Show all
New

The 10 most common myths about NIS2

How to understand the new cybersecurity law and not be misled by half-truths
 
Level
Designed for participants without knowledge and experience
basic
Course length
60 minutes
Language
 cz
Course code
PU25010026
Webinar
Category:
Do you want this tailor-made course to your company? Contact us

Courses with lecturer

Term
Language
Place
Form
?
How and where the course takes place.
Price without VAT
N
Novinka
14. 1. 2026 14:00 - 15:00
Language
Place
online
Form
webinar
?
Short online event with instructor.
Code of the course: PU25010026-0001
Price without VAT
0 Kč

Course description

The European NIS2 Directive and the new Cybersecurity Act are fundamentally changing the rules for thousands of Czech companies. However, there are many myths and inaccuracies circulating in the media and among companies—from the claim that NIS2 only applies to IT companies to the assertion that ISO 27001 certification is sufficient.
In our webinar "10 Most Common Myths About NIS2," you will learn:
What NIS2 actually requires and who it applies to
How to distinguish reality from myths and avoid unnecessary panic
What obligations Czech companies have under the new law
What role management plays and why responsibility does not lie solely with IT
what steps make sense to take and in what order

Target audience

The webinar is intended for company management, compliance officers, IT managers, and anyone who wants to understand NIS2 clearly and without unnecessary technical details.

Objectives

The webinar is intended for anyone who wants to understand NiS2 clearly and without unnecessary technical details.
You will learn: What is changing for you, what to do about it, and how to be prepared.

Lecturers

Jiřina Nováková
Jiřina Nováková

Jiřina is dedicated to information systems analysis, process analysis and cybersecurity. She is registered as an expert in the field of cybernetics and her work experience includes work for the Ministry of the Interior, the Office of the Government of the Czech Republic, the Czech National Bank, the European Commission and a number of private companies. She has taught analysis at Charles University and in private courses.

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 1. 8. 2024
How to become a cybersecurity expert

If you want to be a cybersecurity expert and become a security architect, we have great news for you. We have prepared a series of courses that will help you fully master the issue of strategic design of the safety and security of the organization.

Náhledový obrázek novinky
Fortinet 22. 2. 2024
New Fortinet certification program

The new certification model includes five levels of expertise, encompassing several certifications. This allows individuals to more easily choose suitable courses and exams based on their job positions and intended career paths.

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Follow-up courses

Do you want this tailor-made course for your company?

Contact us

News with the course

Náhledový obrázek novinky
Security 1. 8. 2024
How to become a cybersecurity expert

If you want to be a cybersecurity expert and become a security architect, we have great news for you. We have prepared a series of courses that will help you fully master the issue of strategic design of the safety and security of the organization.

Náhledový obrázek novinky
Fortinet 22. 2. 2024
New Fortinet certification program

The new certification model includes five levels of expertise, encompassing several certifications. This allows individuals to more easily choose suitable courses and exams based on their job positions and intended career paths.

Náhledový obrázek novinky
Security 18. 1. 2024
Successful first run of the new Cybersecurity course

We have completed the initial run of our course Cyber Security Architect I. What are the participants' reactions?

Why with us