Cybersecurity

NIS2 compliance

The European Union responds to cyber threats by implementing NIS2 Directive, leading to the creation of a new Cyber security Act in the Czech Republic. If you are interested in obtaining more information about the NIS2 Directive and the obligations it imposes on your company, we are ready to provide you with a non-binding consultation.

KEY

INFORMATION ABOUT NIS2

The goal of the NIS2

The main goal of the NIS2 Directive is to raise general cyber-security across the EU.

Sanctions

Administrative sanctions may include the suspension of certificate validity and also the suspension of performing managerial functions for providers of regulated services.

Serious Disruption of Business Operations

The introduced measures will protect key EU market leaders from data loss and the hindrance of essential business activities.

Financial Penalty

The fine can reach up to 2% of the company's global annual turnover or CZK 250 million.

Validity

The directive is planned to take effect in the first half of 2024 with a one-year transitional period.

Expansion of Scope

The directive will newly apply to up to 6000 companies (currently there are 400 entities regulated).

OUR SERVICES TO GET YOU

PREPARED FOR NIS2

Analysis

Cyber-security Scope

Assessment of Single Measures

Fit Gap Analysis

Implementation Action Plan

Cost Estimate

Implementation

Adjustment of Documents

Process Implementation

Regulatory Reporting

Establishing of Control System

Technical Measures

OUR PROCESS OF

NIS2 IMPLEMENTATION

1
Analysis of current state of cyber security
We carry detailed research of your current IT state. We identify potential weaknesses and risks so we better understand your cyber security needs.
2
Creating an action plan
Based on the analysis results we will design precise steps required to strengthen the cyber security of your company. Our goal is to lower the risks and become more resilient towards potential threats.
3
Creating of documentation
We will prepare detailed documentation for you containing key cyber security aspects, including security policy. The security policy defines principles and rules that must be followed to protect the safety of information and technological assets. This documentation ensures a unified and structured approach to security matters and appropriately incorporates all regulatory requirements, reflecting them proportionally into the company's processes.
4
Process implementation
We will implement the suggested steps and recommendation into practice. We will introduce new safety processes such as regular updates, data back up and monitoring of potential threats so your virtual environment is better protected and corresponds with NIS2 requirements.
5
Security architecture proposal
We will design a comprehensive security framework, that will include technological solutions, infrastructure and protection strategy. This will ensure your systems will be resilient against wide range of cyber-attacks.

How is this

benefiting you

1

Enhanced protection against cyber-attacks or data theft from internal employees/suppliers

2

Increased transparency and stability for partners

3

Prevention against the possible company destabilization by regulators

4

Improved level of knowledge in the field of cyber threats and required regulations

5

Overview of the processes, information, and services utilized within your company

6

Reduction of financial costs through timely implementation

OTHER SERVICES

In the Cyber-security Field

  • Regular Audit

  • Hiring of Security Experts

  • Penetration Testing and Ethical Hacking

  • Securing Project Funding from EU Grants

  • Regular Training and Testing of Employees

  • Consultation and Proposal for Implementing Procedures according to GDPR, NIS Directive, ISO 27001, and other best practices

Meet our Experts

Our team is composed of experts with experience in implementing both procedural and organizational measures according to ISO standards, ISMS, GDPR, ITIL, as well as in preparing technical design and architecture in IT security.

WhatsApp Image 2023-07-25 at 11.14
Viktor Fuka
Security Architect

Certifications
Cyber-security Manager according to NÚKIB, ITIL v4 Foundation level, ISO/IEC 20000 Foundation

Kreslicí plátno 1_2
Jan Večerek
Security Consultant

Certifications
Cyber-security Manager according to NÚKIB, 
ITIL v4 Foundation level, 
ISO/IEC 20000 Foundation

WhatsApp Image 2023-07-25 at 11.14
Ondřej Ptáček
Security Consultant

Certifications
Cyber-security Manager according to NÚKIB, ITIL v4 Foundation level, ISO/IEC 20000 Foundation

WhatsApp Image 2023-07-25 at 11.14
Jan Andraščík
Security Manager

Certifications
Certified Data Privacy Solutions Engineer – ASACA, Certified Information Systems, Security Professional – ISC2 

Are you interested in an introductory consultation where we can discuss how NIS2 will impact your company?

Connect with our expert

Vít Vávra

Sales Director

+420 731 101 573

vit.vavra@granton.cz