TAKE THE LEAD IN CYBER RESILIENCE

Secure Your Future: NIS2 Certification for Resilience & Liability Protection

In the new era of European cybersecurity, compliance is no longer a "check-the-box" exercise—it is a matter of personal and corporate survival. The Information Security Institute invites you to get NIS2 Certified to ensure your organization is not just compliant, but defensible.

The Value of Certification: From Compliance to Authority

The NIS2 credential is designed to bridge the gap between abstract legal mandates and technical reality. By becoming certified, you gain the authority to shield IT professionals and executives from personal liability.

We move beyond basic checklists to help you master Monte Carlo risk quantification, professional contract drafting, and the implementation of robust, audit-ready controls. This certification positions you as the board’s trusted resilience authority, equipped with quantified exposure models and audit-proof evidence packs that stand up to the strictest regulatory scrutiny.

Limited seats available to ensure high-intensity, hands-on training.

Why This Certification?

Standard training tells you what the law says; we show you how to defend against it.

 

Feature Standard NIS2 Training Information Security Institute Certification
Focus Theoretical compliance & checklists Executive liability & risk quantification
Risk Modeling Qualitative (High/Medium/Low) Monte Carlo Simulations & Financial Exposure
Methodology Passive lectures "Learning by Doing" with real-world breach cases
Deliverables Generic slide decks Audit-proof evidence packs & legal playbooks
Validation Simple multiple-choice 40 daily Situational Judgment Challenges
Outcome Awareness of the law Operational command & boardroom authority

 

Target Audience: Who Should Attend?

This program is specifically engineered for leaders responsible for governance, resilience, and regulatory defensibility in critical sectors:

  • Executive Leadership: CISOs, DPOs, and IT Directors.
  • Risk & Compliance: Risk Managers, Compliance Officers, and Heads of IT Risk.
  • Resilience Specialists: DORA Leads and Directors of Operational Resilience.
  • Advisors: Consultants and partners navigating the EU cybersecurity landscape.

Our Technical Approach: "Learning by Doing"?

We believe that real skill is forged through application. Our curriculum is anchored in practical experience:

  • Real-World Application: Sessions utilise actual breach case studies to apply the provided risk templates and legal playbooks.
  • Advanced Methodology: Integrate operational resilience tools and high-level risk quantification into your daily workflow.
  • Validated Knowledge: Each day concludes with 40 situational judgment questions designed to test your practical decision-making and ensure you are ready to lead in a crisis.

Day 1: Regulatory and Control Architecture

MODULE 1

NIS 2 Governance Mandate

  • Define the scope of essential versus important entities and establish management accountability for cybersecurity governance and liability.
  • How to map organisational services to sectors to confirm NIS 2 applicability.
  • Define C-level responsibilities, training mandates, and personal liability exposure for non-compliance.
  • Board-approved statement of NIS 2 accountability template.
  • Identify overlaps with the Digital Operational Resilience Act and other ISO and compliance requirements. 
  • How to see templates for information security, access control, and asset management policies tailored to NIS 2.
  • List the competent authorities and assess the specific local legislations. 
MODULE 2

Asset Management and Critical Service Dependency

  • Segment IT assets and map digital dependencies to ensure the continuity of critical societal and business services.
  • How to use a register template to link hardware and software directly to critical service outputs.
  • Tools to assess upstream and downstream dependencies to identify single points of failure.
  • Design zones to isolate OT/ICS environments from corporate IT networks.
  • Methods to discover unmanaged assets that pose hidden compliance risk.
  • Guidelines for implementing end-to-end encryption and key management for sensitive data flows.
  • Role-based access control model to enforce "least privilege" principles across critical assets.
  • Crown-jewel analysis worksheet to identify the assets whose loss triggers NIS 2 reportable incidents.

Day 2: Operational Resilience, Supply Chain and Quantified Risk

MODULE 3

Quantifying Risk to Secure the Supply Chain

  • Build risk-based vendor segmentation models and quantify financial exposure to operational disruptions and third-party breaches.
  • Library of common NIS 2 risk scenarios and threat vectors (e.g., ransomware, supply chain failure) with societal impact criteria. 
  • Pre-built Monte-Carlo exposure model for third-party breach to calculates € expected loss per vendor.
  • How to segment suppliers by criticality to operations and data sensitivity.
  • Questionnaires to evaluate supplier cybersecurity maturity and incident reporting capabilities.
  • Business impact analysis to quantify hourly financial loss of critical service downtime ($/hr).
  • Draft mandatory security requirements and right-to-audit clauses for vendor contracts.
MODULE 3

Incident Response and Audit Evidence

  • Design compliant incident reporting workflows and compile audit-ready evidence to demonstrate continuous control maturity.
  • How to design a process map for early warning and incident notification to the computer security incident response teams.
  • Checklist of required logs, policy approvals, and test results for compliance audits.
  • Script for tabletop exercises testing leadership decision-making during ransomware attacks.
  • Scorecard to track and report progress from ad-hoc to optimised security.
  • Training modules for staff awareness on phishing, password hygiene, and incident reporting.
  • Template for recovery strategies and communication protocols during major cyber crises.

Value of the Certification

Gain the authority to shield executives from liability, master risk quantification, and implement robust, audit-ready controls that ensure compliance with EU cybersecurity mandates. We move beyond checklists to integrate Monte Carlo risk quantification, contract drafting, and operational resilience tools, bridging the gap between legal mandates and IT reality. The NIS 2 credential positions participants as the board’s trusted resilience authority with quantified exposure models and audit-proof evidence packs.


Secure Your "Audit-Proof" Future

The gap between "IT Reality" and "Legal Mandates" is where liability lives. We give
you the tools to bridge that gap.


 

YOUR PROGRAMME DIRECTOR

Prof Kersi F. Porbunderwalla

  • Professor at the IE Law School, the Copenhagen Business School from 1984-1993 and pst lecturer at Copenhagen Business School, Georgetown University, Cass Business School, and Fordham University
  • President and CEO at Copenhagen Compliance, The Information Security Institute, The Corporate Governance Institute, The EUGDPR and The E-Compliance Academy
  • Established global GRC networks to provide certifications and training, and has trained professionals on four continents
  • Lead organization in the development and implementation of AI-driven solutions, GRC applications,, and frameworks, including specialized cybersecurity and privacy products

Program Lead (SPEAKER)

Hernan Huwyler

Prof. Huwyler is the Executive Education Director at IE Law School and is highly regarded for his expertise in risk management, AI, audit, and control. With a career spanning leadership roles at Forbes 500 companies and Big Four firms, he brings firsthand knowledge of how technology, risk, and compliance intersect in large organizations. Prof. Huwyler is an expert risk assessor and data analyst skilled in using predictive models in Python and R to inform strategic decisions, optimize risk management, and conduct compliance assessments. As a respected researcher and thought leader, he continues to shape the fields of AI, compliance, and IT audit, providing CAIO participants with access to the latest methodologies and best practices. His teaching approach emphasizes practical application, equipping executives with the analytical tools to drive AI responsibly in complex business environments.

 

 
 

 

Certification Body: