What is NIS?
IT is becoming an increasingly significant part of our lives. Security incidents at companies which manage databases containing sensitive information, or at those which serve an important role in household, corporate, or national operations, can have a substantial negative affect on the general population.
In order to protect against them, the European parliament accepted a directive on the security of network and information systems (NIS). The NIS Directive was to be incorporated into the laws of EU member states.
The NIS Directive covers seven fundamental areas – energy, transport, banking, financial market infrastructure, health, drinking water supply and distribution, and digital infrastructure. National security authorities had until the end of September 2018 to compile a list of companies providing services which fall under the NIS Directive. Registration into the register of basic service providers (register prevádzkovateľov základných služieb) is required by anyone who provides a service defined in the relevant law in their individual country. In Slovakia’s case, this is anyone who’s business activity falls under attachment no. 1 of the cybersecurity act.
Despite this, it may not be clear to everyone whether they should or should not register. If you are unsure, we can advise you.
Including yourself in the register is only the first step towards ensuring security. Companies and institutions have two fundamental requirements:
Businesses have two years after being included in the register to set up IT security; correctly implemented security brings a company considerable savings. Companies which manage their security responsibly, by adopting the directive, will only have minimal costs associated with NIS.
After implementation, it is necessary to pass an audit which confirms compliance with the level of security required by the NIS Directive and national legislation. According to national legislation, the audit is conducted by an authorised responsible party defined by the authority.
1. Environment and GAP analysis
First, our experts will conduct an analysis of your technological and process preparedness for cyber-attacks, they will check their compliance with security standards. Through this, they will discover any weaknesses which need to be eliminated.
2. Implementation
Based on the GAP analysis, our company will work out a series of actions, processes, and technologies which need to be implemented. Based on their priority, our experts will secure individual areas to comply with standards.
3. Monitoring
We offer the option of connecting your entire IT environment to a centralised monitoring location – our SOC. Our skilled and certified experts, with “confidential” level security clearance from the National Security Authority, will monitor your systems NONSTOP in real-time – attacks and system outages don’t happen solely during working hours.
Creating your own security team is expensive and often unrealistic in regard to the availability of skilled experts. Our company has a team of TOP experts with years of professional experience with highly demanding projects for companies, the EU, and national security.
Why choose Binary Confidence’s SOC
Microsoft Exchange je pomerne rozsiahlo rozšírené a obľúbené riešenie emailového servera, ktorý umožňuje organizáciám akejkoľvek…
09. 10. 2020Ukradnuté údaje o vakcíne proti koronavírusu môžu pomôcť konkurencii. Hackerský útok však okrem toho môže spomaliť aj jej vývoj. To by mohlo mať zásadný vplyv na krajiny, ktoré bojujú s prepadom ekonomík a druhou vlnou ochorenia COVID-19. Aspoň proti fiktívnym kyberzločincom sa však postaví silný súper – účastníci súťaže Guardians 2020.
09. 03. 2020Dostali ste už list Národného bezpečnostného úradu? Ak nie, a ste takzvaný poskytovateľ základnej služby, môžete…
09. 03. 2020Hackeri sa dokážu nepozorovane pohybovať v nezabezpečených systémoch aj mesiace. V prípade, že využijú vašu…
Binary Confidence s.r.o.
Špitálska 53,
811 01 Bratislava
Slovak republic