Contents
Legal requirements for the IT security of companies as of today
- Acquisition of comprehensive insights into the requirements and obligations for IT security based on the currently applicable laws, in particular the BSI Act, the GDPR and the KontraG.
Contents of the EU NIS2 Directive
- Objective and scope of the EU NIS2 Directive.
- Risk management obligations, documentation and reporting.
- Personal liability of managers due to extended cyber security obligations.
- Timetable for implementing the directive.
Contents of the NIS2UmsuCG
- Germany's cyber security strategy, central contact points for cyber security and establishment of computer emergency response teams (CSIRT) and extended tasks for the BSI.
- Scope of the law: size, turnover, sectors and thresholds.
- Risk management measures, reporting and notification obligations.
- Liability, in particular personal liability of managing directors and board members.
- Statements from associations and political groups.
- Timetable for the application of the new law.
Practical application
- Application of the acquired knowledge using examples.
Improving the IT security strategy
- Support in the development or improvement of your organization's IT security strategy in accordance with the NIS2 directive and the NIS2UmsuCG.
Networking and exchange of experience
- Opportunity to exchange ideas with subject matter experts and colleagues from various industries to share insights and experiences.
Preparation for future developments
- Raising awareness of current legislative developments in the area of information security in order to be able to react actively to changes.
Learning environment
Once you have registered, you will find useful information, downloads and extra services relating to this training course in your online learning environment.
Your benefit
Updated knowledge:
- Understanding of the latest EU regulations and planned national regulations in information security. Systematic understanding of how the new standards fit into the network of current and planned IT security requirements of European and German legislators.
Compliance fulfillment:
- Knowledge of compliance with the legal requirements of the NIS2 Directive and the NIS2UmsuCG; differentiation from data protection regulations.
Practical implementation strategies:
- Learn effective approaches for implementing the NIS2 requirements in your own company.
Network expansion:
- Opportunity to exchange ideas with industry experts and like-minded people.
Methods
Lecture and presentation, specific case studies, practical design tips, answers to questions.
Recommended for
The training is aimed at IT security experts and officers, IT information and compliance officers, risk managers and executives working in areas such as critical infrastructures or companies with more than 50 employees or more than 10 million euros in turnover per year.
Seminar evaluation for "NIS 2 Directive and NIS2UmsuCG"







36435
Start dates and details
Friday, 08.08.2025
09:00 am - 5:00 pm
- one joint lunch per full seminar day,
- Catering during breaks and
- extensive working documents.

Tuesday, 18.11.2025
09:00 am - 5:00 pm
Friday, 20.03.2026
09:00 am - 5:00 pm
- one joint lunch per full seminar day,
- Catering during breaks and
- extensive working documents.
- one joint lunch per full seminar day,
- Catering during breaks and
- extensive working documents.
FAQ on the training NIS 2 Directive and NIS2UmsuCG
Who is affected by the NIS 2 Directive?
The NIS 2 Directive affects companies that are considered critical infrastructure. The training helps you to understand whether your company is one of them and which specific requirements need to be implemented.
What are the main changes to the NIS 2 Directive?
The changes include extended reporting obligations and higher security requirements. The training teaches how these new requirements can be implemented in a legally compliant manner.
Why is the NIS 2 directive important for my company?
The directive protects critical infrastructures from cyber attacks. The training shows how companies can be better protected through compliance guidelines and security measures.
When do security incidents have to be reported?
The reporting deadlines have been shortened and are binding. The training explains how to set up an efficient reporting system in order to meet deadlines and avoid penalties.
How do I create a security strategy in accordance with NIS 2?
In the training you will learn methods for developing a security strategy that fulfills the legal requirements and is practical at the same time.
What are the biggest challenges in implementing the NIS 2 Directive?
The challenges often lie in adapting existing systems. The training offers concrete solutions to close security gaps and ensure compliance.