Understand the NIS 2 Directive impact on supply chains. Implement security baselines, mapping, and compliance controls
Sub Category
- Operations
{inAds}
Objectives
- Trace the evolution of European cybersecurity legislation and understand the expanded regulatory scope of the NIS 2 Directive
- Classify essential and important entities within logistics networks using the universal size-cap rule and turnover metrics
- Apply the all-hazards approach to protect supply chain infrastructure from both digital cyberattacks and physical disruptions
- Embed cybersecurity criteria into procurement processes, vendor selection workflows, and requests for proposals (RFPs)
- Map N-tier digital and physical supply chain dependencies to identify hidden vulnerabilities and single points of failure
- Implement the technical and organizational measures (TOMs) mandated by Article 21, including encryption and network segmentation
- Develop comprehensive business continuity plans with strict recovery time objectives (RTO) and alternative sourcing strategies
- Execute multi-stage incident reporting protocols to meet the stringent 24-hour and 72-hour regulatory notification deadlines
- Analyze the legal shift in corporate governance, including the personal liability of executive management for security failures
Pre Requisites
- A basic understanding of supply chain operations, procurement processes, or corporate IT concepts.
- No prior legal or technical cybersecurity background is required to begin.
FAQ
- Q. How long do I have access to the course materials?
- A. You can view and review the lecture materials indefinitely, like an on-demand channel.
- Q. Can I take my courses with me wherever I go?
- A. Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
{inAds}
Coupon Code(s)