Why attend?
NIS2 is no longer about preparing yourself, it’s about proving . That means you need more than awareness. You need structure, evidence, and a clear way to show your compliance to auditors, partners, and regulators.
In this compact, hands-on session, Cingulum and Easi show how to move from scattered Excel sheets to a working Information Security Management System (ISMS). We’ll demonstrate what a build phase looks like in practice governance on one side, tooling on the other.
You’ll walk away with:
A clear view of what “evidence-based” compliance means in 2025
Practical examples of how to build and maintain an ISMS
A better understanding of what you’ll be expected to prove, and how
- A look at some tooling, such as Drata & Responsum
Whether you’re in scope or in someone else’s supply chain, your security posture is on the record. This session helps you make sure it holds up.
What you'll gain
- Insight into combining GRC and tooling for smoother compliance
- Practical guidance on building or upgrading your ISMS
- Expert answers tailored to your context
Who should attend?
- CISOs, ISOs, DPOs, and IT Managers
- Compliance officers in critical sectors
- Organisations subject to NIS2 or part of a NIS2 supply chain
Introducing our speakers

Willem Magerman
Expert Consultant at Cingulum
Willem's experience in information security, cyber security and security compliance allows him to strengthen companies' cyber security posture without losing sight of legal, customer, and other requirements. His approach is straightforward: make data-driven decisions, and implement strategies that actually work.

Stef Christiaensen
Business Developer at Easi
Stef focuses on helping companies achieve better and smarter performance by applying humanised technology. He emphasises technology that supports people rather than replaces them, enabling organisations to work more effectively. His approach centres on making innovation practical, accessible, and aligned with real human needs.