top of page

June 26, 2025

NIS2 & Cybersecurity in OT/Embedded Systems: Strategies and Practice

Early Bird until 13/06

€899 €690+VAT

Online and in-person

With certificate of attendance

Questions? Write to us at info@one-sys.eu

Who is it aimed at and what is the goal?

  • The course is designed for cybersecurity managers, IT/OT managers, system engineers, risk managers, and developers working in sectors such as industry, automotive, medical, and IOT.

  • It aims to provide theoretical and practical skills to address the new regulatory and technical challenges introduced by the NIS2 Directive, with a special focus on cybersecurity of OT/embedded systems throughout their lifecycle.

What you will learn

Practical skills and operational strategies to align with the NIS2 Directive in the OT/Embedded context

Understand the NIS2 regulatory environment and its obligations

This course provides an in-depth overview of the NIS2 Directive, clarifying the legal and organizational obligations for companies operating in critical areas. The required responsibilities, compliance criteria, and governance and security implications of OT and information systems will be analyzed.

Link NIS2 with technical standards (ISO/SAE 21434, IEC 62443, etc.)

One of the key aspects is the integration between the regulatory requirements of NIS2 and major international technical standards. The course guides participants in creating synergies between the directive and frameworks such as ISO/SAE 21434 (automotive security) and IEC 62443 (cybersecurity for industrial systems) to ensure a consistent and integrated approach to security.

Apply risk analysis techniques (e.g. TARA)

Participants will learn how to use risk assessment methodologies specific to OT/embedded environments, such as Threat Analysis and Risk Assessment (TARA). The goal is to operationalize risk management by identifying vulnerabilities and threats and defining effective mitigation measures.

NIS2 support for design

Security cannot be a late addition-it must be an integral part of the design. This course shows how NIS2 can become a lever for introducing security-by-design criteria, helping to develop architectures and solutions that are secure early in the system life cycle.

Monitoring and Governance in NIS2

Effective cybersecurity governance requires tools for monitoring, tracking and control. This course addresses practices and organizational models to ensure continuous security oversight, in line with NIS2 requirements, fostering incident response readiness and operational resilience.

Group 3.png

A new partnership

We offer companies and professionals concrete tools to successfully meet the challenges of digitization and project complexity management.

pawel-czerwinski-OY3slACa3ec-unsplash.jpg

Contact us to register

Register for the course

By clicking submit I acknowledge that I have read the privacy policy

bottom of page