NIS-2 Requirements
Parallels to
ISO 27001
Heartland Solutions approach
Risk Management Policies
Your plan for protecting digital assets and responding to security incidents.
Asset and risk management processes for conducting risk assessments and mitigation planning.
Incident Management Plans
How your organization responds to and manages security incidents or cyberattacks.
Policy, asset, and risk management including intelligent templates and automated task management.
Business Continuity and Crisis Management
Strategies to keep your organization operating during and after a disruption.
Policy, asset, and risk management including intelligent templates and automated task management.
Human Resources Security and Access Control
Granting and revoking access to information.
Policy, asset, and risk management including intelligent templates and automated task management.
Ensuring the Effectiveness of Cybersecurity Measures
Regular reviews of cybersecurity measures.
Automated task management as well as audit features, including templates for regular audits.
Cybersecurity Training
Training your team on digital security practices.
Information security and data protection training delivered via our training manager.
Supply Chain Security
Ensuring that suppliers and service providers also protect sensitive data.
Incident Reporting Obligations
Reporting serious security incidents to the authorities.
Part of an ISMS according to ISO 27001, but not as comprehensive as NIS-2.
Vendor Management Feature Capture and audit your supply chain.Contract Management FeatureReview of data processing agreements (DPAs).
Incident Management FeatureIncluding automated risk assessment and actionable recommendations.