{"id":362,"date":"2026-04-12T18:42:29","date_gmt":"2026-04-12T18:42:29","guid":{"rendered":"https:\/\/jdaadvisory.com\/?page_id=362"},"modified":"2026-04-16T17:12:31","modified_gmt":"2026-04-16T15:12:31","slug":"nis-2-audit-cybersecurity","status":"publish","type":"page","link":"https:\/\/jdaadvisory.com\/en\/nis-2-audit-cybersecurity\/","title":{"rendered":"NIS-2 Audit cybersecurity"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--1\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading ext-animate--on\">NIS-2 Audit cybersecurity &#8211; Ensure security and full compliance with NIS-2.<\/h2>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\">Our NIS-2 audits provide a reliable assessment and support in meeting cybersecurity requirements &#8211; NIS-2 Audit cybersecurity.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-174606dc wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover is-style-ext-preset--image--natural-1--image-1--content-right ext-animate--on is-style-ext-preset--image--natural-1--image-1--content-right--2\" style=\"padding-top:0;padding-bottom:0;min-height:100%;aspect-ratio:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" class=\"wp-block-cover__image-background wp-image-379\" alt=\"\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:240px\" aria-hidden=\"true\" class=\"wp-block-spacer ext-animate--on\"><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--3\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h3 class=\"wp-block-heading ext-animate--on\">NIS-2 Audit cybersecurity- Comprehensive cybersecurity risk analysis.<\/h3>\n\n\n\n<p class=\"ext-animate--on\">We thoroughly identify threats and system vulnerabilities to ensure effective protection of data and infrastructure.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--4\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h3 class=\"wp-block-heading ext-animate--on\">NIS-2 Audit cybersecurity -Alignment with legal and regulatory requirements.<\/h3>\n\n\n\n<p class=\"ext-animate--on\">We assist in implementing NIS-2 compliant procedures, minimizing the risk of penalties and sanctions.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--5\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h4 class=\"wp-block-heading ext-animate--on\">Expert support at every stage of the process.<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We provide professional advisory services that facilitate the implementation of security best practices within your organization.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--6\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-174606dc wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading ext-animate--on\">We provide effective support in meeting NIS-2 requirements for your organization.<\/h4>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\" style=\"margin-top:1.5rem\">We present the key challenges related to NIS-2 and how our audits help address them effectively.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns ext-animate--on is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--7\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\">NIS-2 Compliance Audit<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We thoroughly assess the level of NIS-2 compliance, identifying areas for improvement and minimizing risk.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--8\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\">Cybersecurity Risk Assessment<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We analyze threats and help implement appropriate protective measures in line with NIS-2 standards.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns ext-animate--on is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--9\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\">Support in Documentation Preparation<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We assist in preparing the required documentation, facilitating compliance, and external audits.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--10\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0yNDgsMTI4YTU2LDU2LDAsMCwxLTk1LjYsMzkuNmwtLjMzLS4zNUw5Mi4xMiw5OS41NWE0MCw0MCwwLDEsMCwwLDU2LjlsOC41Mi05LjYyYTgsOCwwLDEsMSwxMiwxMC42MWwtOC42OSw5LjgxLS4zMy4zNWE1Niw1NiwwLDEsMSwwLTc5LjJsLjMzLjM1LDU5Ljk1LDY3LjdhNDAsNDAsMCwxLDAsMC01Ni45bC04LjUyLDkuNjJhOCw4LDAsMSwxLTEyLTEwLjYxbDguNjktOS44MS4zMy0uMzVBNTYsNTYsMCwwLDEsMjQ4LDEyOFoiPjwvcGF0aD48L3N2Zz4=\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\">Compliance Monitoring and Reporting<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We provide continuous monitoring and reporting of compliance, supporting long-term protection.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--11\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Our NIS-2 Audit Offering<\/h4>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\">Discover our comprehensive compliance audit services, ensuring security and full support in meeting NIS-2 requirements.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--12\">\n<figure class=\"wp-block-image ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8da8e0b0b6b5f9d2af1ecb0df53f0f3f791b0585.jpg\" alt=\"\" class=\"wp-image-380\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8da8e0b0b6b5f9d2af1ecb0df53f0f3f791b0585.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8da8e0b0b6b5f9d2af1ecb0df53f0f3f791b0585-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8da8e0b0b6b5f9d2af1ecb0df53f0f3f791b0585-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8da8e0b0b6b5f9d2af1ecb0df53f0f3f791b0585-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/8da8e0b0b6b5f9d2af1ecb0df53f0f3f791b0585-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Risk Assessment<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We conduct a detailed NIS-2 compliance risk analysis tailored to your organization\u2019s specific needs.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--13\">\n<figure class=\"wp-block-image ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dbec3d815affb2df2e0e7c51e8dc8e30bb6dc588.jpg\" alt=\"\" class=\"wp-image-381\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dbec3d815affb2df2e0e7c51e8dc8e30bb6dc588.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dbec3d815affb2df2e0e7c51e8dc8e30bb6dc588-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dbec3d815affb2df2e0e7c51e8dc8e30bb6dc588-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dbec3d815affb2df2e0e7c51e8dc8e30bb6dc588-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dbec3d815affb2df2e0e7c51e8dc8e30bb6dc588-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Infrastructure Audit<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We offer a thorough review of your IT infrastructure to ensure full compliance with cybersecurity requirements.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--14\">\n<figure class=\"wp-block-image ext-animate--on\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/60aa171b788bf98b1ff993984c1eb9865cbefe35.jpg\" alt=\"\" class=\"wp-image-382\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/60aa171b788bf98b1ff993984c1eb9865cbefe35.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/60aa171b788bf98b1ff993984c1eb9865cbefe35-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/60aa171b788bf98b1ff993984c1eb9865cbefe35-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/60aa171b788bf98b1ff993984c1eb9865cbefe35-768x512.jpg 768w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/60aa171b788bf98b1ff993984c1eb9865cbefe35-18x12.jpg 18w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading ext-animate--on\">Training and Advisory<\/h4>\n\n\n\n<p class=\"ext-animate--on\">We provide professional training and support in implementing NIS-2 compliant best practices.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--15\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">How the NIS-2 Audit Works<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">We present a detailed guide to help you understand each phase of the audit and effectively prepare to meet NIS-2 regulatory requirements.<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--16\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlpNMTQwLDgwdjk2YTgsOCwwLDAsMS0xNiwwVjk1bC0xMS41Niw3LjcxYTgsOCwwLDEsMS04Ljg4LTEzLjMybDI0LTE2QTgsOCwwLDAsMSwxNDAsODBaIj48L3BhdGg+PC9zdmc+\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step One: Initial Analysis<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We conduct a comprehensive assessment of your current security posture, identifying gaps and areas requiring alignment with NIS-2 standards.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--17\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlptMjUuNTYtOTIuNzRMMTIwLDE2OGgzMmE4LDgsMCwwLDEsMCwxNkgxMDRhOCw4LDAsMCwxLTYuNC0xMi44bDQzLjE3LTU3LjU2YTE2LDE2LDAsMSwwLTI3Ljg2LTE1LDgsOCwwLDAsMS0xNS4wOS01LjM0LDMyLDMyLDAsMSwxLDU1Ljc0LDI5LjkzWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step Two: Compliance Audit<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We thoroughly verify implemented security measures and processes to ensure full compliance with the NIS-2 directive.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--18\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlptMzItNjRhMzYsMzYsMCwwLDEtNjEuNzEsMjUuMTlBOCw4LDAsMSwxLDEwOS43MSwxNjYsMjAsMjAsMCwxLDAsMTI0LDEzMmE4LDgsMCwwLDEtNi41NS0xMi41OUwxMzYuNjMsOTJIMTA0YTgsOCwwLDAsMSwwLTE2aDQ4YTgsOCwwLDAsMSw2LjU1LDEyLjU5bC0yMSwzMEEzNi4wNywzNi4wNywwLDAsMSwxNjAsMTUyWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step Three: Report and Recommendations<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">We prepare a detailed audit report along with practical recommendations to support the effective implementation of necessary changes.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/jdaadvisory.com\/en\/contact\/\">JDA Advisory contacts<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-ffba7dca wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--19\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\">\n<h4 class=\"wp-block-heading ext-animate--on\">NIS-2 Audit Methodology<\/h4>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. Purpose of the Audit<\/strong><\/h4>\n\n\n\n<p class=\"ext-animate--on\">A NIS\u20112 audit aims to:<\/p>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Assess the organisation\u2019s compliance with NIS\u20112 cybersecurity and risk\u2011management obligations.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evaluate the maturity and effectiveness of security controls.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify gaps, risks, and required remediation actions.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Support regulatory readiness for supervisory inspections.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Provide evidence for governance, risk management, and reporting obligations.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2. Scope of the Audit<\/strong><\/h4>\n\n\n\n<p class=\"ext-animate--on\">The scope must reflect:<\/p>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Entity classification (Essential vs Important)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Sector and service criticality<\/li>\n\n\n\n<li class=\"ext-animate--on\">ICT and OT environment<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supply chain exposure<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Mandatory NIS\u20112 Areas<\/strong><\/h5>\n\n\n\n<p class=\"ext-animate--on\">NIS\u20112 requires controls across <strong>10 core domains<\/strong>:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\"><strong>Risk management and governance<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Policies and procedures for cybersecurity<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Incident handling<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Business continuity and disaster recovery<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Supply chain security<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Security in network and information systems<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Access control and asset management<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Cryptography and data protection<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Vulnerability and patch management<\/strong><\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>Monitoring, logging, and detection<\/strong><\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>3. Audit Process<\/strong><\/h4>\n\n\n\n<p class=\"ext-animate--on\">The audit follows <strong>six structured phases<\/strong>.<\/p>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Phase 1 \u2014 Planning &amp; Preparation<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Define audit scope, depth, and timeline.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify systems, processes, and teams involved.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Collect documentation.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Documents to Request<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Cybersecurity policies and procedures<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk assessments and risk register<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident response plan<\/li>\n\n\n\n<li class=\"ext-animate--on\">Business continuity &amp; disaster recovery plans<\/li>\n\n\n\n<li class=\"ext-animate--on\">Asset inventory (IT\/OT)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Access control procedures<\/li>\n\n\n\n<li class=\"ext-animate--on\">Vulnerability management process<\/li>\n\n\n\n<li class=\"ext-animate--on\">Logs and monitoring procedures<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier list and supply chain risk assessments<\/li>\n\n\n\n<li class=\"ext-animate--on\">Training and awareness records<\/li>\n\n\n\n<li class=\"ext-animate--on\">Previous audit reports<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Phase 2 \u2014 Documentation Review<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Assess formal compliance with NIS\u20112 requirements.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify gaps requiring deeper verification.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Activities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Map documentation to NIS\u20112 Articles 21\u201323.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evaluate completeness, accuracy, and maturity.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Identify missing or outdated procedures.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Prepare interview questions.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Phase 3 \u2014 Interviews &amp; Workshops<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Validate how processes operate in practice.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Assess organisational awareness and governance.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Typical Interviewees<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">CISO \/ Security Manager<\/li>\n\n\n\n<li class=\"ext-animate--on\">CIO \/ IT Director<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk Manager<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident Response Lead<\/li>\n\n\n\n<li class=\"ext-animate--on\">Business Continuity Manager<\/li>\n\n\n\n<li class=\"ext-animate--on\">Procurement \/ Vendor Management<\/li>\n\n\n\n<li class=\"ext-animate--on\">OT Security Lead (if applicable)<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Focus Areas<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Governance and accountability<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident detection and escalation<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backup and recovery practices<\/li>\n\n\n\n<li class=\"ext-animate--on\">Access control and identity management<\/li>\n\n\n\n<li class=\"ext-animate--on\">Vulnerability management<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supply chain oversight<\/li>\n\n\n\n<li class=\"ext-animate--on\">Monitoring and logging<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Phase 4 \u2014 Technical &amp; Operational Testing<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Verify the effectiveness of implemented controls.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Validate operational readiness.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Examples of Tests<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Review of access rights (sample\u2011based)<\/li>\n\n\n\n<li class=\"ext-animate--on\">MFA enforcement check<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backup restore test evidence<\/li>\n\n\n\n<li class=\"ext-animate--on\">Patch management sampling<\/li>\n\n\n\n<li class=\"ext-animate--on\">Log retention and monitoring review<\/li>\n\n\n\n<li class=\"ext-animate--on\">Vulnerability scan results review<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident response drill or tabletop exercise<\/li>\n\n\n\n<li class=\"ext-animate--on\">OT\/ICS segmentation verification (if applicable)<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Phase 5 \u2014 Gap Analysis &amp; Risk Assessment<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Objectives<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Identify non\u2011compliance areas.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Assess risk severity and impact.<\/li>\n\n\n\n<li class=\"ext-animate--on\">Prioritise remediation actions.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Outputs<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Gap analysis mapped to NIS\u20112 Articles<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk scoring (low\/medium\/high\/critical)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Maturity assessment<\/li>\n\n\n\n<li class=\"ext-animate--on\">Remediation roadmap<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Phase 6 \u2014 Reporting<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>Deliverables<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Suggested improvements for governance and documentation<\/li>\n\n\n\n<li class=\"ext-animate--on\">Executive summary<\/li>\n\n\n\n<li class=\"ext-animate--on\">Compliance assessment<\/li>\n\n\n\n<li class=\"ext-animate--on\">Detailed findings (major\/minor\/observations)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk rating<\/li>\n\n\n\n<li class=\"ext-animate--on\">Recommendations and remediation plan<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence summary<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">NIS\u20112 Audit Checklist<\/h3>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>1. Governance &amp; Risk Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Cybersecurity governance structure defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Roles and responsibilities documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk management methodology in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">Risk register maintained and updated<\/li>\n\n\n\n<li class=\"ext-animate--on\">Management oversight documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">Policies reviewed annually<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>2. Cybersecurity Policies &amp; Procedures<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Information security policy exists<\/li>\n\n\n\n<li class=\"ext-animate--on\">Acceptable use policy implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">Change management procedure defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Secure development practices documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">OT\/ICS security policies (if applicable)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>3. Incident Handling<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Incident response plan documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident classification defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incident register maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">Escalation procedures in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">24\u2011hour early warning capability<\/li>\n\n\n\n<li class=\"ext-animate--on\">72\u2011hour incident reporting readiness<\/li>\n\n\n\n<li class=\"ext-animate--on\">Post\u2011incident reviews performed<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>4. Business Continuity &amp; Disaster Recovery<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">BCP and DRP documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">RTO\/RPO defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backup policy implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">Backup encryption verified<\/li>\n\n\n\n<li class=\"ext-animate--on\">Restore tests performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">Crisis communication plan exists<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>5. Supply Chain Security<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Supplier inventory maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">Supplier risk assessments performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">Security requirements included in contracts<\/li>\n\n\n\n<li class=\"ext-animate--on\">Sub\u2011outsourcing controls defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Monitoring of critical suppliers performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">Third\u2011party incident reporting defined<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>6. Network &amp; Information System Security<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Network segmentation implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">Firewalls and filtering in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">Secure configuration baselines defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">OT\/ICS network separation (if applicable)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Remote access secured<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7. Access Control &amp; Identity Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">MFA enforced<\/li>\n\n\n\n<li class=\"ext-animate--on\">Least privilege principle applied<\/li>\n\n\n\n<li class=\"ext-animate--on\">Joiner\/mover\/leaver process implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">Privileged access management in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">Periodic access reviews performed<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>8. Cryptography &amp; Data Protection<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Encryption in transit<\/li>\n\n\n\n<li class=\"ext-animate--on\">Encryption at rest<\/li>\n\n\n\n<li class=\"ext-animate--on\">Key management procedures defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Data classification implemented<\/li>\n\n\n\n<li class=\"ext-animate--on\">GDPR alignment verified<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>9. Vulnerability &amp; Patch Management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Vulnerability scanning performed<\/li>\n\n\n\n<li class=\"ext-animate--on\">Patch management process defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Critical patches applied within defined SLA<\/li>\n\n\n\n<li class=\"ext-animate--on\">Asset inventory maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">Secure configuration monitoring in place<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>10. Monitoring, Logging &amp; Detection<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Logging policy defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">SIEM or log aggregation in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">Log retention meets regulatory requirements<\/li>\n\n\n\n<li class=\"ext-animate--on\">Alerting and monitoring procedures defined<\/li>\n\n\n\n<li class=\"ext-animate--on\">Detection capabilities tested<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>11. Human Resources Security<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Security awareness training conducted<\/li>\n\n\n\n<li class=\"ext-animate--on\">Phishing simulations (optional but recommended)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Background checks (where appropriate)<\/li>\n\n\n\n<li class=\"ext-animate--on\">Role\u2011based training for privileged users<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>12. Physical Security<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Access to critical areas controlled<\/li>\n\n\n\n<li class=\"ext-animate--on\">CCTV or monitoring in place<\/li>\n\n\n\n<li class=\"ext-animate--on\">Visitor logs maintained<\/li>\n\n\n\n<li class=\"ext-animate--on\">Environmental controls implemented<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>13. Documentation &amp; Evidence<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Compliance reporting prepared<\/li>\n\n\n\n<li class=\"ext-animate--on\">Policies and procedures documented<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence of control operation retained<\/li>\n\n\n\n<li class=\"ext-animate--on\">Audit trails maintained<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\">NIS-2 Act<\/a><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>NIS-2 Audit cybersecurity &#8211; Ensure security and full compliance with NIS-2. Our NIS-2 audits provide a reliable assessment and support in meeting cybersecurity requirements &#8211; NIS-2 Audit cybersecurity. NIS-2 Audit cybersecurity- Comprehensive cybersecurity risk analysis. We thoroughly identify threats and system vulnerabilities to ensure effective protection of data and infrastructure. NIS-2 Audit cybersecurity -Alignment with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-with-title","meta":{"footnotes":""},"class_list":["post-362","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS-2 Audit cybersecurity - JDA Advisory<\/title>\n<meta name=\"description\" content=\"NIS-2 Cybersecurity Audit: Compliance Assessment, Governance, Incidents, BCP\/DRP, Vendor Monitoring, and Technical Testing. Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdaadvisory.com\/en\/nis-2-audit-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS-2 Audit cybersecurity - JDA Advisory\" \/>\n<meta property=\"og:description\" content=\"NIS-2 Cybersecurity Audit: Compliance Assessment, Governance, Incidents, BCP\/DRP, Vendor Monitoring, and Technical Testing. Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdaadvisory.com\/en\/nis-2-audit-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"JDA Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T15:12:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdvisoryJd65783\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-audit-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-audit-cybersecurity\\\/\",\"name\":\"NIS-2 Audit cybersecurity - JDA Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-audit-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-audit-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg\",\"datePublished\":\"2026-04-12T18:42:29+00:00\",\"dateModified\":\"2026-04-16T15:12:31+00:00\",\"description\":\"NIS-2 Cybersecurity Audit: Compliance Assessment, Governance, Incidents, BCP\\\/DRP, Vendor Monitoring, and Technical Testing. Security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-audit-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-audit-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-audit-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/nis-2-audit-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/jdaadvisory.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS-2 Audit cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"name\":\"JDA Advisory\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\",\"name\":\"JDA Advisory\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"JDA Advisory\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/AdvisoryJd65783\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS-2 Audit cybersecurity - JDA Advisory","description":"NIS-2 Cybersecurity Audit: Compliance Assessment, Governance, Incidents, BCP\/DRP, Vendor Monitoring, and Technical Testing. Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdaadvisory.com\/en\/nis-2-audit-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"NIS-2 Audit cybersecurity - JDA Advisory","og_description":"NIS-2 Cybersecurity Audit: Compliance Assessment, Governance, Incidents, BCP\/DRP, Vendor Monitoring, and Technical Testing. Security.","og_url":"https:\/\/jdaadvisory.com\/en\/nis-2-audit-cybersecurity\/","og_site_name":"JDA Advisory","article_modified_time":"2026-04-16T15:12:31+00:00","og_image":[{"width":1440,"height":960,"url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AdvisoryJd65783","twitter_misc":{"Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jdaadvisory.com\/nis-2-audit-cybersecurity\/","url":"https:\/\/jdaadvisory.com\/nis-2-audit-cybersecurity\/","name":"NIS-2 Audit cybersecurity - JDA Advisory","isPartOf":{"@id":"https:\/\/jdaadvisory.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdaadvisory.com\/nis-2-audit-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/jdaadvisory.com\/nis-2-audit-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg","datePublished":"2026-04-12T18:42:29+00:00","dateModified":"2026-04-16T15:12:31+00:00","description":"NIS-2 Cybersecurity Audit: Compliance Assessment, Governance, Incidents, BCP\/DRP, Vendor Monitoring, and Technical Testing. Security.","breadcrumb":{"@id":"https:\/\/jdaadvisory.com\/nis-2-audit-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdaadvisory.com\/nis-2-audit-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jdaadvisory.com\/nis-2-audit-cybersecurity\/#primaryimage","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/dfbffd2e01bb75bd8d8a7c28ec7f16afa9161a00.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jdaadvisory.com\/nis-2-audit-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/jdaadvisory.com\/"},{"@type":"ListItem","position":2,"name":"NIS-2 Audit cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/jdaadvisory.com\/en\/#website","url":"https:\/\/jdaadvisory.com\/en\/","name":"JDA Advisory","description":"","publisher":{"@id":"https:\/\/jdaadvisory.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdaadvisory.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/jdaadvisory.com\/en\/#organization","name":"JDA Advisory","url":"https:\/\/jdaadvisory.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","width":1024,"height":1024,"caption":"JDA Advisory"},"image":{"@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/AdvisoryJd65783"]}]}},"_links":{"self":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/comments?post=362"}],"version-history":[{"count":5,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/362\/revisions"}],"predecessor-version":[{"id":591,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/362\/revisions\/591"}],"wp:attachment":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/media?parent=362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}