Videos

IAM and NIS 2: 5 Tips to Take Control of User Access Within Days

February 02, 2026 IAM, Identity Governance, Keynote, NIS2
NIS2 requires you to be in control of all aspects of your cybersecurity. With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance. ✅ NIS2 and IAM: The Ins and Outs ✅ 5 Tips how to Control User Access within Days ✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale