NIS2 with DTS

Get ready for NIS2!

The clock is ticking! NIS2 is getting closer and closer and many companies are getting anxious about the topic. The problem? NIS2 affects a large number of companies and is legally binding.

What exactly is behind the EU directive and what requirements are included? Are you affected and what are the consequences for you?

Non-compliance can result in severe fines. For this reason, we would like to use our expertise to help you develop individual packages of measures, design your IT security and secure your future "compliantly" - also for NIS2 and all from a single source!

Sven Rössig
Head of Information Security
+49 5221 1013-402 Contact

What is NIS2?

  • Binding EU directive
  • Applies to numerous companies & organizations from October 2024
  • New IT security measures & reporting obligations

What are the goals?

  • Higher level of cybersecurity in the EU
  • Uniform security standards
  • Framework for secure innovation & digitalization

Who is affected by NIS2?

  • Public & private organizations in 18 sectors
  • Organizations with at least 50 employees and/or at least €10 million annual turnover
  • Critical entities (according to CER directive), regardless of size

Requirements & Measures

Requirements according to NIS2

  • Asset management
  • Maintenance & recovery (business continuity & crisis management)
  • Vulnerability management
  • Integration of “state of the art” compliance measures
  • Risk management (effectiveness of security measures)
  • Incident management
  • Cryptography, especially for communication
  • Security of the supply chain (supply chain security)
  • Personnel security (education & training, access controls, authorization concept)
  • Registration obligation, reporting obligations, sanctions & liability

Necessary measures to strengthen IT

  • Business continuity: Backup management, disaster recovery, crisis management
  • Effectiveness: Specifications for measuring cyber & risk measures
  • Purchasing: Security in the procurement of IT & network systems
  • Incident management: Prevention, detection & management of security incidents
  • Communication: Secure voice, video & text exchange
  • Cryptography: Encryption wherever possible
  • Policies: Guidelines for risks & information security
  • Supply chain: Security in the supply chain
  • Access control: Use of MFA & SSO

NIS2 Workshops

Understanding NIS2

Ensure that there is a clear understanding of the objectives, requirements & implementation of NIS2

Development of implementation strategies

Joint development of strategies for the most effective technological and organizational implementation of NIS2 requirements

Ensuring conformity

Ensure a clear understanding of how to meet NIS2 requirements in their organizations & remain compliant at the same time

Raising awareness

Promote awareness of the importance of cybersecurity & NIS2 in the participating organizations to create a common security culture

Workshop NIS2

Increase understanding of NIS2 & current threats to information systems security | Communicate best practices for detecting, preventing & responding to security breaches | Collaboratively develop a complete security strategy

Workshop Risk Management

Providing a solid understanding of risk management in the context of NIS2 | Identification, evaluation & control of existing risk management measures | Proactive risk avoidance & management or implementation of risk management

Workshop Information Management System

In-depth exploration of the importance of ISMS & its critical role in today's business landscape | Fundamentals of ISMS | Illuminate the facets that make it an indispensable element for the success & integrity of organizations | Concrete strategies for implementation & optimization in your organization

Workshop for technical & organizational Measures (State of the Art)

Discussion about the synergy between technology & organization | Identification of suitable measures

Workshop State of the art

Raising security awareness | Analysis of suitable measures | Development of innovation potentials

NIS2 & DTS Cockpit

 

The features of our DTS Cockpit support you in fulfilling NIS2 requirements!

Implement compliance successfully & sustainably with THE
central 24/7 security operations platform.

 

DOWNLOAD

NIS2 & DTS Identity

 

The features of our DTS Identity support you in fulfilling NIS2 requirements!

Implement compliance successfully & sustainably with one platform for all identities.
 

DOWNLOAD

Let's have a talk!


Get free and easy advice.


arrange a conversation

Sven Rössig
Head of Information Security
sven.roessig@dts.de+49 5221 1013-402

Privacy Settings

Please select under "Edit Cookie Settings" for which purpose this website may use cookies.

For more information, please see our privacy policy.

Essential Cookies

These cookies are necessary for the operation of the website and cannot be switched off in our systems. They are usually only set in response to your actions that amount to a request for services, such as setting your privacy preferences or logging in.  You can set your browser to block or alert you about these cookies, but some parts of the website will not work. These cookies do not store any personally identifiable information.
 

NameProviderToolPurposeDurationType

PHPSESSID

DTS

-

User recognition

Session (end of session)

HTTP-Cookie

cookieoption

DTS

-

Opt-In-Cookie, which saves the visitor's cookie settings.

30 days

HTTP-Cookie

loyjoy-chat

stable.loyjoy.com

LoyJoy

LoyJoy is a chatbot used on our website to provide interactive conversations and support to visitors. We use cookies to collect and analyze information about LoyJoy's interactions with visitors. These cookies can help improve the user experience and ensure that visitors receive prompt and relevant answers to their questions.

Permanent

HTML Local Storage

rc::a

Google

Google Recaptcha

This cookie is used to distinguish between humans and bots. This is beneficial for the website to create valid reports about the use of your website.

Permanent

HTML Local Storage

rc::c

Google

Google Recaptcha

This cookie is used to distinguish between humans and bots.

Session (end of session)

HTML Local Storage



Additional information

Google: https://business.safety.google/privacy/

Analytic Cookies

We use analytics to improve our website - tracking how our website visitors use our website, which pages they visit most often and how long they spend on our website. We rely on cookies and third-party partners to track these actions and behaviors.
 

NameProviderToolPurposeDurationType
GTM-MHV6XC6GoogleGoogle Tag ManagerUsed to obtain the session status. Google Tag Manager is a service for managing tags that are triggered by a specific event, insert a third-party script or send data to a third-party service. No cookies in the technical sense are set on the user's client device, but technical and personal data such as the IP address are transmitted from the client to the service provider's server to enable the use of the service.399 daysHTTP-Cookie
_gaGoogleGoogle AnalyticsRegisters a unique ID that is used to generate statistical data on how the visitor uses the website.400 daysHTTP-Cookie
_ga_1S0WX4XQVMGoogleGoogle AnalyticsCollects data on how often a user has visited a website, as well as data for the first and last visit.400 daysHTTP-Cookie



Additional information

Google: https://business.safety.google/privacy/

Marketing cookies

Our advertising partners enable us to provide you with relevant advertising on the internet based on your interests. They may also be used to measure the effectiveness of our advertising campaigns. These partners may collect information about you, such as information about your browser, your location and/or your IP address.
 

NameProviderToolPurposeDurationType
GTM-MHV6XC6GoogleGoogle Tag ManagerUsed to obtain the session status. Google Tag Manager is a service for managing tags that are triggered by a specific event, insert a third-party script or send data to a third-party service. No cookies in the technical sense are set on the user's client device, but technical and personal data such as the IP address are transmitted from the client to the service provider's server to enable the use of the service.399 daysHTTP-Cookie
_gcl_auGoogleGoogle Tag ManagerContains a randomly generated user ID.90 daysHTTP-Cookie
AW-11059446345GoogleGoogle AdsUsed to obtain the session status.399 daysHTTP-Cookie
IDEGoogleDoubleClickUsed by Google DoubleClick to register and report the user's actions on the website after viewing or clicking on one of the provider's ads, with the purpose of measuring the effectiveness of an advertisement and displaying targeted advertising to the user.390 daysHTTP-Cookie
test_cookieGoogleDoubleClickUsed to check whether the user's browser supports cookies.1 dayHTTP-Cookie
_fbpMeta Platforms, Inc.Meta PixelUsed by Facebook to display a range of advertising products, e.g. real-time bids from third-party advertisers.90 daysHTTP-Cookie
_fbcMeta Platforms, Inc.Meta PixelUsed by Facebook and stores information about your last visit to this website.90 daysHTTP-Cookie
lastExternalReferrerMeta Platforms, Inc.Meta PixelDetermines how the user reached the website by registering their last URL address.PermanentHTML Local Storage
lastExternalReferrerTimeMeta Platforms, Inc.Meta PixelDetermines how the user reached the website by registering their last URL address.PermanentHTML Local Storage
li_gcLinkedInLinkedIn AdsSaves the user's consent status for cookies on the current domain.180 daysHTTP-Cookie
lidcLinkedInLinkedIn AdsEnsures the selection of the data hub.1 dayHTTP-Cookie
bcookieLinkedInLinkedIn AdsThis cookie is a browser identifier. It is used to uniquely identify devices that access LinkedIn in order to detect misuse of the platform.365 daysHTTP-Cookie
cookietestbrame-gamification.comBrame-Session (end of session)HTTP-Cookie
domain_session_idbrame-gamification.comBrame-PermanentHTML Local Storage



Additional information

Google: https://business.safety.google/privacy/
Meta: https://www.facebook.com/privacy/policy/?entry_point=data_policy_redirect&entry=0
LinkedIn: https://de.linkedin.com/legal/privacy-policy?



Collected data from the Google Tag Manager

This list contains all (personal) data collected by or through the use of this service:

  • Device information
  • Geographical location
  • Browser information
  • Device operating system
  • Screen resolution
  • Referrer URL
  • Interaction data
  • Date and time of the visit
  • User behavior
  • Visited pages
  • Online identifiers
  • Shortened IP address
  • User ID
  • Advertising identifier
Contact
Support
Newsletter
Cloud Portal

How to reach us:

Support

Hotline

To open a ticket, simply call our 24/7 hotline:
 

+49 5221 101 303-2

Email

To open a ticket, simply email us with your technical issue:
 

support@dts.de

Web frontend

Enter new tickets in the web frontend, view and classify all open tickets etc.

support.dts.de

Remote support

Enables remote connections to your endpoints:
 

support-remote.dts.de

Subscribe now!

Current information about DTS, our products, events and other news about the entire group of companies.

DTS in general

Login

DTS Systeme Muenster

Login

DTS Cloud Portal

The DTS Cloud Portal is our platform for you to easily and flexibly add and manage your DTS Cloud products and services. The intuitive platform allows you to configure selected products individually and thus adapt them exactly to your requirements.