NIS2

ES Network and Information Systems Directive is commonly referred to as the NIS2 Directive. Lithuania has been among the first EU countries to update its cybersecurity law according to the Directive. Cybersecurity Law of the Republic of Lithuania and its article published on 6 November 2024 sets out specific measures to be implemented by cyber security entities or participants in their supply chain.

NIS2

ES Network and Information Systems Directive is commonly referred to as the NIS2 Directive. Lithuania has been among the first EU countries to update its cybersecurity law according to the Directive.  Cybersecurity Law of the Republic of Lithuania and its article published on 6 November 2024 sets out specific measures to be implemented by cyber security entities or participants in their supply chain.

We can help you with

Icon
Cyber threat monitoring
Our managed SOC services for centralised monitoring of cybersecurity events and remediation of cyber threats. CyberSOC services are available on a 9/5 or 24/7 basis, depending on the client’s needs. during the provision of all services, cybersecurity analysts will actively analyse the incoming security events using the most advanced technologies, assessing their criticality and impact on your IT infrastructure.
Icon
vCISO
Cybersecurity Officer, Security Officer, ISO, CISO - all these job titles usually refer to the same person - the person who makes sure that all the technical and organisational controls are in place. With our managed CISO services will help your organisation with the necessary documents and policies as well as keep them up-to-date, maintain them and organise cyber resilience activities.
Icon
Processes and procedures compliance
We will collect information about the cybersecurity measures and security processes implemented in your company and assess how they comply with the priority security areas set out in the updated Cybersecurity Law in your country.
Icon
Technological compliance
Ensuring secure use of Microsoft 365. Our services are designed to strengthen the IT department's technological compliance with the requirements of NIS2.

We can help you with

Cyber threat monitoring
Cyber threat monitoring
Our managed SOC services for centralised monitoring of cybersecurity events and remediation of cyber threats. CyberSOC services are available on a 9/5 or 24/7 basis, depending on the client’s needs. during the provision of all services, cybersecurity analysts will actively analyse the incoming security events using the most advanced technologies, assessing their criticality and impact on your IT infrastructure.
vCISO
vCISO
Cybersecurity Officer, Security Officer, ISO, CISO - all these job titles usually refer to the same person - the person who makes sure that all the technical and organisational controls are in place. With our managed CISO services will help your organisation with the necessary documents and policies as well as keep them up-to-date, maintain them and organise cyber resilience activities.
Technological compliance
Technological compliance
Ensuring secure use of Microsoft 365. Our services are designed to strengthen the IT department's technological compliance with the requirements of NIS2.
Processes and procedures compliance
Processes and procedures compliance
We will collect information about the cybersecurity measures and security processes implemented in your company and assess how they comply with the priority security areas set out in the updated Cybersecurity Law in your country.

More info can be provided by

Icon

Augustinas Daukšas

Cybersecurity consultant | CEH, CISA, CISM

Icon

Beatričė Lenauskaitė

Cybersecurity consultant