SlideShare a Scribd company logo
1 of 17
Download to read offline
Copyright © 2023 HCL Software Limited
NIS2
• What is NIS2?
• How can BigFix Help?
• What do I do next?
Make Europe fit for the digital age
hcltechsw.com
2 Copyright © 2020 HCL Technologies Limited | www.hcltech.com
3
HCLSoftware
Delivering software that fulfils the transformative needs
of clients around the world
_______________________________________
$1B 50
enterprise software business countries
________________________________________
50+ 15,000+
products enterprise customers
________________________________________
4,500+
employees worldwide
_________________________________________
4 areas of expertise
• Enterprise Security
• AI & Automation
• Digital Transformation
• Data & Analytics
4
Security is a Universal Challenge
In 2023, there are
about 3.5 million
unfulfilled
cybersecurity jobs
Skills
shortage
Regulatory fines
can cost millions
for large global
brands
Compliance
mandates
Nearly 1/3 of all
detected
vulnerabilities
remain
unremediated
after a year
Long remediation
times
A typical
organization
uses 14 endpoint
management tools
Too many tools
And agents
No consolidated
single manage-
ment view of all
endpoints
increases security
risk
Lack of
visibility
Endpoint Security
is essential, but
challenging
“things” to secure personal data records stolen lost to cybercrime
European Union is reacting with NIS2?
5
• The Network and Information Systems Directive (NIS2) is a European Union regulation enacted in
November 2022 that sets out cybersecurity requirements for providers of essential services and digital
service providers. The aim of the directive is to “achieve a high common level of cybersecurity across the
Union”.
What is NIS2?
• The directive replaces the original NIS directive and introduces new provisions to improve cybersecurity
across a broader range of sectors categorized as “essential" or “important”, based upon the significance to
the disruption of to the society or the economy. These include manufacturing, finance, healthcare, and
transport, and other heretofore more lightly regulated industries that increasingly rely on technology to run
their businesses.
How is it different?
• https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/689333/EPRS_BRI(2021)689333_EN.pdf
Where can I find the mandate?
What is new with NIS2
6
Business
Continuity
• Creates the
necessary
cyber crisis
management
structure
Reporting
• Increases the
level of
harmonization
regarding
security
requirements
and reporting
obligations
Scope
• Encourages
Members
States to
introduce new
areas of
interest such
as supply
chain, etc.
Collaboration
• Fosters novel
ideas such as
the peer
reviews for
enhancing
collaboration
and knowledge
sharing
Scale
• Covers a larger
share of the
economy and
society by
including more
sectors
Broader
Scope
Management Cyber Risk
Incident
Reporting
Fines and
Penalties
Core
Objectives
Core
Tenets
Who is impacted ?
7
Copyright © 2019 HCL Technologies Limited | www.hcltechsw.com
How can BigFix Help?
8
•BigFix can continuously enforce information system security and policies, preventing systems
from drifting out of compliance. Then using BigFix, the organization can prioritize and
remediate vulnerabilities and non-compliance in real-time.
Policies on risk analysis and
information system security
•The BigFix agent running on each managed system can monitor and detect any change that
can lead to a security incident. Automated incident handling can be configured to respond to
the detected security event.
Incident handling
•In a disaster recovery scenario, BigFix can deploy fully provision devices using bare metal
recoveries, software distribution, the ability to configure devices using established polices–
speeding the recovery following a disaster.
Business continuity: backup
management and disaster recovery,
and crisis management
•BigFix can identify all the systems that need to be patched, apply applicable patches to those
systems, and then report on the patching status. BigFix integrates Tenable and Qualys
vulnerability scanning solutions compress the time between discovery and remediation.
Security in network and information
development and maintenance,
vulnerability handling and disclosure
Copyright © 2019 HCL Technologies Limited | www.hcltechsw.com
How can BigFix Help (cont)?
9
•BigFix can be leveraged to define and implement cyber security policies and best practices.
These include asset discovery, patch management, continuous compliance assessment,
hardware and software inventory, and user-driven software distribution.
Basic cyber hygiene practices
•BigFix can enforce encryption policies at the OS level and ensure that required encryption
programs and applications on user devices are running.
Cryptography encryption
•BigFix can discover all devices that have an IP address on the network through distributed
NMAP scanning.
Human resources security,
access control policies and
asset management
•BigFix provides platform and application specific checklists security benchmarks published by
CIS, DISA, and PCI DSS. These checklists help an organization enforce secure account access
policies such as the use of two-factor authentication or other stronger authentication
mechanisms.
Continuous authentication
solutions and secure
communications
How BigFix can help: Optimize Your IT/Security Operations
Ad hoc
patching
Infrequent
vulnerability
scanning
Multiple endpoint
management tools
Management Siloes
for mobile, laptop,
servers
Siloed Vulnerability
management
Vulnerability
Prioritization
based on
CVSS
Manage
to Protection
Level Agreements
Compliance
enforced
automatically
Zero Trust
endpoint
management
Continuous
vulnerability
assessment
All endpoints
visible and
managed
Single
Endpoint
Management
Platform
Cost: CAPEX and OPEX
Cloud
Endpoint
Management
IT Operations
and Security
aligned and
data integrated
Operations Optimization Level
Reffer to existing Best Practices: Example ISO27001
12
How BigFix will Help
13
Collaboration
•Fosters novel
ideas such as
the peer
reviews for
enhancing
collaboration
and
knowledge
sharing
How BigFix will Help
14
Collaboration
•Fosters novel
ideas such as
the peer
reviews for
enhancing
collaboration
and
knowledge
sharing
15
Protection Level Agreements
Measure performance of remediation against
business-driven targets
Critical security patches for
online banking servers
for Cobalt Group CVEs
 Aligns IT Operations with Business
Objectives, balancing business
objectives/goals with cyber risk tolerance
 Leverages baselines that combine asset
criticality, CVE criticality, desired patch
levels, and compliance standards against
agreed-to organizational service levels
 PLA report shows remediation
performance against specific asset
groups
Learn More from us
18
Forward the solution brief
How BigFix addresses NIS2 White paper
•https://www.hcltechsw.com/bigfix
Q&A
hcltechsw.com

More Related Content

Similar to DACHNUG50 BigFix NIS2.pdf

Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceDavid Walker
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...DataWorks Summit
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devopsUlf Mattsson
 
Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022The Digital Insurer
 
Business Plan Sample for a Technology Company - Vilex in Pitchdeck (PowerPoin...
Business Plan Sample for a Technology Company - Vilex in Pitchdeck (PowerPoin...Business Plan Sample for a Technology Company - Vilex in Pitchdeck (PowerPoin...
Business Plan Sample for a Technology Company - Vilex in Pitchdeck (PowerPoin...Wanda Halpert
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Francesco Rago
 
Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Megatris Comp
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
BigFix Mobile- Extending modern endpoint management capabilities to iOS and A...
BigFix Mobile- Extending modern endpoint management capabilities to iOS and A...BigFix Mobile- Extending modern endpoint management capabilities to iOS and A...
BigFix Mobile- Extending modern endpoint management capabilities to iOS and A...HCLSoftware
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Conor Bronsdon
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewSuzanne Livingston
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Learningade
 
Ensuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesEnsuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesHCLSoftware
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
Microsoft cloud profitability scenarios
Microsoft cloud profitability scenariosMicrosoft cloud profitability scenarios
Microsoft cloud profitability scenariosMedhy Sandjak
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 

Similar to DACHNUG50 BigFix NIS2.pdf (20)

Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI Compliance
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022
 
Business Plan Sample for a Technology Company - Vilex in Pitchdeck (PowerPoin...
Business Plan Sample for a Technology Company - Vilex in Pitchdeck (PowerPoin...Business Plan Sample for a Technology Company - Vilex in Pitchdeck (PowerPoin...
Business Plan Sample for a Technology Company - Vilex in Pitchdeck (PowerPoin...
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
Foundation of is in business
Foundation of is in businessFoundation of is in business
Foundation of is in business
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1
 
Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)Meetup 10 here&now: Megatris Comp design method (Part 1)
Meetup 10 here&now: Megatris Comp design method (Part 1)
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
BigFix Mobile- Extending modern endpoint management capabilities to iOS and A...
BigFix Mobile- Extending modern endpoint management capabilities to iOS and A...BigFix Mobile- Extending modern endpoint management capabilities to iOS and A...
BigFix Mobile- Extending modern endpoint management capabilities to iOS and A...
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
Top tech-trends-ebook-2021
Top tech-trends-ebook-2021Top tech-trends-ebook-2021
Top tech-trends-ebook-2021
 
Ensuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesEnsuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policies
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
Microsoft cloud profitability scenarios
Microsoft cloud profitability scenariosMicrosoft cloud profitability scenarios
Microsoft cloud profitability scenarios
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 

More from DNUG e.V.

Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...DNUG e.V.
 
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...DNUG e.V.
 
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch SalzburgSlides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch SalzburgDNUG e.V.
 
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...DNUG e.V.
 
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...DNUG e.V.
 
Slides zum Impulsreferat: HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: HCL BigFix  - DNUG Stammtisch KarlsruheSlides zum Impulsreferat: HCL BigFix  - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: HCL BigFix - DNUG Stammtisch KarlsruheDNUG e.V.
 
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch KarlsruheSlides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch KarlsruheDNUG e.V.
 
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...DNUG e.V.
 
Entwicklung mit Volt MX und Co. | Teil 1
Entwicklung mit Volt MX und Co. | Teil 1Entwicklung mit Volt MX und Co. | Teil 1
Entwicklung mit Volt MX und Co. | Teil 1DNUG e.V.
 
HCL Nomad - DNUG Stammtisch Salzburg.pdf
HCL Nomad - DNUG Stammtisch Salzburg.pdfHCL Nomad - DNUG Stammtisch Salzburg.pdf
HCL Nomad - DNUG Stammtisch Salzburg.pdfDNUG e.V.
 
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien DNUG e.V.
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien DNUG e.V.
 
DACHNUG50 MX_Workshop.pdf
DACHNUG50 MX_Workshop.pdfDACHNUG50 MX_Workshop.pdf
DACHNUG50 MX_Workshop.pdfDNUG e.V.
 
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdfDACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdfDNUG e.V.
 
DACHNUG50 CNX0 Workshop.pdf
DACHNUG50 CNX0 Workshop.pdfDACHNUG50 CNX0 Workshop.pdf
DACHNUG50 CNX0 Workshop.pdfDNUG e.V.
 
DACHNUG50 What's new in CCB - V3.3.pdf
DACHNUG50 What's new in CCB - V3.3.pdfDACHNUG50 What's new in CCB - V3.3.pdf
DACHNUG50 What's new in CCB - V3.3.pdfDNUG e.V.
 
DACHNUG50 presentation 15 June 2023.pdf
DACHNUG50 presentation 15 June 2023.pdfDACHNUG50 presentation 15 June 2023.pdf
DACHNUG50 presentation 15 June 2023.pdfDNUG e.V.
 
DACHNUG50 Pointsharp overview_web_A4.pdf
DACHNUG50 Pointsharp overview_web_A4.pdfDACHNUG50 Pointsharp overview_web_A4.pdf
DACHNUG50 Pointsharp overview_web_A4.pdfDNUG e.V.
 
DACHNUG50 OnTime for Domino.pdf
DACHNUG50 OnTime for Domino.pdfDACHNUG50 OnTime for Domino.pdf
DACHNUG50 OnTime for Domino.pdfDNUG e.V.
 
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdfDACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdfDNUG e.V.
 

More from DNUG e.V. (20)

Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
 
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
 
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch SalzburgSlides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
 
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
 
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
 
Slides zum Impulsreferat: HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: HCL BigFix  - DNUG Stammtisch KarlsruheSlides zum Impulsreferat: HCL BigFix  - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: HCL BigFix - DNUG Stammtisch Karlsruhe
 
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch KarlsruheSlides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
 
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
 
Entwicklung mit Volt MX und Co. | Teil 1
Entwicklung mit Volt MX und Co. | Teil 1Entwicklung mit Volt MX und Co. | Teil 1
Entwicklung mit Volt MX und Co. | Teil 1
 
HCL Nomad - DNUG Stammtisch Salzburg.pdf
HCL Nomad - DNUG Stammtisch Salzburg.pdfHCL Nomad - DNUG Stammtisch Salzburg.pdf
HCL Nomad - DNUG Stammtisch Salzburg.pdf
 
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien
 
DACHNUG50 MX_Workshop.pdf
DACHNUG50 MX_Workshop.pdfDACHNUG50 MX_Workshop.pdf
DACHNUG50 MX_Workshop.pdf
 
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdfDACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
 
DACHNUG50 CNX0 Workshop.pdf
DACHNUG50 CNX0 Workshop.pdfDACHNUG50 CNX0 Workshop.pdf
DACHNUG50 CNX0 Workshop.pdf
 
DACHNUG50 What's new in CCB - V3.3.pdf
DACHNUG50 What's new in CCB - V3.3.pdfDACHNUG50 What's new in CCB - V3.3.pdf
DACHNUG50 What's new in CCB - V3.3.pdf
 
DACHNUG50 presentation 15 June 2023.pdf
DACHNUG50 presentation 15 June 2023.pdfDACHNUG50 presentation 15 June 2023.pdf
DACHNUG50 presentation 15 June 2023.pdf
 
DACHNUG50 Pointsharp overview_web_A4.pdf
DACHNUG50 Pointsharp overview_web_A4.pdfDACHNUG50 Pointsharp overview_web_A4.pdf
DACHNUG50 Pointsharp overview_web_A4.pdf
 
DACHNUG50 OnTime for Domino.pdf
DACHNUG50 OnTime for Domino.pdfDACHNUG50 OnTime for Domino.pdf
DACHNUG50 OnTime for Domino.pdf
 
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdfDACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
 

Recently uploaded

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

DACHNUG50 BigFix NIS2.pdf

  • 1. Copyright © 2023 HCL Software Limited NIS2 • What is NIS2? • How can BigFix Help? • What do I do next? Make Europe fit for the digital age
  • 2. hcltechsw.com 2 Copyright © 2020 HCL Technologies Limited | www.hcltech.com
  • 3. 3 HCLSoftware Delivering software that fulfils the transformative needs of clients around the world _______________________________________ $1B 50 enterprise software business countries ________________________________________ 50+ 15,000+ products enterprise customers ________________________________________ 4,500+ employees worldwide _________________________________________ 4 areas of expertise • Enterprise Security • AI & Automation • Digital Transformation • Data & Analytics
  • 4. 4 Security is a Universal Challenge In 2023, there are about 3.5 million unfulfilled cybersecurity jobs Skills shortage Regulatory fines can cost millions for large global brands Compliance mandates Nearly 1/3 of all detected vulnerabilities remain unremediated after a year Long remediation times A typical organization uses 14 endpoint management tools Too many tools And agents No consolidated single manage- ment view of all endpoints increases security risk Lack of visibility Endpoint Security is essential, but challenging “things” to secure personal data records stolen lost to cybercrime
  • 5. European Union is reacting with NIS2? 5 • The Network and Information Systems Directive (NIS2) is a European Union regulation enacted in November 2022 that sets out cybersecurity requirements for providers of essential services and digital service providers. The aim of the directive is to “achieve a high common level of cybersecurity across the Union”. What is NIS2? • The directive replaces the original NIS directive and introduces new provisions to improve cybersecurity across a broader range of sectors categorized as “essential" or “important”, based upon the significance to the disruption of to the society or the economy. These include manufacturing, finance, healthcare, and transport, and other heretofore more lightly regulated industries that increasingly rely on technology to run their businesses. How is it different? • https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/689333/EPRS_BRI(2021)689333_EN.pdf Where can I find the mandate?
  • 6. What is new with NIS2 6 Business Continuity • Creates the necessary cyber crisis management structure Reporting • Increases the level of harmonization regarding security requirements and reporting obligations Scope • Encourages Members States to introduce new areas of interest such as supply chain, etc. Collaboration • Fosters novel ideas such as the peer reviews for enhancing collaboration and knowledge sharing Scale • Covers a larger share of the economy and society by including more sectors Broader Scope Management Cyber Risk Incident Reporting Fines and Penalties Core Objectives Core Tenets
  • 8. Copyright © 2019 HCL Technologies Limited | www.hcltechsw.com How can BigFix Help? 8 •BigFix can continuously enforce information system security and policies, preventing systems from drifting out of compliance. Then using BigFix, the organization can prioritize and remediate vulnerabilities and non-compliance in real-time. Policies on risk analysis and information system security •The BigFix agent running on each managed system can monitor and detect any change that can lead to a security incident. Automated incident handling can be configured to respond to the detected security event. Incident handling •In a disaster recovery scenario, BigFix can deploy fully provision devices using bare metal recoveries, software distribution, the ability to configure devices using established polices– speeding the recovery following a disaster. Business continuity: backup management and disaster recovery, and crisis management •BigFix can identify all the systems that need to be patched, apply applicable patches to those systems, and then report on the patching status. BigFix integrates Tenable and Qualys vulnerability scanning solutions compress the time between discovery and remediation. Security in network and information development and maintenance, vulnerability handling and disclosure
  • 9. Copyright © 2019 HCL Technologies Limited | www.hcltechsw.com How can BigFix Help (cont)? 9 •BigFix can be leveraged to define and implement cyber security policies and best practices. These include asset discovery, patch management, continuous compliance assessment, hardware and software inventory, and user-driven software distribution. Basic cyber hygiene practices •BigFix can enforce encryption policies at the OS level and ensure that required encryption programs and applications on user devices are running. Cryptography encryption •BigFix can discover all devices that have an IP address on the network through distributed NMAP scanning. Human resources security, access control policies and asset management •BigFix provides platform and application specific checklists security benchmarks published by CIS, DISA, and PCI DSS. These checklists help an organization enforce secure account access policies such as the use of two-factor authentication or other stronger authentication mechanisms. Continuous authentication solutions and secure communications
  • 10. How BigFix can help: Optimize Your IT/Security Operations Ad hoc patching Infrequent vulnerability scanning Multiple endpoint management tools Management Siloes for mobile, laptop, servers Siloed Vulnerability management Vulnerability Prioritization based on CVSS Manage to Protection Level Agreements Compliance enforced automatically Zero Trust endpoint management Continuous vulnerability assessment All endpoints visible and managed Single Endpoint Management Platform Cost: CAPEX and OPEX Cloud Endpoint Management IT Operations and Security aligned and data integrated Operations Optimization Level
  • 11. Reffer to existing Best Practices: Example ISO27001 12
  • 12. How BigFix will Help 13 Collaboration •Fosters novel ideas such as the peer reviews for enhancing collaboration and knowledge sharing
  • 13. How BigFix will Help 14 Collaboration •Fosters novel ideas such as the peer reviews for enhancing collaboration and knowledge sharing
  • 14. 15 Protection Level Agreements Measure performance of remediation against business-driven targets Critical security patches for online banking servers for Cobalt Group CVEs  Aligns IT Operations with Business Objectives, balancing business objectives/goals with cyber risk tolerance  Leverages baselines that combine asset criticality, CVE criticality, desired patch levels, and compliance standards against agreed-to organizational service levels  PLA report shows remediation performance against specific asset groups
  • 15. Learn More from us 18 Forward the solution brief How BigFix addresses NIS2 White paper •https://www.hcltechsw.com/bigfix
  • 16. Q&A