Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services
Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services
Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services
Ebook87 pages46 minutes

Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.

An introduction to the new NIS Regulations 2018 that bring the EU’s NIS Directive and Implementing Regulation into UK law.

This guide outlines the requirements for operators of essential services based on the Cyber Assessment Framework established by the National Cyber Security Centre (NCSC), including an explanation of the objectives, principles and indicators of good practice, and offers implementation guidance.

This guide will help you:

  • Understand how to comply with NIS Regulations, and avoid penalties associated with non-compliance
  • Unravel the key definitions, authorities and points of contact
  • Learn the benefits of a good Cyber Resilience plan
  • Interpret and ensure compliance with the Cyber Assessment Framework
  • Establish the NCSC’s cyber security objectives, principles and indicators of good practice

Your essential guide to understanding the NIS Regulations – buy this book today and get the help and guidance you need.

LanguageEnglish
Publisheritgovernance
Release dateNov 1, 2018
ISBN9781787780545
Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services
Author

Alan Calder

Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.

Read more from Alan Calder

Related to Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services

Related ebooks

Computers For You

View More

Related articles

Reviews for Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services - Alan Calder

    Network and Information Systems (NIS) Regulations

    A pocket guide for operators of essential services

    Network and Information Systems (NIS) Regulations

    A pocket guide for operators of essential services

    ALAN CALDER

    Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher and the author cannot accept responsibility for any errors or omissions, however caused. Any opinions expressed in this book are those of the author, not the publisher. Websites identified are for reference only, not endorsement, and any website visits are at the reader’s own risk. No responsibility for loss or damage occasioned to any person acting, or refraining from action, as a result of the material in this publication can be accepted by the publisher or the author.

    Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form, or by any means, with the prior permission in writing of the publisher or, in the case of reprographic reproduction, in accordance with the terms of licences issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publisher at the following address:

    IT Governance Publishing Ltd

    Unit 3, Clive Court

    Bartholomew’s Walk

    Cambridgeshire Business Park

    Ely, Cambridgeshire

    CB7 4EA

    United Kingdom

    www.itgovernancepublishing.co.uk

    © Alan Calder 2018

    The author has asserted the rights of the author under the Copyright, Designs and Patents Act, 1988, to be identified as the author of this work.

    First published in the United Kingdom in 2018 by IT Governance Publishing.

    ISBN 978-1-787-78054-5

    ABOUT THE AUTHOR

    Alan Calder is the founder and executive chairman of IT Governance Ltd (www.itgovernance.co.uk), an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance and information security issues. Alan is an acknowledged international cyber security guru and a leading author on information security and IT governance issues. He has many years of senior management experience in the private and public sectors.

    CONTENTS

    Introduction

    Background

    A note on Brexit

    Guidance

    Key definitions

    Chapter 1: Scope and applicability

    Digital service providers

    Chapter 2: Authorities and bodies

    Competent authorities

    CSIRTs

    Single points of contact

    Cooperation Group

    Powers and penalties

    Chapter 3: Complying with the Directive

    Cyber security objectives

    Principles

    Cyber Assessment Framework

    Notifications

    Chapter 4: Implementing cyber resilience

    ISO 27001 and ISO 27002

    ISO 22301

    ISO 27035

    Combining standards

    Appendix: OES Definitions and Thresholds

    Further reading

    INTRODUCTION

    Technology has brought us into a world that many of us only poorly understand. While we may have some grasp of this technology, there is often a lack of real understanding as to how these technologies work and interact. A few decades ago, we understood that if the water levels fell then the hydroelectric plant would not be able to generate electricity. We knew that interchanges connected our phones to other phones elsewhere in the world. We had some appreciation of the fact that supermarkets and other retailers would have to call suppliers and wholesalers in order to have food delivered. Essential services and infrastructure were quite simple to understand.

    Nowadays, so much has been automated and interlinked that it can be difficult to understand how our phone calls are connected or where our power comes from. Most people do not need to really understand how society continues to function. They do not need to know that RFID chips attached to crates of fruit make sure there is always fresh fruit on supermarket shelves. The electricity grid is driven by hundreds of power stations, with the flow managed, surpluses stored and shortfalls accounted for automatically. Our phones connect to remote cell

    Enjoying the preview?
    Page 1 of 1