Cover Image for NIS2 Penetration Testing Requirements Webinar
Cover Image for NIS2 Penetration Testing Requirements Webinar
13 Went

NIS2 Penetration Testing Requirements Webinar

Hosted by Máté Török & Molnár Sándor
Virtual
Registration
Past Event
Welcome! To join the event, please register below.
About Event

NIS2 and Pentesting: Playbook with lessons from Hungary

Make your security testing program audit-ready without the drama. In this fast, practical session, Naunet shows how to design a risk-based security testing process that stands up to inspection under NIS2, grounded in real experience from Hungary’s early prescriptive rollout.

Why attend now

  • EU Regulators are moving from paper to proof.

  • Boards expect clarity. NIS2 frames security as governance.

  • Avoid audit surprises. Turn your NIS2’s open-text requirements into an actionable, right-sized testing calendar.

What you’ll learn

  • The exact NIS2 hooks for testing (Article 21, “state-of-the-art” measures, effectiveness assessments) and what inspectors actually ask to see.

  • Pentesting vs. red teaming for NIS2: what’s expected, what’s optional, and when to step up to TLPT (and when not to).

  • Three national flavors, one actionable plan: Belgium, Italy, Hungary

  • How to create evidence with due diligence for MSSPs, pentest vendors, and incident responders under NIS2.

  • What belongs in your audit binder (such as policies, scoping, test plans, findings logs, remediation proofs, and management reviews).

Agenda:

  1. NIS2 essentials

  2. Pentesting optimizing for added value

  3. Lessons learned so far

  4. QnA

Who should attend

  • CISOs, CIOs, Heads of Cyber or GRC at essential or important EU based entities.

  • Security engineering and SecOps leaders responsible for testing & detection.

  • Compliance, legal, and internal audit partners supporting NIS2 programs.

Naunet

Practitioners who are supporting organizations through Hungary’s NIS2 adoption curve.

What makes this different

  • Regulatory nuance without the legalese. We connect the dots between directive language and the artifacts auditors expect.

  • Country-specific experience.

  • Security-first, compliance-proof.

Join us to build a testing program you can defend.

13 Went