The NIS2 Directive is the EU-wide legislation on cybersecurity. It provides legal measures to boost the overall level of cybersecurity in the EU.

The EU cybersecurity rules introduced in 2016 were updated by the NIS2 Directive that came into force in 2023. It modernised the existing legal framework to keep up with increased digitisation and an evolving cybersecurity threat landscape.

Who is affected?

NIS2 affects all entities that provide essential or important services to the European economy and society, including companies and suppliers. If your organization falls under any of the categories below, NIS2 is applicable to you:

Size threshold: varies by sector, but generally 250 employees, annual turnover of € 50 million or balance sheet of € 43 million

  • Energy
  • Transport
  • Finance
  • Public Administration
  • Health
  • Space
  • Water Supply
  • Digital Infrastructure

Size threshold: varies by sector, but generally 50 employees, annual turnover of € 10 million or balance sheet of € 10 million

  • Postal Services
  • Waste Management
  • Chemicals
  • Research
  • Foods
  • Manufactoring
  • Digital Providers

Coverage

Map dependencies on all 3rd party products used by your applications and scan them against latest vulnerabilities to prevent supply chain attacks.


Ensure that all communication between you and your customers remains confidential through the use of strong encryption algorithms.


Detect potential data leaks as fast as possible and limit the impact of compromised passwords, PII, certificates or API keys.

Analyze your organization’s digital footprint and entry points from an external perspective and discover undocumented systems


Prevent public access to your sensitive files and ensure that authorization is enforced through strong password policies and multi-factor authentication.


Test the effectiveness of your cybsecurity training programs through social engineering exercises, phishing campaigns and password spraying attacks.


Assess your company detection and monitoring capabilities through simulated cybsecurity attacks against your infrastructure.

packages

Free

Supply Chain Mapping
Shadow IT Discovery
Encryption Review
PDF Report
Data Leaks Investigation
Authentication Checks
Training Effectiveness
Simulated Attacks
Recommendations
Results Presentation
Top Level Domains1
IP addresses10


For companies with less than 10 employees or as a preliminary assessment





0 €

Basic

Supply Chain Mapping
Shadow IT Discovery
Encryption Review
PDF Report
Data Leaks Investigation
Authentication Checks
Training Effectiveness
Simulated Attacks
Recommendations
Results Presentation
Top Level Domains10
IP addresses100


For companies with 10-50 employees categorized as “Important Entities (IE)”





1,399 €

premium

Supply Chain Mapping
Shadow IT Discovery
Encryption Review
PDF Report
Data Leaks Investigation
Authentication Checks
Training Effectiveness
Simulated Attacks
Recommendations
Results Presentation
Top Level Domains25
IP addresses500


For companies with 50-250 employees categorized as “Essential Entities (IE)”





3,999 €

Order now

Go back

Your message has been sent

Warning
Warning
Warning
Warning
Warning.

Certifications

CRTP – Assess security of an Enterprise Active Directory environment.

OSCP – Demonstrated ability to identify vulnerabilities and execute organized attacks under tight time constraints. 

CARTP – Understand and assess security of an Azure environments.

Practical Web Application Security and Testing – Uncovering OWASP Top 10 vulnerabilities using the techniques

Cyber Threat Intelligence – Threat actors, intelligence lifecycle and ethical considerations

Our consultants are part Synack Red Team alongside over 1,500 of the world’s most skilled and trusted security researchers