Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

WATCH NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

A NIS2 Webinar Series

On-Demand


27 member states. 35 industries. Fines of up to 2% of company turnover. The NIS2 Directive will boost cybersecurity requirements for organizations operating in Europe.

Register now for our three-part webinar series and get ready for NIS2 – from an introduction to its scope, policies and penalties, to a review of common control gaps and best practices from our Incident Response team. Featuring speakers from PwC, CyberArk and CyberArk Labs.


Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

A 3-Part Guide to Get Ready for NIS2

Are You Essential or Important? Making Sense of NIS2

We cut through any ambiguity around NIS2 – covering what and who’s in scope, why it’s important, tier classifications, key policy areas and how NIS2 will get transposed into law.

Inside the War Room: Responding to 3 Attacks on Critical Infrastructure

Three real-life examples of attacks on organisations that fit NIS2’s expanded definition of ‘Critical’. From the perspective of CyberArk’s Incident Response team.

Coming to Terms with Your NIS2 Security Controls Gap. And How to Address It .

From NIS2 ‘cyber hygiene’ to securing your software supply chain: what controls gap you are likely to face when NIS2 principles transpose into law. And what steps you can take to address it.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Speaker Line-Up


  • Nicholas Hauberg Karlsen, Director of Cyber Strategy & Risk (NIS2 Task Force), PwC
  • Andy Thompson, Ethical Hacker and Research Evangelist, CyberArk Labs
  • David Higgins, Sr. Director, Field Technology Office, CyberArk
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)