- Background, regulatory requirements, e.g., NIS2, Cybersecurity Act
- Challenges: Much data, less information; technological barriers, legacy systems, siloed operations
- Approaches to address those challenges with e.g., standardization and automation, education, and more