
AKAT Technologies & CyberArk invite you to an exclusive Morning Hub event on April 24, 2025, at Hotel Millennium, Sofia.
The digital world is rapidly evolving, bringing new challenges and compliance requirements that organizations must address. The NIS 2 Directive is reshaping cybersecurity strategies, and identity security is now more critical than ever. This event will provide you with the knowledge and tools to secure privileged access, ensure compliance, and protect your critical infrastructure.
Hotel Millennium, Sofia – Hall Columb, Floor 2
April 24, 2025
8:30am-11:30pm
What to Expect
Insights into NIS 2 compliance and the evolving cybersecurity landscape
Best practices for identity security and privileged access management
Exploration of Just-In-Time (JIT) and Zero Standing Privileges (ZSP) controls
Expert discussion on Secure Infrastructure Access (SIA) and ephemeral access methods
Who Should Attend?
This event is designed for:
CEOs, business leaders, and top management who must understand their responsibilities under NIS 2 and the risks of non-compliance
CISOs, CIOs, and security leaders responsible for protecting critical infrastructure
IT and security professionals managing identity security and privileged access
Risk and compliance officers ensuring adherence to regulatory requirements
Key Takeaways
Understand the impact of NIS 2 and how identity security plays a key role in compliance
Learn how to move beyond traditional PAM with Just-In-Time (JIT) and Zero Standing Privileges (ZSP) controls
Explore Secure Infrastructure Access (SIA) and the power of ephemeral access methods
Gain actionable insights to strengthen your security posture and mitigate identity-based threats
Network with cybersecurity experts and industry peers
Agenda
8:30 – 9:00 | Registration & Welcome Coffee
9:00 – 9:15 | New Reality, New Requirements
09:15 – 09:30 | Getting Ready for the NIS 2 Directive: Why Identity Security is Key to Compliance
09:30 – 10:15 | Go Beyond PAM: Secure Privileged Access with Just-In-Time (JIT) & Zero Standing Privileges (ZSP) Controls
10:15 – 10:30 | Coffee Break
10:30 – 11:00 | The Secure Infrastructure Access (SIA) Component – Ephemeral Access Methods
11:00 – 11:30 | Q&A & Networking