NIS2

ES Network and Information Systems Directive is commonly referred to as the NIS2 Directive. Lithuania has been among the first EU countries to update its cybersecurity law according to the Directive.  Cybersecurity Law of the Republic of Lithuania and its article published on 6 November 2024 sets out specific measures to be implemented by cyber security entities or participants in their supply chain.

Our NIS2 service bundle includes

Managed SOC services
Managed SOC services
Managed security services for centralised monitoring of cybersecurity events and remediation of cyber threats. CyberSOC services are available on a 9/5 or 24/7 basis, depending on the client’s needs. during the provision of all services, cybersecurity analysts will actively analyse the incoming security events using the most advanced technologies, assessing their criticality and impact on your IT infrastructure.
Managed CISO services
Managed CISO services
Cybersecurity Officer, Security Officer, ISO, CISO - all these job titles usually refer to the same person - the person who makes sure that all the technical and organisational controls are in place. Our CISO will not only help your organisation with the necessary documents and policies, but also keep them up-to-date, maintain them and organise cyber resilience activities.
Technological compliance
Technological compliance
Our services are designed to strengthen the IT department's technological compliance with the requirements of NIS2. The services include the ongoing security of equipment, the implementation and maintenance of a privileged user management system, the implementation and maintenance of an asset management system and the implementation and maintenance of a data backup system.
Processes and procedures compliance
Processes and procedures compliance
We will collect information about the cybersecurity measures and security processes implemented in your company and assess how they comply with the priority security areas set out in the updated Cybersecurity Law.

More info can be provided by

Icon

Augustinas Daukšas

Cybersecurity consultant | CEH, CISA, CISM

Icon

Eglė Mikelaitytė

Cybersecurity consultant