NIS2 Cybersecurity directive
Requirements for Latvian companies

Sectors to comply with the NIS2 directive
NIS2 requirements come into force in October 2024!
OptiСom provides the processes and services needed to meet NIS2 requirements:
• Cybersecurity audit
• Penetration tests
• Vulnerability scanning
• Checking websites
• Performance tests
• Phishing tests
• Penetration tests
• Vulnerability scanning
• Checking websites
• Performance tests
• Phishing tests
• Internet Security Training
• Continuous monitoring of events in systems (SIEM*)
• Identification, analysis and response to suspicious events
• Checking the level of security by periodically conducting test attacks
• Incident investigation and attack prevention
• Response according to SLA (Service Level Agreement)
• Provision of cybersecurity specialists with 9/5 or 24/7 monitoring
* SIEM technology provides real-time analysis of security events (alarms generated by network devices and applications) and allows you to respond to them before significant damage is done.
• Identification, analysis and response to suspicious events
• Checking the level of security by periodically conducting test attacks
• Incident investigation and attack prevention
• Response according to SLA (Service Level Agreement)
• Provision of cybersecurity specialists with 9/5 or 24/7 monitoring
* SIEM technology provides real-time analysis of security events (alarms generated by network devices and applications) and allows you to respond to them before significant damage is done.
• Firewalls and intrusion detection/prevention systems (IDS/IPS)
• Anti-virus and anti-malware solutions
• Security Information and Event Management (SIEM) systems
• Encryption tools
• Access control and identity management
• Systems for managing updates
• Incident response tools
• Backup and disaster recovery solutions
• Compliance and management tools
• Employee training and awareness-raising programs
• Secure configuration tools
• Secure communication tools
• Mobile Device Management (MDM) solutions
• Anti-virus and anti-malware solutions
• Security Information and Event Management (SIEM) systems
• Encryption tools
• Access control and identity management
• Systems for managing updates
• Incident response tools
• Backup and disaster recovery solutions
• Compliance and management tools
• Employee training and awareness-raising programs
• Secure configuration tools
• Secure communication tools
• Mobile Device Management (MDM) solutions
Apply for a consultation and get professional recommendations
+371 67 331 878 This email address is being protected from spambots. You need JavaScript enabled to view it.