NIS-2 User Workshop

NIS-2 User Workshop

NIS-2 User Workshop

Understanding and Implementing NIS-2 - Guidance and Starting Points for Those Responsible

The NIS2 Directive makes cybersecurity and resilience the responsibility of company management. Affected organisations face the challenge of meaningfully integrating regulatory requirements, technical measures, and organisational responsibility.

This event is aimed at decision-makers and those in positions of responsibility who want to understand, was NIS-2 konkret bedeutet, who is really affected and how to structure the start of implementation successfully.

Note:
The event is designed to be cross-industry. No internal organisational details will be discussed. The focus is on orientation, structure, and feasibility.

9 June 2026

12:30 – 16:30

Courtyard by Marriott, Berlin-Mitte

NIS-2 Check: Deutor & Heuking show you how to implement it. Legally secure & technically protected. Your roadmap to resilience – Register now and secure your „Early Bird“ discount!

Agenda

Time

Referent

Topic & Content

12:30 – 13:00

Registration and Light Lunch

13:00 – 13:10

Deutor and Heuking

Welcome and Strategic Introduction

  • Welcome and Overview Introducing the speakers and the workshop day
  • Objective Are you affected by NIS-2? What are the requirements and how can you become NIS-2 compliant?

Part 1 – Legal Framework and Minimum Requirements

13:10 – 13:30

Heuking

Overview of current and future regulatory requirements

  • Current legal situation: Overview of relevant laws (EnWG, CRA, etc.)
  • Legal basis and scope of application: Who is affected? (Essential vs. important facilities)
  • Outlook: Overview of current regulatory developments (Digital Omnibus)

13:30 – 13:50

Deutor

Minimum requirements of NIS2

  • Risk Analysis Analysis of your company's current IT status
  • Strategic Measures and Security: Are there emergency plans and BCM plans, and are they NIS 2 compliant?
  • Technical and organisational measures What does your cyber hygiene look like and are your staff trained?

Monitoring Are you in control of third-party risks? How effective are your risk management and incident response?

13:50 – 14:10

To Be Determined

Report on the experience of an affected company

  • Impact analysis
  • Risk analysis: current state

Implementation NIS 2

Coffee break and networking

Part 2 – Interactive Workshop on NIS-2 Implementation

14:30 – 15:30

Heuking / Deutor

Building a resilient security culture and implementing NIS 2 (Measures 1–7)

  • Scope check Practical criteria for classifying your company.
  • Measure focus: Risk Management, Incident Handling, Business Continuity.
  • Integration into the existing ISMS How NIS 2 fits with ISO 27001 / ISO 22301.
  • Interactive task: Identifying the most critical areas within one's own company
  • Checklists: What does a structured roadmap look like for compliance with the regulations.

Discussion: Legal requirements versus technical feasibility.

15:30 – 16:30

Deutor / Heuking

Workshop Part 2: Building a resilient security culture and implementing NIS 2 (Measures 8–13)

  • Measure focus: Basic Hygiene (Access Control, Multi-Factor Authentication (MFA), Security Awareness).
  • Scenario analysis How should I behave in an emergency? (Reaction, reporting, recovery).

Conclusion & Next Steps Concrete actions you can implement tomorrow.