Visit us at it-sa 2024!

GetyourfreeticketGetyourfreeticket

Fact Sheet

Implementing NIS-2 Requirements with Myra

By October 17, 2024, all affected companies must have implemented the new requirements of the NIS-2 Directive. Find out in this fact sheet how you can greatly simplify the implementation of required measures with Myra.

 
✔   What cybersecurity requirements does NIS-2 contain?

✔   What requirements can Myra help with?

✔   What are Myra's implementation approaches?
 

Download the fact sheet

Over 10 Years of Experience in Critical Infrastructure (KRITIS)

Myra Security has been protecting a wide range of organizations in sensitive and critical sectors for years, including healthcare services, financial institutions, insurance companies and government institutions. Thanks to its many years of experience and expertise, Myra knows the specific requirements and challenges associated with securing critical infrastructures.

  • Myra is itself a KRITIS company and therefore meets all compliance requirements.

  • Myra is an expert in protecting against cyber attacks in the KRITIS sector.

  • Our solutions are comprehensively certified and audited.

NIS-2 Timeline

The NIS-2 Directive was adopted by the European Parliament in November 2022 and came into force on January 16, 2023. From this date, the member states have 21 months to transpose the provisions into national law. This means that affected companies must fully implement the new regulations by October 17, 2024. The revised directive expands the scope and requirements of the original 2016 NIS Directive to reflect current threats and technological developments. In Germany, around 30,000 organizations are covered by the new regulation.

NIS-2-Timeline

 

Worry-free compliance with Myra

Cybersecurity Requirements in NIS-2

NIS-2 concentrates the cyber security requirements into seven key areas in order to strengthen the resilience of operators and facilities. Risk management should be emphasized as a central component of the requirements. The specific requirements for the individual areas are defined in paragraphs 30 to 35, 38 and 39. These include the following:
 

  1. Risk analysis and security for information systems

  2. Management of security incidents

  3. Business continuity, recovery, backup management, crisis management

 
For the full list of key requirements and how you can implement them with Myra's solutions, simply download the Compliance Fact Sheet.

NIS-2-Compliant with Myra

in just 3 steps

Download the fact sheet

Find out which NIS 2 requirements we can support you with.

Identify need for action

In which areas do you not yet meet the NIS 2 requirements?

Get in touch

We help you with the implementation with our IT security solutions.

NIS-2-Compliance – Frequently asked questions (FAQ)