2025: A new ambition for MDS.   Discover our strategy and innovations soon. In the meantime, explore our vision

Training programs

  • Welcome and presentation of the program.
  • Context and link to digital transformation.
  1. Foundations of the NIS2 Directive:
    • Understanding the challenges for your organization.
    • Implementation deadlines.
    • Governance objectives for security.
  2. Sectors and organizations concerned:
    • Distinction between Essential Entities and Important Entities.
    • Identification of the affected sectors.
  3. Main obligations:
    • Cybersecurity governance.
    • Incident reporting.
    • Risk management.
  4. Legal consequences and sanctions for non-compliance:
    • ANSSI controls.
    • Financial penalties.
    • Criminal liability of organizations and executives.
  1. Actors involved:
    • Internal: CEO, DT, CIO, CISO, DPO, Business teams.
    • External: Partners (Supply Chain), Regulations.
  2. Direct impacts:
    • Information system: Asset mapping.
    • Business processes:Business risk management.
    • Governance: Committee, documentation, auditability, training.
  3. Structuring compliance:
    • Define a clear strategy.
    • Design a structured roadmap (phases, milestones, continuous improvement).
  1. Understanding resistance to change:
    • Types of resistance (individual, collective, cultural, organizational).
    • Causes of resistance in the cyber domain.
    • Consequences of unmanaged resistance.
  2. ADKAR approach:
    • Awareness.
    • Desire.
    • Acquisition of knowledge (Knowledge).
    • Ability to act.
    • Reinforcement.
  1. Identification of key priorities:
    • Evaluation of critical assets.
    • Risk prioritization.
    • Alignment with NIS2 requirements.
  2. Actions and initial plan:
    • Implementation of Quick-Wins.
    • Defining concrete steps with SMART goals.