&lt;/strong&gt;from such investments, notably due to a considerable reduction in cost of cybersecurity incidents.&lt;/p&gt;

&lt;h2 id="two"&gt;2. Correctly implement new organisational and technical security measures&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;After researching the gaps and obtaining a budget, it’s time to close those gaps. The NIS2 Directive requires companies to implement appropriate organisational and technical measures to manage their cybersecurity risks and ensure a high level of security across their networks and information systems.&lt;/p&gt;

&lt;p&gt;These measures include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Adopting policies and procedures&lt;/strong&gt;&amp;nbsp;for risk management, incident response, business continuity, data protection, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establishing roles and responsibilities&lt;/strong&gt;&amp;nbsp;for cybersecurity governance, oversight, coordination and other areas.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Providing training and awareness programs&lt;/strong&gt; for staff, management, customers, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing basic cyber hygiene&lt;/strong&gt;&amp;nbsp;such as encryption, authentication (MFA), firewalls, antivirus software, patching, zero trust access and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting&lt;/strong&gt;&amp;nbsp;regular testing, monitoring, auditing and other measures.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Implementing those organisational and technical measures isn't a one-off or static task. It requires&amp;nbsp;&lt;strong&gt;establishing a continuous and dynamic process&lt;/strong&gt;&amp;nbsp;that adapts to changing threats, technologies, regulations and business needs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, the same advice applies for this process as for the other points we’ve already covered: the sooner you start, the more time you'll have to implement the necessary measures and ensure their effectiveness and efficiency.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;I would advise starting implementation&amp;nbsp;at least&amp;nbsp;in January 2024, so you’re ready before the summer holidays.&lt;/p&gt;

&lt;h3&gt;Next steps for NIS2 Directive implementations&lt;/h3&gt;

&lt;p&gt;Some possible steps that you can take to implement organisational and technical measures are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Developing and implementing&lt;/strong&gt; &lt;strong&gt;a risk-based management process&lt;/strong&gt;&amp;nbsp;that defines your objectives, scope, roles, responsibilities, resources, timelines and metrics for managing your cybersecurity risks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a security policy&lt;/strong&gt;&amp;nbsp;that establishes your principles, guidelines, standards and procedures for ensuring the security of your network and information systems.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting risk assessments&lt;/strong&gt; to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks; and prioritising your actions based on your risk appetite and tolerance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing security controls&lt;/strong&gt;&amp;nbsp;that protect your network and information systems from unauthorised access, use, disclosure, modification or destruction. These controls can be classified into three categories: preventive (e.g., encryption); detective, detective&amp;nbsp;&amp;nbsp;(e.g., monitoring), and corrective (e.g., backup).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing an incident response&lt;/strong&gt; &lt;strong&gt;plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for responding to cyberincidents effectively and efficiently.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a business continuity plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for maintaining or restoring your critical business processes during a cyber-related disruption or disaster.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a review and improvement plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for regularly evaluating, reporting and enhancing your cybersecurity measures.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing the technical controls&lt;/strong&gt; for asset management and &lt;strong&gt;basic cyber hygiene&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Directive’s reference to ‘basic cyberhygiene’ is a bit vague in&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt;, so we’ll dive into this in another blog post. For now, think about basic security measures such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;MFA.&lt;/li&gt;
	&lt;li&gt;Patching your OS and applications as quickly as possible.&lt;/li&gt;
	&lt;li&gt;Securing network connections on public networks.&lt;/li&gt;
	&lt;li&gt;Encryption of all drives (especially removable ones.)&lt;/li&gt;
	&lt;li&gt;Privilege management and education of all employees.&lt;/li&gt;
	&lt;li&gt;Subscribing to channels that give you information about the latest patches and priorities, like&amp;nbsp;Ivanti’s Patch Tuesday webinars.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="three"&gt;3. Fix the weakest link: find time to train every employee&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive recognises that human factors are crucial for cybersecurity and that employees are often&amp;nbsp;the &lt;strong&gt;weakest link&lt;/strong&gt;&amp;nbsp;— as well as the first line of defense – in preventing or detecting cyberattacks.&lt;/p&gt;

&lt;p&gt;The Directive requires organisations to &lt;strong&gt;provide&amp;nbsp;adequate training and awareness programs&lt;/strong&gt;&amp;nbsp;for their employees, users of digital services and other stakeholders on cybersecurity issues.&lt;/p&gt;

&lt;p&gt;Training all your employees is not a sporadic or optional task. It requires a regular and comprehensive program that covers topics such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Basic cybersecurity concepts and terminology.&lt;/li&gt;
	&lt;li&gt;Common cyberthreats and attack vectors.&lt;/li&gt;
	&lt;li&gt;Best practices and tips for cyberhygiene.&lt;/li&gt;
	&lt;li&gt;Cybersecurity policies and procedures, made relevant and simplified for end users.&lt;/li&gt;
	&lt;li&gt;Every user’s role and responsibilities for organisational cybersecurity.&lt;/li&gt;
	&lt;li&gt;How to report and respond to incidents.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is important to note that this training&amp;nbsp;&lt;strong&gt;should be received by everyone&lt;/strong&gt;&amp;nbsp;within the company, not only by IT employees. Even management should undergo this training.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A survey conducted for Ivanti&amp;nbsp;shows that a lot of employees are not even aware of mandatory cybersecurity training.&amp;nbsp;Just 27% of them feel “very prepared” to recognise and report threats like malware and phishing at work. 6% of them feel “very prepared” to recognize and report threats like malware and phishing at work.&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.enisa.europa.eu/publications/nis-investments-2022" rel="noopener" target="_blank"&gt;Enisa’s NIS Investments 2022 report&lt;/a&gt;, Enisa mentions that&amp;nbsp;40% of the surveyed OES (Operators of Essential Services) have no security awareness program for non-IT staff.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It is important to monitor who has&amp;nbsp;not&amp;nbsp;been trained yet and act on it. Training all your employees is not only beneficial for compliance but also for productivity, quality, innovation and customer satisfaction.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The best NIS2 advice we can give&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive is landmark legislation that aims to enhance the cybersecurity of critical sectors in the EU. It imposes significant obligations on organisations that fall under its scope, along with hefty fines and sanctions for non-compliance.&lt;/p&gt;

&lt;p&gt;Following the NIS2 Directive is a complex task. It demands&amp;nbsp;&lt;strong&gt;a proactive and comprehensive approach&lt;/strong&gt;&amp;nbsp;involving multiple steps,&amp;nbsp;stakeholders&amp;nbsp;and resources.&lt;/p&gt;

&lt;p&gt;The sooner you start preparing for it, the better prepared you will be when it becomes effective in October 2024.&lt;/p&gt;

&lt;p&gt;The best advice we can offer?&amp;nbsp;&lt;strong&gt;Do&amp;nbsp;not&amp;nbsp;wait till then: start&lt;/strong&gt;&amp;nbsp;preparing for the NIS2 Directive now!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Mon, 28 Aug 2023 17:43:02 Z</pubDate></item><item><guid isPermaLink="false">4eb78907-af94-46fb-8311-7c552e27e638</guid><link>https://www.ivanti.com/en-gb/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part One: Audits Take Time</title><description>&lt;p&gt;You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But you might be tempted to think that October 2024 is far away, right?&amp;nbsp;Think twice.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;After all, how can you know if you have plenty of time to prepare&amp;nbsp;if you don’t know how well you currently comply&amp;nbsp;with the projected regulations?&lt;/p&gt;

&lt;p&gt;So, between now and October 2024, you must audit your current cybersecurity status. Specifically:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Identify gaps in meeting the NIS2 directive’s requirements, starting now&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Review your current supply chain security flaws&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In the second part of this series, I’ll review&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/en-gb/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas you’ll need to address to fix&amp;nbsp;the gaps your audits uncover&lt;/a&gt;&lt;/em&gt;&amp;nbsp;— including how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Implement new organizational and technical security measures correctly.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id="one"&gt;1. Identify gaps in meeting the NIS2 Directive's requirements, starting now&lt;/h2&gt;

&lt;p&gt;The&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555" rel="noopener" target="_blank"&gt;NIS2 Directive&lt;/a&gt; is the EU-wide legislation on cybersecurity that provides legal measures to boost the overall level of cybersecurity in the EU. It modernises the existing legal framework to keep up with increased digitization and an evolving cybersecurity threat landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;&lt;a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2021)689333" rel="noopener" target="_blank"&gt;expands the scope of the cybersecurity rules&lt;/a&gt;&amp;nbsp;to new sectors and entities, improving the resilience and incident response capacities of public and private entities, competent authorities and the entire EU.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The NIS2 directive outlines increased measures for resilience against cyberattacks to minimize vulnerabilities and improve cyberdefense.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To comply with the NIS2 Directive, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Assess&amp;nbsp;&lt;/strong&gt;your cybersecurity posture&amp;nbsp;and identify any gaps or weaknesses that may expose you to cyber risks.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Map&lt;/strong&gt;&amp;nbsp;your existing policies, procedures and controls to the directive's requirements and see where to improve or update them.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Evaluate&lt;/strong&gt;&amp;nbsp;your incident response capabilities and reporting mechanisms and ensure they align with the directive's standards.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A big problem with the NIS2 is that it tells you what you&amp;nbsp;should&amp;nbsp;do, but not&amp;nbsp;how&amp;nbsp;you should do it. Luckily, multiple frameworks can help you with the how, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.nist.gov/cyberframework" rel="noopener" target="_blank"&gt;NIST CSF (Cybersecurity Framework)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;The&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO27001&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.iso.org/standard/75652.html" rel="noopener" target="_blank"&gt;ISO27002&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.cisecurity.org/controls" rel="noopener" target="_blank"&gt;CIS Controls&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" rel="noopener" target="_blank"&gt;IEC 62443&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In Belgium, the&amp;nbsp;&lt;a href="https://ccb.belgium.be/en/cyberfundamentals-framework" rel="noopener" target="_blank"&gt;CCB has created a Cyberfundamentals Framework&lt;/a&gt;&amp;nbsp;based on multiple frameworks with references to how the different parts of the frameworks relate to the GDPR and NIS2.&lt;/p&gt;

&lt;p&gt;After selecting the framework,&amp;nbsp;&lt;strong&gt;you must identify gaps&lt;/strong&gt;&amp;nbsp;in relation to the chosen framework and the directive's requirements. Identifying gaps is not a simple or quick task; it requires a thorough and systematic analysis of your organization's cybersecurity maturity and readiness.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You not only need to check your cybersecurity strategy and policies, but you also need to do a risk analysis to find the most critical assets and the cybersecurity risks they present, then consider security controls to bring down the risk score of those vital assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The sooner you start this process, the more time you’ll have&lt;/strong&gt;&amp;nbsp;to obtain the budget needed to address any issues and implement any necessary changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible NIS2 environment gaps&lt;/h3&gt;

&lt;p&gt;Some possible gaps that you may encounter in your environment are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a comprehensive cybersecurity strategy or policy&lt;/strong&gt;&amp;nbsp;that covers all aspects of risk management, incident response, business continuity, data protection, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a dedicated cybersecurity team or function&lt;/strong&gt;&amp;nbsp;that oversees, coordinates and monitors all cybersecurity activities and initiatives across the organization.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of adequate security controls or measures&lt;/strong&gt;&amp;nbsp;for protecting your network and information systems from unauthorized access, use, disclosure, modification or destruction.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of regular testing or auditing&lt;/strong&gt;&amp;nbsp;of your security controls or measures to ensure their effectiveness and compliance with the directive's requirements.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of proper training or awareness programs&lt;/strong&gt;&amp;nbsp;for your staff, management, other employees or other stakeholders on cybersecurity issues and best practices.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of clear communication or reporting channels&lt;/strong&gt;&amp;nbsp;for notifying relevant authorities or parties of any incidents or breaches that affect your services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential security solutions for your environment to comply with NIS2&lt;/h3&gt;

&lt;p&gt;To identify and fix these security gaps, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Run gap analysis frameworks or models&lt;/strong&gt;&amp;nbsp;that help you compare your current state with your desired state and identify areas for improvement.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement cybersecurity maturity models or standards&lt;/strong&gt;&amp;nbsp;that help you measure your level of cybersecurity performance and progress.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct a risk assessment&lt;/strong&gt;&amp;nbsp;to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Request external audits or assessments&lt;/strong&gt;&amp;nbsp;that help you validate your compliance status and identify any weaknesses or deficiencies.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="two"&gt;2. Review current supply chain security flaws with enough time to coordinate action with suppliers&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive also&amp;nbsp;introduces new provisions on supply&amp;nbsp;chain security&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e40-80-1" rel="noopener" target="_blank"&gt;chapter 0, point 54, 56&lt;/a&gt;), recognizing that cyber threats can originate from third-party providers or subcontractors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;requires organizations to ensure that their suppliers follow&amp;nbsp;appropriate security standards and practices&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21-2d&lt;/a&gt;) and regularly monitor their performance and compliance (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21–3&lt;/a&gt;).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This isn't without reason.&amp;nbsp;&lt;strong&gt;Supply chain attacks are on the rise&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2022/blackberry-commissioned-research-reveals-four-in-five-software-supply-chains-exposed-to-cyberattack-in-the-last-12-months" rel="noopener" target="_blank"&gt;BlackBerry research&lt;/a&gt;&amp;nbsp;with over 1500 IT decision-makers in 2022, four-fifths of respondents said they had been notified of an attack or vulnerability in their supply chain within the year. Seventy-seven percent said they uncovered hidden participants in their software supply chain that they weren't previously aware of.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.accenture.com/_acnmedia/PDF-116/Accenture-Cybersecurity-Report-2020.pd" rel="noopener" target="_blank"&gt;Accenture research&lt;/a&gt;&amp;nbsp;also reveals&amp;nbsp;40% of security breaches are indirect, occurring through the supply chain.&lt;/p&gt;

&lt;p&gt;Therefore,&amp;nbsp;&lt;strong&gt;securing your supply chain is essential&lt;/strong&gt;&amp;nbsp;for ensuring business continuity, resilience, reputation and trust.&lt;/p&gt;

&lt;p&gt;But in Ivanti’s&amp;nbsp;&lt;a href="/en-gb/resources/v/doc/ivi/2732/7b4205775465"&gt;&lt;em&gt;Press Reset: A 2023 Cybersecurity Status Report&lt;/em&gt;&lt;/a&gt;,&amp;nbsp;we found that&amp;nbsp;only 42%&amp;nbsp;of the over 1,300 executive leaders and security professionals surveyed said they're prepared to safeguard against supply chain threats, even though 46% call it a high-level threat.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Supply chain threats not only come via attacks&amp;nbsp;on solution providers like&amp;nbsp;&lt;a href="https://www.theverge.com/2022/3/22/22990637/okta-breach-single-sign-on-lapsus-hacker-group" rel="noopener" target="_blank"&gt;Okta&lt;/a&gt;,&amp;nbsp;&lt;a href="https://techcrunch.com/2021/07/05/kaseya-hack-flood-ransomware/" rel="noopener" target="_blank"&gt;Kaseya&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know" rel="noopener" target="_blank"&gt;SolarWinds&lt;/a&gt;, but also through partners either directly connected to your IT infrastructure or who can log into it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And don’t forget about attacks on your resource suppliers that may cripple them so they're unable to deliver certain resources you need for your own operations. You have to be prepared and&amp;nbsp;&lt;strong&gt;have backup vendors available&lt;/strong&gt;&amp;nbsp;who can supply those resources if your primary supplier is out of action due to a cyberattack or other cause.&lt;/p&gt;

&lt;p&gt;Supply chain security is a complex and challenging issue involving multiple actors, dependencies and interconnections — and cannot be achieved overnight.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You need to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear and transparent communication channels&lt;/strong&gt;&amp;nbsp;with your suppliers and define your expectations and obligations regarding cybersecurity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct regular audits and assessments&lt;/strong&gt;&amp;nbsp;of your suppliers' security practices and verify that they meet the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establish contingency plans and backup solutions&lt;/strong&gt;&amp;nbsp;in case of a disruption or compromise of your supply chain.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Furthermore, you must start engaging with your suppliers&amp;nbsp;&lt;strong&gt;as soon as possible&lt;/strong&gt;&amp;nbsp;and work together with them to ensure your supply chain is secure and resilient.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Supply chain security challenges for NIS2&lt;/h3&gt;

&lt;p&gt;Some possible challenges that you may face in securing your supply chain are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of visibility or transparency&lt;/strong&gt;&amp;nbsp;into your suppliers' security practices, policies, or incidents.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of trust or cooperation&lt;/strong&gt;&amp;nbsp;among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of consistency or alignment&lt;/strong&gt;&amp;nbsp;in security standards, requirements, or expectations across your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of resources or capabilities&lt;/strong&gt;&amp;nbsp;to monitor, audit or verify your suppliers' security performance or compliance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of contingency plans or backup solutions&lt;/strong&gt;&amp;nbsp;to mitigate or recover from any disruptions or compromises of your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of information&lt;/strong&gt;&amp;nbsp;as to what you expect from your supplier’s security practices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Supply chain security solutions for NIS2&lt;/h3&gt;

&lt;p&gt;To overcome these supply chain security challenges, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear contracts or agreements&lt;/strong&gt;&amp;nbsp;with your suppliers that specify their security obligations, responsibilities and liabilities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Develop common security criteria, guidelines or frameworks&lt;/strong&gt;&amp;nbsp;that apply to all suppliers in your supply chain and align with the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement security controls, measures or tools&lt;/strong&gt;&amp;nbsp;that enable you to track, monitor or verify your suppliers' security activities, incidents or compliance status.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Create joint security teams, committees or forums&lt;/strong&gt;&amp;nbsp;that facilitate information sharing, collaboration and coordination among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Build trust and mutual understanding&lt;/strong&gt;&amp;nbsp;with your suppliers through regular communication, feedback&amp;nbsp;and recognition.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;When your NIS2 Directive audits are complete, now what?&lt;/h2&gt;

&lt;p&gt;Now that you’ve determined where you currently stand in relation to the NIS2 Directive, it’s time to implement critical changes to ensure compliance by October 2024. I’m certain that addressing the gaps that your audits identified will require all the time you have — and then some! – before the regulations are officially implemented in your country.&lt;/p&gt;

&lt;p&gt;But how can you systematically address these gaps in a timely fashion? We discuss&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/en-gb/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas of security changes you’ll need for NIS2&lt;/a&gt;&lt;/em&gt; in our next blog post, as we examine how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Correctly implement new organization and technical security measures.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;</description><pubDate>Mon, 28 Aug 2023 17:14:55 Z</pubDate></item><item><guid isPermaLink="false">1856f0ee-a20d-4b24-96f7-5ea891f3331c</guid><link>https://www.ivanti.com/en-gb/blog/patching-within-14-days-insight-prioritization-and-management</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Patching within 14 days – Insight, Prioritization and Management</title><description>&lt;p&gt;In recent months the number of phishing emails has increased by 30,000%. Most of the time, those phishing attacks make use of exploits within systems. Very often a patch is already available for these exploits. In an average of 22 days after a patch is released, cybercriminals create an exploit that takes advantage of the vulnerabilities that the patch solves. This means it is important to patch as soon as possible, preferably around 14 days after the release of a patch. That way you have a few days left in case you hit problems when deploying the patch. But how do you get insight of your patch status and SLA compliancy and perhaps more importantly, how do you make sure that your systems are actually patched within that timeframe??&lt;/p&gt;

&lt;h2&gt;SLA time-to-patch&lt;/h2&gt;

&lt;p&gt;In June, the Cybersecurity Image Netherlands 2020 was released. It states that less than half of vulnerabilities are patched at companies within 90 days. This means that you as a company, are vulnerable to a problem for more than 2 months. A problem that could easily have been patched already. The first thing is to understand whether you get that 21-day SLA and which systems are in danger of falling outside this window. Ivanti Neurons for Patch Intelligence connects to Ivanti’s patch solutions to give you this insight. The first thing you see after going to Ivanti Neurons for Patch Intelligence is the status of your environment, how many machines are compliant and how many are on the edge to exceed the SLA. The SLA can be set to patch type, such as critical or important security patches or critical non-security patches. In the example below, the SLA is set to 21 days and warns when systems only have 7 days or less left. This way you get a warning 14 days after the release of a patch that you need to implement in your environment.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/11/patch-intelligence-graphic-1.png"&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Patch Change Ticket priorization&lt;/h2&gt;

&lt;p&gt;There are a view stages within Continuous Vulnerability Management where Ivanti Patch Intelligence provides the necessary insights.&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/11/patch-intelligence-graphic-2.png"&gt;&lt;/p&gt;

&lt;p&gt;After the Patch Assessments by one of Ivanti’s patch solutions, the outcome is uploaded to Ivanti Neurons for Patch Intelligence, so you get an overview of all the patchesmissing in your environment. With this data, Change Requests can be made in your Service Management solution. When using Ivanti Security Controls and Ivanti Automation, it is possible to have Change Requests automatically created directly from the Patch Assessment step.&lt;/p&gt;

&lt;p&gt;To assess Change Requests regarding patches, it is important that you and the CAB (Change &amp;nbsp;Advisory &amp;nbsp;Board) gain insight on how reliable a patch is – both in deployment and how they operate after installation. With that data you can select which patch process applies to the Change Request and whether a patch needs an additional test cycle or first needs to be rolled out to a pilot group. Ivanti Neurons receives anonymous information from Ivanti Neurons customers and other sources about how often a patch installation fails and whether a patch causes problems in the operation of applications. This data is used by Ivanti Neurons for Patch Intelligence to give insight in reliability of a patch and help you understand expected deployment issues. &amp;nbsp;You will also receive tips on how to prevent or work around some issues. This information is collected through Ivanti customers, Microsoft and forums.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/11/patch-intelligence-graphic-3.png"&gt;&lt;/p&gt;

&lt;p&gt;To determine the priority of a Patch Change Request, you need to understand the importance of the problem that the patch is solving. Ivanti Neuron's for Patch Intelligence indicates a threat score, the CVSS score, that runs from 0 to 10. The higher the number, the more important it becomes to install the patch as quickly as possible. In addition, Ivanti Neurons for Patch Intelligence indicates whether a problem solved by a patch, is already used in cyberattacks. Together with a trend analysis of social media, this data can be used to determine priority of patches and which systems need to be patched first. After all, a high threat score, the fact that a problem is already used in attacks and that it is widely discussed on social &amp;nbsp;media, gives a huge chance that the exploit will also be used to attack your systems and the patch should be immediately rolled out over your environment.&lt;/p&gt;

&lt;p&gt;More information can be found at &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management" target="_blank" rel="noopener"&gt;Ivanti Neurons for Patch Intelligence | Ivanti&lt;/a&gt;&amp;nbsp; or make an appointment for a demo through your account manager.&lt;/p&gt;</description><pubDate>Mon, 09 Nov 2020 16:03:38 Z</pubDate></item><item><guid isPermaLink="false">9a4ce0c5-d188-4cde-918b-56507b9b4a31</guid><link>https://www.ivanti.com/en-gb/blog/ditch-manual-patching-in-the-datacenter</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Ditch Manual Patching in the Datacenter</title><description>&lt;p&gt;Patching in the datacenter is still a lot of manual work. That is the conclusion I could make after talking to several of our customers, partners, and service providers. Ivanti can help streamline the patch process of your backend servers using &lt;a href="https://www.ivanti.com/products/automation" target="_blank" rel="noopener"&gt;automation&lt;/a&gt; and integrating with your service management solution.&lt;/p&gt;

&lt;p&gt;In the talks I have had with the different administrators in the last half year, I heard a lot of the same manual tasks being mentioned for the patch process:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You have to get an overview of all missing patches on at the different systems. Mostly this is a manual task and it is difficult to find out if a patch is applied. It’s even worse for systems that are under control of a different administrator. It is difficult for security officers to get the big picture of the patch status of all systems.&lt;/li&gt;
	&lt;li&gt;After creating the reports of missing patches, you must create different change requests for all the systems that need updates. The change requests have to reflect which patches need to be applied and which underlying systems are going under maintenance in that process to determine the maintenance window.&lt;/li&gt;
	&lt;li&gt;At the time of the maintenance window, an administrator has to logon to the server and install the patches, reboot the server and close the change request reflecting the status of the patches. Most of the time those maintenance windows are in off hours, making it work late in the evening at the office.&lt;/li&gt;
	&lt;li&gt;It is difficult to find out if a patch is applied rightly on the systems and to get an overview of the status of all systems after installing the patches.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On top of this, there are also “forgotten” applications on servers. Applications that are installed on systems with other software, like Adobe Acrobat. Or applications that where installed on a system to quickly do some tasks, such as Google Chrome to download a piece of software needed on the server. Those application are mostly forgotten in the process to check which patches are needed. But most attacks happen by targeting such 3rd party software on servers.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/security-controls" target="_blank" rel="noopener"&gt;Ivanti Security Controls&lt;/a&gt; delivers agentless patching in the datacenter. Scanning for patches for the OS as well as a lot of third party software, such as Adobe Acrobat, Flash, Java, Google Chrome and Firefox. By combining it with &lt;a href="https://www.ivanti.com/products/automation" target="_blank" rel="noopener"&gt;Automation&lt;/a&gt;, it enables you to automate a lot of the patching process. It can scan the systems automatically in off hours, creating reports of the hole environment for administrators and the security officer.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/automation" target="_blank" rel="noopener"&gt;Ivanti Automation&lt;/a&gt;&amp;nbsp;also integrates with your service management solution. We have a direct integration between Ivanti Automation and &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank" rel="noopener"&gt;Ivanti Service Manager&lt;/a&gt;, but we can also connect to other solutions using API’s. With this integration it is possible to automatically create a change request when a scan with Ivanti Security Controls shows that there are patches missing. CI’s are linked to the change request to show what system is going down and with that information Ivanti Service Manager can also show which other systems are going to be affected by the patch deployment. The only thing that is left for the administrator is approving the change and set a maintenance window.&lt;/p&gt;

&lt;p&gt;At the time of the maintenance window, Ivanti Service Manager can start the patch deployment. An administrator does not have to spend its evening at the office and just have to be standby at home.&lt;/p&gt;

&lt;p&gt;First the servers being patched are set to ‘Under Maintenance’ in the Service Management solution. This give other users, like the support desk, insight in which systems are down at that moment. Ivanti Security Controls installs all the patches and reboots the server if necessary. At the end of the deployment the server is scanned again for missing patches, to check if all patches are rightly deployed and results are sent back to Automation. If all patches installed without problems, the change request is closed and the CI is put back into production within Ivanti Service Manager. If one of the patches failed, Ivanti Automation will keep the change request open, the CI is kept under maintenance and the administrator is notified by email or SMS that something is wrong and needs manual intervention.&lt;/p&gt;

&lt;p&gt;Because Ivanti Security Controls scans the system after patch deployment, the status is immediately changed in all reports for administrators and the security officer, reflecting the change in installed and missing patching.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/03/patch.png"&gt;&lt;/p&gt;

&lt;p&gt;Using Ivanti solutions automates a lot of manual work from the patching process but keeps you into control. It gives better insight in the patching status of your environment at any time. Using &lt;a href="https://www.ivanti.com/products/security-controls" target="_blank" rel="noopener"&gt;Ivanti Security Controls&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/automation" target="_blank" rel="noopener"&gt;Automation&lt;/a&gt;, and &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank" rel="noopener"&gt;Service Manager&lt;/a&gt; gives you the power of true Unified IT and makes your live as administrator, IT manager or security officer a lot easier.&lt;/p&gt;

&lt;p&gt;The video below shows this Unified IT power in action. For more information how we can help you, please contact your account manager.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="402670612"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Wed, 01 Apr 2020 09:09:00 Z</pubDate></item></channel></rss>