CONTACT US
Webinar_tag

Achieving Compliance with DORA & NIS2 Regulations with Corelight

SPEAKERS
Tim Watson - image

Tim Watson

Director of Marketing, International

Matt Ellison - image

Matt Ellison

Director of Sales Engineering for EMEA and APAC, Corelight

Register for this webinar today

 

Date: January 21st
Time: 10am GMT 

Is your organisation impacted by the new compliance regulations such as DORA (Digital Operational Resilience Act) or NIS2 (Network and Information Systems Directive)?

Join Tim Watson and Matt Ellison for an insightful webinar to learn how Corelight can help your organisation navigate and achieve compliance with these critical EU regulations.

Key Discussion Points:
- Understanding DORA & NIS2: An overview into the regulatory requirements and what they mean for your organisation.
- Corelight’s Role in Compliance: Discover how Corelight’s advanced network security monitoring, threat detection, and incident response capabilities can support compliance with DORA and NIS2.
- Enhancing Cyber Risk Management: Learn how Corelight can empower your team to detect, respond to, and mitigate cyber threats, ensuring your organisation is ready for any security challenges.

Don’t miss the opportunity to learn how Corelight can help you stay ahead of the curve in achieving compliance with DORA and NIS2, and ensure your organisation’s operational resilience in the face of growing cyber threats.

Register now to secure your spot!
Matt Ellison - image

SPEAKER:

Matt Ellison

Director of Sales Engineering for EMEA and APAC, Corelight

Matt has specialised in cyber security for over 15 years across endpoint, network and user technologies and has led teams in product management, product marketing and technical sales. With previous roles at Symantec, LogRhythm and BAE Systems, Matt’s extensive experience has allowed him to work with numerous organisations across EMEA and APAC helping them understand how best to address their security challenges.

corelight-logo-white

Corelight provides security teams with network evidence so they can protect the world's most critical organizations and companies.