NIS2 service bundle

In 2024 ES Network and Information Systems Directive or more commonly referred to as the NIS2 Directive, has been “transposed” into the Lithuanian legal framework by updating the Law on Cyber Security.

Of particular relevance to most organisations is the updated Cybersecurity Law of the Republic of Lithuania and its article published on 6 November 2024, which sets out specific measures to be implemented by cyber security entities or participants in their supply chain.

Our NIS2 service bundle includes

CISO services
CISO services
Cybersecurity Officer, Security Officer, ISO, CISO - all these job titles usually refer to the same person - the person who makes sure that all the technical and organisational controls are in place. Our CISO will not only help your organisation with the necessary documents and policies, but also keep them up-to-date, maintain them and organise cyber resilience activities.
NIS2 SOC
NIS2 SOC
This service includes the SIEM platform and maintenance, log collection, application of the rules specified in the Cybersecurity Law of the Republic of Lithuania updated to meet NIS2 requirements, and event analysis by SOC analysts during working hours (9x5).
Our SOC will monitor your organisation's infrastructure, analyse and report cybersecurity incidents in accordance with the technical requirements for cybersecurity entities set out in Table 1 of the article 6 November 2024 of the updated Cybersecurity Law of the Republic of Lithuania.
Technological support services
Technological support services
Our services are designed to strengthen the IT department's technological compliance with the requirements of the updated Cybersecurity Law of the Republic of Lithuania under NIS2. The services include the ongoing security of equipment, the implementation and maintenance of a privileged user management system, the implementation and maintenance of an asset management system and the implementation and maintenance of a data backup system.
Compliance assessment
Compliance assessment
We will collect information about the cybersecurity measures and security processes implemented in your company and assess how they comply with the priority security areas set out in the updated Cybersecurity Law of the Republic of Lithuania according to NIS2.

More info can be provided by

Icon

Augustinas Daukšas

Cybersecurity consultant | CEH, CISA, CISM

Icon

Eglė Mikelaitytė

Cybersecurity consultant