Please select a language

Please select the country/region where you would like to introduce your business.

Contact Us
Contact Us

Please select a language

Please select the country/region where you would like to introduce your business.

Knowledge What is the NIS2 Directive? Introducing its requirements and the need for cyber resilience(4/4)~Key Points for Strengthening Cyber Resilience~

To enhance cyber resilience and reduce damage from cyberattacks, specific risk management measures based on the NIS2 Directive are necessary.


img

As the risk of cyberattacks increases worldwide, it has become urgent for global companies with overseas branches to implement comprehensive cybersecurity measures. The NIS2 Directive, established by the EU, aims to strengthen "cyber resilience" to minimize the damage caused by cyberattacks and provides specific guidelines for strengthening security.

This article provides an overview of the NIS2 Directive and the importance of cyber resilience and introduces specific strengthening methods and examples in four parts.

4. Key Points for Strengthening Cyber Resilience

Key Points for Strengthening Cyber Resilience

Strengthening cyber resilience requires measures that address both organizational and technology aspects, centered on risk management based on the NIS2 Directive. The specific points of improvement are explained below.

Conducting risk assessments and setting priorities for countermeasures

First, conduct a risk assessment to inventory IT assets, identify all systems and data, and then evaluate the importance of each. Then, prioritize responses in areas with higher risks to ensure business continuity for the company.

Strengthening organization

When implementing comprehensive measures that will permeate all bases, including overseas branches, the following four points are important:

Establishment of a reporting system

Establish a system that enables prompt and accurate reporting in a unified format when an incident occurs. By clarifying communication channels and standardizing reporting procedures, you can improve the speed and accuracy of information sharing.

Building an incident response framework

Establish a unified incident response process across your organization to expedite response. Security policies and codes of conduct will be established under the headquarters’ leadership, and response procedures will be standardized, such as "firstly, isolate the affected system" and "secondly, identify the scope of the data leak."

Employee education and security management, including the supply chain

To raise the security awareness of each employee, provide regular security training and education, and instill an understanding of the incident response process. Additionally, work with partner companies to prepare for risks through joint training across the entire supply chain.

Establishment of a Business Continuity Plan (BCP)

Create a plan to enable business continuity and share it with the entire company, even after an incident. For example, organize recovery procedures when restoring important systems, such as utilizing backup data in a cloud environment.

Strengthening systems

To build a flexible and robust system foundation, do the following:

Periodic diagnostics execution

Conduct regular vulnerability scans to detect and promptly remediate them. For example, conduct vulnerability scans on a monthly basis and apply patches to address any risks discovered.

Network separation

Implement network isolation and segmentation to restrict access to critical assets and ensure system availability. For example, internal company networks can be separated into "business," "administration," and "visitor" sections to prevent intrusion from outside.

Automation through tool implementation

Introduce tools such as SIEM (log analysis platform) and EDR to enable real-time threat detection and response. Utilize AI and other technologies to create a 24-hour monitoring system, reducing the burden on personnel and improving the efficiency of the security system.

5. Summary

Strengthening cyber resilience based on the EU's NIS2 Directive is not only a security measure but also an important initiative aimed at minimizing risks to business on a global level and maintaining competitiveness. By complying with the NIS2 Directive, companies can not only comply with legal regulations but also strengthen the trust of their customers and business partners, and establish an advantage in the global marketplace.

To build a foundation for cyber resilience, it is important to take comprehensive and continuous steps from both organizational and system perspectives and establish a system capable of rapid response and recovery. KDDI supports customers in complying with the NIS2 Directive and building cyber resilience. Please feel free to contact us.