Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
NIS-2 Overview and Recommendations
Read more
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Cisco Cyber Vision in Action: How to Secure Your OT Network
Learn how you can use Cisco Cyber Vision to improve the security of your OT…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
NIL Achieves Elite Status in the Splunk Partnerverse Program
The Splunk Elite status achievement reinforces NIL’s dedication to excellence in data analytics and security.
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Governance, Risk & Compliance
Home
»
Governance, Risk & Compliance
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
Show Filters
Industries
All
Education
Information Technology
Service provider
Solutions & Services
Analytics
Automation
Cloud
Collaboration
Conscia Services
Cybersecurity
Datacenter
Education
Internet of Things (IoT)
Learning & Content Development
Lifecycle Advisory
Managed Services
Mobility
Networking
Security Operations Center (SOC)
Service Provider
Software
Storage
Threat Intelligence
Unified Communications (UC)
Wireless
Business outcome
Cost Predictability
Digital Transformation
ESG: Environment
ESG: Governance
ESG: Social
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
Page
NIS-2 Overview and Recommendations
NIS stands for Network and Information Systems, and in 2013 the EU made the first proposal to strengthen cyber defence in Europe in the form of the NIS Directive. Each...
Read more
Martin Holm
Senior Network Engineer, Conscia Sweden
Max Geiger
Security Consultant, Conscia Sweden
Video
Is Your Firewall Good Enough? Secure it with AIOps and TISP
Do you want a quick, affordable, and automated check of your firewall rules? Watch the webinar recording and...
Read more
Caroline Dristig
Information Security Consultant, Conscia Sweden
Kajsa Rosnes Bogen
Cyber Security Consultant, Conscia Norway
Video
How you prepare for the NIS2 directive
Join us in this webinar to discover the potential impact of NIS2 directive on your organization and learn...
Read more
Martin Holm
Senior Network Engineer, Conscia Sweden
Max Geiger
Security Consultant, Conscia Sweden
Event
Is Your Firewall Good Enough? Secure it with AIOps and TISP
26. Apr 2023
Do you want a quick, affordable, and automated check of your firewall rules? Join our webinar and learn...
Read more
Caroline Dristig
Information Security Consultant, Conscia Sweden
Kajsa Rosnes Bogen
Cyber Security Consultant, Conscia Norway
Event
How you prepare for the NIS2 directive
20. Apr 2023
Join us in this webinar to discover the potential impact of NIS2 directive on your organization and learn...
Read more
Whitepaper
NIS2 – A comprehensive overview of NIS2 Directive
This whitepaper provides information on the NIS2 directive, including its primary goals, scope, and the requirements imposed on...
Read more
Jure Planinšek
Head of Compliance and Legal
Blog
Diligent Management and Cybersecurity
17. Feb 2023
Leadership should be familiar with and understand cyber risks and their management, even though they may not have...
Read more
Event
Ensure a flawless digital experience and business impact with Cisco FSO
6. Dec 2022
In this live webinar, we will highlight some of the key use cases for Cisco Full-Stack Observability and...
Read more
Ewan Hubac
Cybersecurity Product Manager, Conscia Group
Event
Cyber Threat Intelligence: A Better Way to Do Vulnerability Management
13. Oct 2022
Why is vulnerability management hard and how can you improve it? Join the webinar and learn about better...
Read more
Kent Heide
Technical Solutions Architect
Event
Microsoft 365 services monitoring with ThousandEyes
20. Sep 2022
Join the free webinar and learn how you can use ThousandEyes to troubleshoot problems with SaaS services and...
Read more
Page
Managed Security Operations Center (SOC) Services
IT security is more than just prevention. IT systems are increasingly complex, and numerous daily changes force us...
Read more
Page
Internet Usage Quotas
Foster productivity and prevent internet abuse without strict user limitations How much and what can your users do...
Read more
Page
Identity and Access Management Design and Implementation
The foundation of your entire security stack As organizations grow, so should their maturity in process execution and...
Read more
Page
Firewall Policy Generation and Optimization
Effective access control in distributed networks Network security is still one of the core mitigating controls in an...
Read more
Page
Workspace
People, Technology and Your Business in Sync In every sector, from commerce, finance, manufacturing, energy to farming, the...
Read more
Page
Project Scoping
A Good Strategy Is One That Can Be Implemented IT projects are becoming more complex every year, and...
Read more
Page
Consulting
Helping You Ask the Right Questions and Find the Answers Are you making your competitors nervous? Do you...
Read more
Page
Securing the EUC Environment with VMware NSX
Prevent security breaches that can devastate your business Frank Abagnale (who was portrayed in the famous movie Catch...
Read more
Page
Secure Mobility
Get the job done anywhere, anytime, with minimal risk Mobile working, be it from company or personal devices,...
Read more
Page
Network Infrastructure and Security Audit
Network, don’t let me down! For service providers, governments, and enterprises that run heavily distributed business platforms reliant...
Read more
Page
Solutions
Secure Industry Solutions for complex IT Infrastructures Deployed correctly, IT becomes a strategic tool leading to that decisive...
Read more