{"id":25597,"date":"2023-10-25T09:06:32","date_gmt":"2023-10-25T07:06:32","guid":{"rendered":"https:\/\/enginsight.com\/nis2\/"},"modified":"2026-01-26T12:33:18","modified_gmt":"2026-01-26T11:33:18","slug":"nis2","status":"publish","type":"page","link":"https:\/\/enginsight.com\/en\/nis2\/","title":{"rendered":"NIS2"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"25597\" class=\"elementor elementor-25597\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a648c85 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a648c85\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"video\",\"background_video_link\":\"https:\\\/\\\/enginsight.com\\\/wp-content\\\/uploads\\\/KRITIS-header-video_HD.mp4\"}'>\n\t\t\t\t\t\t\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35963e2\" data-id=\"35963e2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cc36479 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc36479\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fdbfe5f\" data-id=\"fdbfe5f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1917c45 premium-title-icon-column premium-title-icon-column premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"1917c45\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"premium-title-icon\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/made-in-germany-enginsight-1.png\" alt=\"made-in-germany-enginsight\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tRisk Management Measures for IT Security\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12a3a9e premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"12a3a9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">NIS2 Directive <\/span><span class=\"premium-dual-header-second-header \">Compliance for Cybersecurity in the EU<\/span><\/h1> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be57816 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"be57816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13a6a97 elementor-widget elementor-widget-text-editor\" data-id=\"13a6a97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">The overall requirements of cybersecurity criteria and the number of affected companies have increased significantly with NIS2. Companies are required to implement the new security measures by October 2024. If you want to implement the requirements of the NIS2 Directive easily and sustainably, you&#x2019;ve come to the right place.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-488cd74 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"488cd74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Increase in Security Level<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prevention of Cyber Attacks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">EU-compliant Compliance Standards <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3e64c54 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e64c54\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9632ba3\" data-id=\"9632ba3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d57a25 elementor-align-center elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"6d57a25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#Umsetzen-mit-Enginsight\" title=\"IDS Intrusion Detection System (System zur Angriffserkennung)\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more about Enginsight's NIS2 Compliance<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a010b39 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"a010b39\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-1a1fd1a\" data-id=\"1a1fd1a\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0fbb796 elementor-widget elementor-widget-image\" data-id=\"0fbb796\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"345\" height=\"125\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv.png\" class=\"attachment-large size-large wp-image-5808\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv.png 345w, https:\/\/enginsight.com\/wp-content\/uploads\/2020\/07\/lvv-300x109.png 300w\" sizes=\"(max-width: 345px) 100vw, 345px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-9ffa551\" data-id=\"9ffa551\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44a301a elementor-widget elementor-widget-image\" data-id=\"44a301a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"734\" height=\"554\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/IT-Security-made-in-Germany_TeleTrusT-Seal.png\" class=\"attachment-large size-large wp-image-10194\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-31934bd\" data-id=\"31934bd\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ffc349 elementor-widget elementor-widget-image\" data-id=\"3ffc349\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"200\" height=\"83\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2021\/09\/Logo_Teilnehmer_Web-200x83xc.png\" class=\"attachment-large size-large wp-image-9141\" alt=\"Allianz_fuer_Cybersicherheit_Enginsight\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-269c165\" data-id=\"269c165\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d14a599 elementor-widget elementor-widget-image\" data-id=\"d14a599\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"414\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/03\/tuev-WEISS.png\" class=\"attachment-large size-large wp-image-10196\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-5ce2e15\" data-id=\"5ce2e15\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67a801d elementor-widget elementor-widget-image\" data-id=\"67a801d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"150\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/02\/jenoptik.png\" class=\"attachment-large size-large wp-image-5183\" alt=\"Jenoptik\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a0ae57d elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"a0ae57d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-291b6f4\" data-id=\"291b6f4\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71a48ff elementor-widget elementor-widget-image\" data-id=\"71a48ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"150\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2020\/02\/hanse.png\" class=\"attachment-large size-large wp-image-5181\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-7ba0764\" data-id=\"7ba0764\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-edc2d1c elementor-widget elementor-widget-image\" data-id=\"edc2d1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"136\" height=\"102\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/HSV_sw.png\" class=\"attachment-large size-large wp-image-15536\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-561d818\" data-id=\"561d818\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e428d0b elementor-widget elementor-widget-image\" data-id=\"e428d0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"112\" height=\"46\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/HDI_sw.png\" class=\"attachment-large size-large wp-image-15538\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-2084e52\" data-id=\"2084e52\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fdde4a7 elementor-widget elementor-widget-image\" data-id=\"fdde4a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"132\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-1024x169.png\" class=\"attachment-large size-large wp-image-15540\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-1024x169.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-300x50.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw-768x127.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/tmbjs-logo-sw.png 1517w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-top-column elementor-element elementor-element-6d61c96\" data-id=\"6d61c96\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e19332e elementor-widget elementor-widget-image\" data-id=\"e19332e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"121\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/ZapfCreation-sw-1.png\" class=\"attachment-large size-large wp-image-15544\" alt=\"\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dccf055 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dccf055\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a770882\" data-id=\"a770882\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79349bf premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"79349bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tThe new cybersecurity act\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf90002 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"cf90002\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">What is the NIS-2 directive? <\/span><span class=\"premium-dual-header-second-header \">And what does it mean for companies?<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f03ede8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f03ede8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-19e892a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"19e892a\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b1eef2\" data-id=\"5b1eef2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-85d1572 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"85d1572\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cbf8ef8\" data-id=\"cbf8ef8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff115b1 elementor-widget elementor-widget-text-editor\" data-id=\"ff115b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">The NIS-2 Directive (The Network and Information Security Directive) is an EU-wide regulation for cyber and information security. It contains legal requirements for IT security to bring the current minimum security standard to a new level and to remedy existing deficiencies. <\/span><\/p>\n<p><span data-contrast=\"none\">Since April 2023, there has already been an existing draft bill for the new law in Germany, which has been submitted to the Federal Ministry as the NIS-2 Implementation and Cybersecurity Strengthening Act. <\/span><span data-ccp-props=\"{\"> <\/span><\/p>\n<p><span data-contrast=\"none\">Among other things, the strengthened NIS-2 directive focuses on:<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5834dcb elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5834dcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Supply chain security<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Risk management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Tightening of supervisory measures and obligations (keyword: personal liability of management)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Introduction of enforcement rules with harmonized sanctions in all member states<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f18246c\" data-id=\"f18246c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e329448 elementor-widget elementor-widget-image\" data-id=\"e329448\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#download\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"694\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/nis2_enginsight_matrix-poster.jpg\" class=\"attachment-large size-large wp-image-24893\" alt=\"NIS2 Compliance mit Enginsight und Partnern, Plakat\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/nis2_enginsight_matrix-poster.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/nis2_enginsight_matrix-poster-300x260.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/nis2_enginsight_matrix-poster-768x666.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0b45bdf elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b45bdf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b309cde\" data-id=\"b309cde\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a2e596 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"0a2e596\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tWho is affected?\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fa51e4 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"9fa51e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">NIS-2 affected sectors <\/span><span class=\"premium-dual-header-second-header \">and companies<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72c2bfc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"72c2bfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-323f6fb elementor-widget elementor-widget-text-editor\" data-id=\"323f6fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW89705853 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW89705853 BCX8\">Enforcement of NIS2 depends on the category in which an organization is classified. An organization or institution can be classified as essential (Essential Entity) or important ( <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW89705853 BCX8\">Important<\/span><span class=\"NormalTextRun SCXW89705853 BCX8\"> (Important Entity). The dependence of the classification is determined by the size of the company and whether it falls under a high criticality sector or other critical sectors. Fines for violations and oversight by authorities vary by classification.<\/span><\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8001ef premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"b8001ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tClassification by company size\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0c3049 premium-tabs-icon-row elementor-widget elementor-widget-premium-addon-tabs\" data-id=\"c0c3049\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"premium_tabs_repeater\":[{\"_id\":\"9047a91\",\"premium_tabs_title\":\"Small business\",\"premium_tabs_content_temp\":null,\"lottie_url\":null,\"icon_type\":null,\"image_upload\":null,\"premium_tabs_content_text\":\"&lt;p&gt;&lt;span class=\\\"TextRun SCXW139688876 BCX8\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"&gt;&lt;span class=\\\"NormalTextRun SCXW139688876 BCX8\\\"&gt;Less than 50 employees, maximum 10 million euros in sales or maximum 10 million euros balance sheet&lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/p&gt;\",\"index\":0,\"premium_tabs_icon_switcher\":\"\",\"premium_tabs_icon_updated\":null,\"custom_svg\":null,\"draw_svg\":null,\"svg_sync\":null,\"frames\":null,\"lottie_loop\":null,\"lottie_reverse\":null,\"start_point\":null,\"end_point\":null,\"svg_hover\":null,\"svg_yoyo\":null,\"svg_color\":null,\"premium_tabs_content\":\"text_editor\",\"container_id\":null,\"live_temp_content\":null,\"custom_tab_navigation\":\"\",\"path_width\":null},{\"premium_tabs_title\":\"Medium-sized companies\",\"_id\":\"a54cc22\",\"lottie_url\":null,\"premium_tabs_content_temp\":null,\"image_upload\":null,\"premium_tabs_content_text\":\"&lt;p&gt;&lt;span class=\\\"TextRun SCXW177533608 BCX8\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"&gt;&lt;span class=\\\"NormalTextRun SCXW177533608 BCX8\\\"&gt;50 - 249 employees, maximum sales of 50 million euros or balance sheet of 10 - 43 million euros&lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/p&gt;\",\"index\":1,\"premium_tabs_icon_switcher\":\"\",\"icon_type\":null,\"premium_tabs_icon_updated\":null,\"custom_svg\":null,\"draw_svg\":null,\"svg_sync\":null,\"frames\":null,\"lottie_loop\":null,\"lottie_reverse\":null,\"start_point\":null,\"end_point\":null,\"svg_hover\":null,\"svg_yoyo\":null,\"svg_color\":null,\"premium_tabs_content\":\"text_editor\",\"container_id\":null,\"live_temp_content\":null,\"custom_tab_navigation\":\"\",\"path_width\":null},{\"premium_tabs_title\":\"Large companies\",\"lottie_url\":null,\"premium_tabs_content_temp\":null,\"image_upload\":null,\"premium_tabs_content_text\":\"&lt;p&gt;&lt;span class=\\\"TextRun SCXW154942120 BCX8\\\" lang=\\\"DE-DE\\\" xml:lang=\\\"DE-DE\\\" data-contrast=\\\"none\\\"&gt;&lt;span class=\\\"NormalTextRun SCXW154942120 BCX8\\\"&gt;at least 250 employees, more than 50 million euros in sales or more than 43 million euros in balance sheet total &lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/p&gt;\",\"_id\":\"3d77465\",\"index\":2,\"premium_tabs_icon_switcher\":\"\",\"icon_type\":null,\"premium_tabs_icon_updated\":null,\"custom_svg\":null,\"draw_svg\":null,\"svg_sync\":null,\"frames\":null,\"lottie_loop\":null,\"lottie_reverse\":null,\"start_point\":null,\"end_point\":null,\"svg_hover\":null,\"svg_yoyo\":null,\"svg_color\":null,\"premium_tabs_content\":\"text_editor\",\"container_id\":null,\"live_temp_content\":null,\"custom_tab_navigation\":\"\",\"path_width\":null}],\"premium_tab_style_selected\":\"style3\",\"premium_tab_active_background_color\":\"#E91E63\",\"accordion_tabs\":\"true\",\"accordion_tabs_devices\":[\"mobile\"],\"premium_tab_background_color\":\"#FFFFFF00\",\"default_tab_index\":0,\"premium_tab_type\":\"horizontal\",\"accordion_animation\":\"yes\",\"accordion_tabs_anim_duration\":\"fast\"}' data-widget_type=\"premium-addon-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t&#13;\n\t\t\t<div data-navigation='[\"\",\"\",\"\"]' id=\"premium-tabs-c0c3049\" class=\"premium-tabs premium-tabs-style-flip premium-tabs-horizontal\">&#13;\n\t\t\t\t<div class=\"premium-tabs-nav horizontal\">&#13;\n\t\t\t\t\t<ul class=\"premium-tabs-nav-list premium-tabs-horizontal\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-9047a91\" data-list-index=\"0\" data-content-id=\"#premium-accordion-content-0\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-0-c0c3049\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tSmall business\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-0\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-0-c0c3049\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW139688876 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW139688876 BCX8\">Less than 50 employees, maximum 10 million euros in sales or maximum 10 million euros balance sheet<\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-a54cc22\" data-list-index=\"1\" data-content-id=\"#premium-accordion-content-1\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-1-c0c3049\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tMedium-sized companies\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-1\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-1-c0c3049\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW177533608 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW177533608 BCX8\">50 &#x2013; 249 employees, maximum sales of 50 million euros or balance sheet of 10 &#x2013; 43 million euros<\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-3d77465\" data-list-index=\"2\" data-content-id=\"#premium-accordion-content-2\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-2-c0c3049\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tLarge companies\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-2\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-2-c0c3049\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW154942120 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW154942120 BCX8\">at least 250 employees, more than 50 million euros in sales or more than 43 million euros in balance sheet total <\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>&#13;\n\t\t\t\t<\/div>&#13;\n&#13;\n\t\t\t\t<div class=\"premium-content-wrap premium-tabs-horizontal\">&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-0-c0c3049\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW139688876 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW139688876 BCX8\">Less than 50 employees, maximum 10 million euros in sales or maximum 10 million euros balance sheet<\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-1-c0c3049\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW177533608 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW177533608 BCX8\">50 &#x2013; 249 employees, maximum sales of 50 million euros or balance sheet of 10 &#x2013; 43 million euros<\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-2-c0c3049\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW154942120 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW154942120 BCX8\">at least 250 employees, more than 50 million euros in sales or more than 43 million euros in balance sheet total <\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t<\/div>&#13;\n&#13;\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0111b36 elementor-widget elementor-widget-text-editor\" data-id=\"0111b36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW157415970 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW157415970 BCX8\">Should companies fail to comply with the new measures of the NIS-2 Directive, they may be subject to heavy fines, depending on the sector. Fines range from 10 million euros or 2 percent of annual revenue for essential facilities. Major facilities may incur costs of 7 million euros or 1.4 percent of annual sales. <\/span><\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-474bcb9 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"474bcb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tNIS2 Directive affected sectors\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-758ff47 premium-tabs-icon-row elementor-widget elementor-widget-premium-addon-tabs\" data-id=\"758ff47\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"premium_tabs_repeater\":[{\"_id\":\"9047a91\",\"premium_tabs_title\":\"ESSENTIAL ENTITIES\",\"premium_tabs_content_temp\":null,\"lottie_url\":null,\"icon_type\":null,\"image_upload\":null,\"premium_tabs_content_text\":\"&lt;p&gt;&lt;strong&gt;= Sectors with high criticality:&lt;\\\/strong&gt;&lt;\\\/p&gt;&lt;p&gt;Energy I Transportation I Banking and Finance I Healthcare I Water Supply I Digital Infrastructure I Public Administration I Space I ICT Services&lt;\\\/p&gt;\",\"index\":0,\"premium_tabs_icon_switcher\":\"\",\"premium_tabs_icon_updated\":null,\"custom_svg\":null,\"draw_svg\":null,\"svg_sync\":null,\"frames\":null,\"lottie_loop\":null,\"lottie_reverse\":null,\"start_point\":null,\"end_point\":null,\"svg_hover\":null,\"svg_yoyo\":null,\"svg_color\":null,\"premium_tabs_content\":\"text_editor\",\"container_id\":null,\"live_temp_content\":null,\"custom_tab_navigation\":\"\",\"path_width\":null},{\"premium_tabs_title\":\"IMPORTANT ENTITIES\",\"_id\":\"a54cc22\",\"lottie_url\":null,\"premium_tabs_content_temp\":null,\"image_upload\":null,\"premium_tabs_content_text\":\"&lt;p&gt;&lt;strong&gt;= Other critical sectors&lt;\\\/strong&gt;&lt;\\\/p&gt;&lt;p&gt;Postal and courier services I Waste management I Chemicals I FoodI Research I Digital services I Manufacturing of goods&lt;\\\/p&gt;\",\"index\":1,\"premium_tabs_icon_switcher\":\"\",\"icon_type\":null,\"premium_tabs_icon_updated\":null,\"custom_svg\":null,\"draw_svg\":null,\"svg_sync\":null,\"frames\":null,\"lottie_loop\":null,\"lottie_reverse\":null,\"start_point\":null,\"end_point\":null,\"svg_hover\":null,\"svg_yoyo\":null,\"svg_color\":null,\"premium_tabs_content\":\"text_editor\",\"container_id\":null,\"live_temp_content\":null,\"custom_tab_navigation\":\"\",\"path_width\":null}],\"premium_tab_style_selected\":\"style3\",\"premium_tab_active_background_color\":\"#E91E63\",\"accordion_tabs\":\"true\",\"accordion_tabs_devices\":[\"mobile\"],\"premium_tab_background_color\":\"#FFFFFF00\",\"default_tab_index\":0,\"premium_tab_type\":\"horizontal\",\"accordion_animation\":\"yes\",\"accordion_tabs_anim_duration\":\"fast\"}' data-widget_type=\"premium-addon-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t&#13;\n\t\t\t<div data-navigation='[\"\",\"\"]' id=\"premium-tabs-758ff47\" class=\"premium-tabs premium-tabs-style-flip premium-tabs-horizontal\">&#13;\n\t\t\t\t<div class=\"premium-tabs-nav horizontal\">&#13;\n\t\t\t\t\t<ul class=\"premium-tabs-nav-list premium-tabs-horizontal\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-9047a91\" data-list-index=\"0\" data-content-id=\"#premium-accordion-content-0\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-0-758ff47\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tESSENTIAL ENTITIES\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-0\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-0-758ff47\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>= Sectors with high criticality:<\/strong><\/p><p>Energy I Transportation I Banking and Finance I Healthcare I Water Supply I Digital Infrastructure I Public Administration I Space I ICT Services<\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-a54cc22\" data-list-index=\"1\" data-content-id=\"#premium-accordion-content-1\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-1-758ff47\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tIMPORTANT ENTITIES\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-1\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-1-758ff47\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>= Other critical sectors<\/strong><\/p><p>Postal and courier services I Waste management I Chemicals I FoodI Research I Digital services I Manufacturing of goods<\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>&#13;\n\t\t\t\t<\/div>&#13;\n&#13;\n\t\t\t\t<div class=\"premium-content-wrap premium-tabs-horizontal\">&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-0-758ff47\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>= Sectors with high criticality:<\/strong><\/p><p>Energy I Transportation I Banking and Finance I Healthcare I Water Supply I Digital Infrastructure I Public Administration I Space I ICT Services<\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-1-758ff47\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>= Other critical sectors<\/strong><\/p><p>Postal and courier services I Waste management I Chemicals I FoodI Research I Digital services I Manufacturing of goods<\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t<\/div>&#13;\n&#13;\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5f37758 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f37758\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-048d299\" data-id=\"048d299\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dad4483 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"dad4483\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tAct now\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f26451 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"0f26451\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">NIS2 requirements <\/span><span class=\"premium-dual-header-second-header \"> simply implement <\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61ec103 elementor-widget elementor-widget-text-editor\" data-id=\"61ec103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive does not specify concrete technical measures. For this, reference is made to industry standards, such as B3S! There is generally a lot of overlap with <a href=\"https:\/\/enginsight.com\/en\/isms-iso-27001\/\" target=\"_blank\" rel=\"noopener\">ISO\/IEC 27001<\/a>.<\/p>\n<p>Learn at a glance how Enginsight software and matching partner services can help you implement and continuously comply with NIS2.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b153e elementor-widget elementor-widget-button\" data-id=\"26b153e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"#download\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Essentials to the NIS2 Directive now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2fe6a20\" data-id=\"2fe6a20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20f289f elementor-widget elementor-widget-image\" data-id=\"20f289f\" data-element_type=\"widget\" data-e-type=\"widget\" title=\"Enginsight-Matrix zur BSI-Orientierungshilfe&#xA0;\" alt=\"Enginsight-Matrix zur BSI-Orientierungshilfe&#xA0;\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"1102\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/NIS2-enginsight-matrix.png\" class=\"attachment-full size-full wp-image-24895\" alt=\"NIS2-Richtlinie mit Enginsight und Partnern umsetzen, Plakat\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/NIS2-enginsight-matrix.png 800w, https:\/\/enginsight.com\/wp-content\/uploads\/NIS2-enginsight-matrix-218x300.png 218w, https:\/\/enginsight.com\/wp-content\/uploads\/NIS2-enginsight-matrix-743x1024.png 743w, https:\/\/enginsight.com\/wp-content\/uploads\/NIS2-enginsight-matrix-768x1058.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ab1042e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab1042e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-53e49ed\" data-id=\"53e49ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94e41ad premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"94e41ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tWhat does this mean for decision-makers in regulated companies?\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b458b0e premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"b458b0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">NIS-2 requirements <\/span><span class=\"premium-dual-header-second-header \">for companies<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-574192e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"574192e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f65ffa2 elementor-widget elementor-widget-text-editor\" data-id=\"f65ffa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The requirements of NIS2 can be roughly divided into four categories, from which <a href=\"#umsetzen\">security objectives<\/a> and, based on them, measures can be derived to improve the security status or to demonstrate it.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07ee75f premium-tabs-icon-row elementor-widget elementor-widget-premium-addon-tabs\" data-id=\"07ee75f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_tabs_repeater&quot;:[{&quot;_id&quot;:&quot;9047a91&quot;,&quot;premium_tabs_title&quot;:&quot;Risk Management&quot;,&quot;lottie_url&quot;:null,&quot;icon_type&quot;:null,&quot;image_upload&quot;:null,&quot;premium_tabs_content_text&quot;:&quot;&lt;p&gt;&lt;span class=\\&quot;TextRun SCXW239384855 BCX8\\&quot; lang=\\&quot;DE-DE\\&quot; xml:lang=\\&quot;DE-DE\\&quot; data-contrast=\\&quot;none\\&quot;&gt;&lt;span class=\\&quot;NormalTextRun SCXW239384855 BCX8\\&quot;&gt;NIS2 requires companies to regularly evaluate their IT landscape to identify security vulnerabilities and implement appropriate measures to protect and prevent potential cyberattacks. These measures include: Risk management, supply chain security, improved network security, better access control and encryption.&lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/p&gt;&quot;,&quot;index&quot;:0,&quot;premium_tabs_icon_switcher&quot;:&quot;&quot;,&quot;premium_tabs_icon_updated&quot;:null,&quot;custom_svg&quot;:null,&quot;draw_svg&quot;:null,&quot;svg_sync&quot;:null,&quot;frames&quot;:null,&quot;lottie_loop&quot;:null,&quot;lottie_reverse&quot;:null,&quot;start_point&quot;:null,&quot;end_point&quot;:null,&quot;svg_hover&quot;:null,&quot;svg_yoyo&quot;:null,&quot;svg_color&quot;:null,&quot;premium_tabs_content&quot;:&quot;text_editor&quot;,&quot;container_id&quot;:null,&quot;live_temp_content&quot;:null,&quot;premium_tabs_content_temp&quot;:null,&quot;custom_tab_navigation&quot;:&quot;&quot;,&quot;path_width&quot;:null},{&quot;premium_tabs_title&quot;:&quot;Incident management&quot;,&quot;_id&quot;:&quot;a54cc22&quot;,&quot;lottie_url&quot;:null,&quot;premium_tabs_content_temp&quot;:null,&quot;image_upload&quot;:null,&quot;premium_tabs_content_text&quot;:&quot;&lt;p&gt;&lt;span class=\\&quot;TextRun SCXW182028236 BCX8\\&quot; lang=\\&quot;DE-DE\\&quot; xml:lang=\\&quot;DE-DE\\&quot; data-contrast=\\&quot;auto\\&quot;&gt;&lt;span class=\\&quot;NormalTextRun SCXW182028236 BCX8\\&quot;&gt;NIS2 requires that executives take responsibility for overseeing their organization's cybersecurity measures and familiarize themselves with NIS 2 guidelines. If the requirements are violated, severe sanctions may be imposed on managers.&lt;\\\/span&gt;&lt;span class=\\&quot;NormalTextRun SCXW182028236 BCX8\\&quot;&gt; &lt;\\\/span&gt;&lt;span class=\\&quot;NormalTextRun SCXW182028236 BCX8\\&quot;&gt; &lt;\\\/span&gt;&lt;\\\/span&gt;&lt;span class=\\&quot;EOP SCXW182028236 BCX8\\&quot; data-ccp-props=\\&quot;{\\&quot;201341983\\&quot;:0,\\&quot;335559739\\&quot;:160,\\&quot;335559740\\&quot;:259}\\&quot;&gt; &lt;\\\/span&gt;&lt;\\\/p&gt;&quot;,&quot;index&quot;:1,&quot;premium_tabs_icon_switcher&quot;:&quot;&quot;,&quot;icon_type&quot;:null,&quot;premium_tabs_icon_updated&quot;:null,&quot;custom_svg&quot;:null,&quot;draw_svg&quot;:null,&quot;svg_sync&quot;:null,&quot;frames&quot;:null,&quot;lottie_loop&quot;:null,&quot;lottie_reverse&quot;:null,&quot;start_point&quot;:null,&quot;end_point&quot;:null,&quot;svg_hover&quot;:null,&quot;svg_yoyo&quot;:null,&quot;svg_color&quot;:null,&quot;premium_tabs_content&quot;:&quot;text_editor&quot;,&quot;container_id&quot;:null,&quot;live_temp_content&quot;:null,&quot;custom_tab_navigation&quot;:&quot;&quot;,&quot;path_width&quot;:null},{&quot;premium_tabs_title&quot;:&quot;Business continuity&quot;,&quot;_id&quot;:&quot;e72398f&quot;,&quot;lottie_url&quot;:null,&quot;premium_tabs_content_temp&quot;:null,&quot;image_upload&quot;:null,&quot;premium_tabs_content_text&quot;:&quot;&lt;p&gt;NIS-2 requires organizations to ensure business continuity in the event of a major cyberattack. This should include measures beyond full backups to emergency procedures and the establishment of an incident response team to minimize potential damage.&lt;\\\/p&gt;&quot;,&quot;index&quot;:2,&quot;premium_tabs_icon_switcher&quot;:&quot;&quot;,&quot;icon_type&quot;:null,&quot;premium_tabs_icon_updated&quot;:null,&quot;custom_svg&quot;:null,&quot;draw_svg&quot;:null,&quot;svg_sync&quot;:null,&quot;frames&quot;:null,&quot;lottie_loop&quot;:null,&quot;lottie_reverse&quot;:null,&quot;start_point&quot;:null,&quot;end_point&quot;:null,&quot;svg_hover&quot;:null,&quot;svg_yoyo&quot;:null,&quot;svg_color&quot;:null,&quot;premium_tabs_content&quot;:&quot;text_editor&quot;,&quot;container_id&quot;:null,&quot;live_temp_content&quot;:null,&quot;custom_tab_navigation&quot;:&quot;&quot;,&quot;path_width&quot;:null},{&quot;premium_tabs_title&quot;:&quot;Reporting&quot;,&quot;_id&quot;:&quot;9149f36&quot;,&quot;lottie_url&quot;:null,&quot;premium_tabs_content_temp&quot;:null,&quot;image_upload&quot;:null,&quot;premium_tabs_content_text&quot;:&quot;&lt;p&gt;&lt;span class=\\&quot;TextRun SCXW36069878 BCX8\\&quot; lang=\\&quot;DE-DE\\&quot; xml:lang=\\&quot;DE-DE\\&quot; data-contrast=\\&quot;none\\&quot;&gt;&lt;span class=\\&quot;NormalTextRun SCXW36069878 BCX8\\&quot;&gt;In the event of a cyberattack, companies in critical and very critical sectors must have cybersecurity incident reporting procedures in place. Among other things, the NIS-2 directive requires cyber incidents to be reported within 24 hours.&lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/p&gt;&quot;,&quot;index&quot;:3,&quot;premium_tabs_icon_switcher&quot;:&quot;&quot;,&quot;icon_type&quot;:null,&quot;premium_tabs_icon_updated&quot;:null,&quot;custom_svg&quot;:null,&quot;draw_svg&quot;:null,&quot;svg_sync&quot;:null,&quot;frames&quot;:null,&quot;lottie_loop&quot;:null,&quot;lottie_reverse&quot;:null,&quot;start_point&quot;:null,&quot;end_point&quot;:null,&quot;svg_hover&quot;:null,&quot;svg_yoyo&quot;:null,&quot;svg_color&quot;:null,&quot;premium_tabs_content&quot;:&quot;text_editor&quot;,&quot;container_id&quot;:null,&quot;live_temp_content&quot;:null,&quot;custom_tab_navigation&quot;:&quot;&quot;,&quot;path_width&quot;:null}],&quot;premium_tab_style_selected&quot;:&quot;style3&quot;,&quot;premium_tab_active_background_color&quot;:&quot;#E91E63&quot;,&quot;accordion_tabs&quot;:&quot;true&quot;,&quot;accordion_tabs_devices&quot;:[&quot;mobile&quot;],&quot;premium_tab_background_color&quot;:&quot;#FFFFFF00&quot;,&quot;default_tab_index&quot;:0,&quot;premium_tab_type&quot;:&quot;horizontal&quot;,&quot;accordion_animation&quot;:&quot;yes&quot;,&quot;accordion_tabs_anim_duration&quot;:&quot;fast&quot;}\" data-widget_type=\"premium-addon-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t&#13;\n\t\t\t<div data-navigation='[\"\",\"\",\"\",\"\"]' id=\"premium-tabs-07ee75f\" class=\"premium-tabs premium-tabs-style-flip premium-tabs-horizontal\">&#13;\n\t\t\t\t<div class=\"premium-tabs-nav horizontal\">&#13;\n\t\t\t\t\t<ul class=\"premium-tabs-nav-list premium-tabs-horizontal\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-9047a91\" data-list-index=\"0\" data-content-id=\"#premium-accordion-content-0\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-0-07ee75f\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tRisk Management\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-0\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-0-07ee75f\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW239384855 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW239384855 BCX8\">NIS2 requires companies to regularly evaluate their IT landscape to identify security vulnerabilities and implement appropriate measures to protect and prevent potential cyberattacks. These measures include: Risk management, supply chain security, improved network security, better access control and encryption.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-a54cc22\" data-list-index=\"1\" data-content-id=\"#premium-accordion-content-1\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-1-07ee75f\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tIncident management\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-1\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-1-07ee75f\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW182028236 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW182028236 BCX8\">NIS2 requires that executives take responsibility for overseeing their organization&#x2019;s cybersecurity measures and familiarize themselves with NIS 2 guidelines. If the requirements are violated, severe sanctions may be imposed on managers.<\/span><span class=\"NormalTextRun SCXW182028236 BCX8\"> <\/span><span class=\"NormalTextRun SCXW182028236 BCX8\"> <\/span><\/span><span class=\"EOP SCXW182028236 BCX8\" data-ccp-props=\"{\"> <\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-e72398f\" data-list-index=\"2\" data-content-id=\"#premium-accordion-content-2\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-2-07ee75f\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tBusiness continuity\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-2\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-2-07ee75f\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>NIS-2 requires organizations to ensure business continuity in the event of a major cyberattack. This should include measures beyond full backups to emergency procedures and the establishment of an incident response team to minimize potential damage.<\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-tabs-nav-list-item elementor-repeater-item-9149f36\" data-list-index=\"3\" data-content-id=\"#premium-accordion-content-3\">&#13;\n\t\t\t\t\t\t\t\t<a class=\"premium-tab-link premium-con-lq__\" href=\"#section-flip-3-07ee75f\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-tab-title\">&#13;\n\t\t\t\t\t\t\t\t\t\t\tReporting\t\t\t\t\t\t\t\t\t\t<\/span>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>&#13;\n&#13;\n\t\t\t\t\t\t\t\t&#13;\n\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li class=\"premium-accordion-tab-content\" id=\"premium-accordion-content-3\">&#13;\n\t\t\t\t\t\t\t\t\t\t<section id=\"section-flip-3-07ee75f\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW36069878 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW36069878 BCX8\">In the event of a cyberattack, companies in critical and very critical sectors must have cybersecurity incident reporting procedures in place. Among other things, the NIS-2 directive requires cyber incidents to be reported within 24 hours.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t\t\t\t\t<\/section>&#13;\n\t\t\t\t\t\t\t\t\t<\/li>&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>&#13;\n\t\t\t\t<\/div>&#13;\n&#13;\n\t\t\t\t<div class=\"premium-content-wrap premium-tabs-horizontal\">&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-0-07ee75f\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW239384855 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW239384855 BCX8\">NIS2 requires companies to regularly evaluate their IT landscape to identify security vulnerabilities and implement appropriate measures to protect and prevent potential cyberattacks. These measures include: Risk management, supply chain security, improved network security, better access control and encryption.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-1-07ee75f\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW182028236 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW182028236 BCX8\">NIS2 requires that executives take responsibility for overseeing their organization&#x2019;s cybersecurity measures and familiarize themselves with NIS 2 guidelines. If the requirements are violated, severe sanctions may be imposed on managers.<\/span><span class=\"NormalTextRun SCXW182028236 BCX8\"> <\/span><span class=\"NormalTextRun SCXW182028236 BCX8\"> <\/span><\/span><span class=\"EOP SCXW182028236 BCX8\" data-ccp-props=\"{\"> <\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-2-07ee75f\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>NIS-2 requires organizations to ensure business continuity in the event of a major cyberattack. This should include measures beyond full backups to emergency procedures and the establishment of an incident response team to minimize potential damage.<\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t&#13;\n\t\t\t\t\t\t<section id=\"section-flip-3-07ee75f\" class=\"premium-tabs-content-section\">&#13;\n\t\t\t\t\t\t\t<div class=\"premium-tab-content premium-con-lq__none\">&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW36069878 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW36069878 BCX8\">In the event of a cyberattack, companies in critical and very critical sectors must have cybersecurity incident reporting procedures in place. Among other things, the NIS-2 directive requires cyber incidents to be reported within 24 hours.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t\t<\/section>&#13;\n&#13;\n\t\t\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t<\/div>&#13;\n&#13;\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4cc7d4c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4cc7d4c\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c8557b\" data-id=\"6c8557b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1f378a7 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f378a7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a1e553a\" data-id=\"a1e553a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51f9d82 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"51f9d82\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tImplementation of the NIS2 directive\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45cb05e premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"45cb05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Meeting security targets <\/span><span class=\"premium-dual-header-second-header \">with Enginsight<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-940f690 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"940f690\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f13df4d elementor-widget elementor-widget-menu-anchor\" data-id=\"f13df4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Umsetzen-mit-Enginsight\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b07bd9 elementor-widget elementor-widget-text-editor\" data-id=\"1b07bd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">The NIS-2 Directive is a new EU-wide constitution on the new network and information security directives that must be implemented by all affected companies by October 17, 2024. The new directive significantly increases the number of companies affected. Affected companies must check their IT security measures and adapt them to the new standard if necessary. <\/span><span data-ccp-props=\"{\"> <\/span><\/p>\n<p><span data-contrast=\"none\">Whether or not a company is affected must be assessed and evaluated by the company itself on the basis of the new NIS2 criteria. <\/span><\/p>\n<p><span data-contrast=\"none\">However, the NIS2 directive does not specify concrete technical measures. It points to industry standards such as B3S. There is generally a lot of overlap with ISO\/IEC 27001. <\/span><\/p>\n<p><strong>However, basic security objectives can be derived from the NIS2 directive. Enginsight and partners support you in the implementation and continuous compliance with these goals from the NIS2 requirements. <\/strong><\/p>\n<p><strong> <\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c715f93 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c715f93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8a184b0\" data-id=\"8a184b0\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-162342a elementor-widget elementor-widget-heading\" data-id=\"162342a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Risk analysis and security for information systems<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cec8191 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"cec8191\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement procedures for regular risk analysis and vulnerability assessment<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Asset Discovery, Description und Software inventory<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identify existing vulnerabilities and security gaps<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regular penetration testing of own infrastructure and security measures taken so far<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89f2044 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"89f2044\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement ISMS according to ISO 27001, TISAX, etc.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b5891ff\" data-id=\"b5891ff\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dea9038 elementor-widget elementor-widget-heading\" data-id=\"dea9038\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Managing security incidents<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a22dd99 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a22dd99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement end-to-end anomaly and attack detection. Log all events and derive automatic responses.**<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detect attacks, malicious, erroneous, or other activities on the network that could impact critical services at an early stage<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ensure rapid response to cyber incidents (enable incident response)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Best possible defense against malware and attackers at network boundaries<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a5b904 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5a5b904\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Managed Detection and Response Services<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-afebf27 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"afebf27\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-bc1aee8\" data-id=\"bc1aee8\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13558de elementor-widget elementor-widget-heading\" data-id=\"13558de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Maintenance and recovery, backup management, crisis management<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cccae4 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8cccae4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Avoid disruption of processes through safety measures<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ce0338 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5ce0338\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Create business continuity plan<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Establish multi-level backup management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enable fast disaster recovery<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Set up professional crisis management and communication<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6134303 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6134303\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a9da9b5\" data-id=\"a9da9b5\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0e858fb elementor-widget elementor-widget-heading\" data-id=\"0e858fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Security of supply chain, \nSecurity between facilities, service provider security<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79af31b elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"79af31b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitor and evaluate the technical communication of the interfaces and establish automated measures if necessary.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55ccd24 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"55ccd24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Establish least privilege access for suppliers<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ensure secure supplier access to the network (e.g. secure passwords, VPN)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-95db448\" data-id=\"95db448\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e22b01f elementor-widget elementor-widget-heading\" data-id=\"e22b01f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Security in development, procurement and maintenance, vulnerability management<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f5f045 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5f5f045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regular penetration testing of own software and infrastructure<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Permanent monitoring of vulnerabilities<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-565917d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"565917d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ensure effective and safe treatment and of vulnerabilities<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8e9e1dd elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8e9e1dd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d35007b\" data-id=\"d35007b\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f8f7faf elementor-widget elementor-widget-heading\" data-id=\"f8f7faf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Assessing the effectiveness of cybersecurity and risk management.<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c06e07d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c06e07d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Continuously review and improve the effectiveness of the cybersecurity system using automated pentests<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-532832d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"532832d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reassess cybersecurity posture and risk exposure on a regular basis<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-85899e6 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"85899e6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-dfe50b8\" data-id=\"dfe50b8\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1184550 elementor-widget elementor-widget-heading\" data-id=\"1184550\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Cyber security and hygiene training<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc665b1 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"cc665b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Build defense-in-depth architecture to detect perimeter security failures early and monitor internal network communications extensively<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitor and shield vulnerable assets where patches\/updates are not possible<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Contain the spread of attacks (e.g., through network segmentation)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Keep digital resources up to date in terms of firmware, operating system, etc.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c7b12e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6c7b12e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Set and implement strong password policies<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement regular cybersecurity training for staff.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b7a6703\" data-id=\"b7a6703\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1bd57d9 elementor-widget elementor-widget-heading\" data-id=\"1bd57d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Cryptography and encryption \n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15f4cb7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"15f4cb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitoring and verification of encrypted connections according to the current state of the art. Adjustment TLS according to TR-03116-4 Checklist of the BSI<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9d96d8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c9d96d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Establishing and ensuring end-to-end encrypted communication on the internal network<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8cfaf65 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8cfaf65\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b15ccc7\" data-id=\"b15ccc7\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4864491 elementor-widget elementor-widget-heading\" data-id=\"4864491\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Personnel security, access control and asset management\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a83abea elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a83abea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitor access to critical files and directories enterprise-wide. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6cbf84 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c6cbf84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Integrate security screening and awareness into the hiring and contracting process<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prevent unauthorized physical access to assets<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-732127c elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"732127c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a8662e4\" data-id=\"a8662e4\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f65deb elementor-widget elementor-widget-heading\" data-id=\"8f65deb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Secure communication \n(Voice, video and text)<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70628aa elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"70628aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitoring of all communication systems and encrypted connections<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-464fbf7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"464fbf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Submit early warning to CSIRT*** within 24 hours of an incident.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Submit initial assessment to CSIRT within 72 hours (include statements of severity, impact, source)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Provide incident management status updates as requested by the CSIRT.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Submit detailed report to CSIRT within one month (incl. information on severity, internal and transboundary impacts, root cause, remedial actions)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a7ca9f9\" data-id=\"a7ca9f9\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06a248c elementor-widget elementor-widget-heading\" data-id=\"06a248c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Multi-factor authentication and continuous authentication<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0429c54 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0429c54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prevent unauthorized access to digital assets. Monitoring of all logins and login attempts<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a3f993 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9a3f993\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ensure personalized multi-factor authentication<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ensure secure digital communication<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d95c9e elementor-widget elementor-widget-text-editor\" data-id=\"9d95c9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LEGEND:<br>Green checkmarks = direct implementation by Enginsight \/ gray checkmarks = solution available via Enginsight Trusted Partner.<\/p>\n<p>* The listed objectives are not explicitly defined in NIS2, but reflect general basic safety objectives as recommended in international standards such as IEC 62443.<br>** Mandatory for critical infrastructure<br>*** CSIRT (Computer security incident response team) = government computer emergency response team.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29dfd94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29dfd94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0106f0a\" data-id=\"0106f0a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b7fd36 elementor-widget elementor-widget-menu-anchor\" data-id=\"1b7fd36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"download\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f1e01d premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"0f1e01d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"_animation_mobile\":\"none\"}' data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tEnginsight-Matrix for NIS2\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5389520 elementor-widget elementor-widget-hubspot-form\" data-id=\"5389520\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hubspot-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 143253842,\n\t\t\t\t\t\t\t\t\tformId: \"dbbc139c-6d17-489d-a72f-d38875b7ddd1\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1776443623000-4024811966\",\n\t\t\t\t\t\t\t\t\tregion: \"eu1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1776443623000-4024811966\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-08ad723\" data-id=\"08ad723\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e883e60 elementor-widget elementor-widget-image\" data-id=\"e883e60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"694\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/nis2_enginsight_matrix-poster.jpg\" class=\"attachment-large size-large wp-image-24893\" alt=\"NIS2 Compliance mit Enginsight und Partnern, Plakat\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/nis2_enginsight_matrix-poster.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/nis2_enginsight_matrix-poster-300x260.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/nis2_enginsight_matrix-poster-768x666.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e105197 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e105197\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5c84f9c\" data-id=\"5c84f9c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-624ba08 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"624ba08\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bea5cdd\" data-id=\"bea5cdd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1ac927 premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"e1ac927\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_mobile&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<div class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tCreate transparency\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72408e5 premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"72408e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Status quo <\/span><span class=\"premium-dual-header-second-header \">How well are you positioned so far?<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b6f199 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5b6f199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c4c80c elementor-widget elementor-widget-text-editor\" data-id=\"4c4c80c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW251983300 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW251983300 BCX8\">Your company is located in Germany or another European country and is NIS2-regulated, but you are not sure if your security measures fit the requirements of the directive? Then start now with an NIS2 requirements analysis of your IT infrastructure. Once you have identified the discrepancies between the status quo and the target state, you can implement (or have implemented) suitable security measures in a prioritized manner and relax when the need arises as a result of the amendment to the law.<\/span><\/span><span class=\"EOP SCXW251983300 BCX8\" data-ccp-props=\"{\"201341983\":0,\"335559739\":160,\"335559740\":259}\"> <\/span><\/p>\n<p>By the way: IT inventorying is done in Enginsight at the push of a button. <a href=\"https:\/\/enginsight.com\/en\/demo\/\"><b>We are happy to provide the proof. Contact us.<\/b><\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b9a93b5\" data-id=\"b9a93b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0917619 elementor-widget elementor-widget-image\" data-id=\"0917619\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"838\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Mario-Jandeck-CEO-Enginsight-1.png\" class=\"attachment-large size-large wp-image-24860\" alt=\"Mario Jandeck, CEO\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Mario-Jandeck-CEO-Enginsight-1.png 600w, https:\/\/enginsight.com\/wp-content\/uploads\/Mario-Jandeck-CEO-Enginsight-1-215x300.png 215w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ead04d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ead04d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fc5eb9a\" data-id=\"fc5eb9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-edb2bed premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"edb2bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_mobile&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style2\">\n\t\t\t<h2 class=\"premium-title-header premium-title-style2\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tFAQ about the NIS2 requirements\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h2>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a61ad56 elementor-widget elementor-widget-toggle\" data-id=\"a61ad56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1741\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1741\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What does NIS2 mean?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1741\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1741\"><p>NIS-2 stands for &#8220;Network Information Security&#8221; and is a law that relates to the security of information networks. It builds on the original NIS framework and aims to strengthen cybersecurity through complementary security measures in Europe. The new requirement imposes mandatory security measures and reporting obligations on companies and organizations that were not previously affected (regulated).<\/p>\n<p>In Germany, a draft bill for the new NIS2 Act is already available (NIS2UmsuCG).<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1742\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1742\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">From when does NIS2 apply? <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1742\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1742\"><p>In the European Union, the new NIS2 Directive (EU 2022\/2555) was promulgated in early 2023. All member states are now required to make NIS2 a mandatory minimum standard through national legislation. In Germany, the implementation of the directive is expected to come into force in October 2024. <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1743\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1743\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Who is affected by NIS2?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1743\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1743\"><p>All companies and institutions that are considered critical infrastructure sectors fall under the new NIS2 directive if they have at least 50 employees or at least EUR 10 million in annual revenue and annual balance sheet. Some important ones fall under regulation regardless of their size (e.g., CRITIS). A brief overview of all sectors and requirements can be found in our <a href=\"#download\">PDF download on NIS2<\/a>.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1744\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1744\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What are the fines for violations of NIS2?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1744\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1744\"><p>Depending on the classification (significant\/important, large\/medium\/small), the amount of the fine differs. The maximum amount is \u20ac10 million or 2% of global sales. <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1745\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1745\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Who oversees compliance with NIS2 requirements?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1745\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1745\"><p>Essential facilities are proactively, regularly audited by authorities. For important setups, a reactive check takes place, i.e. only when there are indications of violations.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1746\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1746\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Who is responsible for compliance with NIS2?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1746\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1746\"><p>With NIS 2 comes liability for management and the board of directors. They must monitor the implementation of the measures and participate in training.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What does NIS2 mean?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>NIS-2 stands for &#8220;Network Information Security&#8221; and is a law that relates to the security of information networks. It builds on the original NIS framework and aims to strengthen cybersecurity through complementary security measures in Europe. The new requirement imposes mandatory security measures and reporting obligations on companies and organizations that were not previously affected (regulated).<\\\/p>\\n<p>In Germany, a draft bill for the new NIS2 Act is already available (NIS2UmsuCG).<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"From when does NIS2 apply?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>In the European Union, the new NIS2 Directive (EU 2022\\\/2555) was promulgated in early 2023. All member states are now required to make NIS2 a mandatory minimum standard through national legislation. In Germany, the implementation of the directive is expected to come into force in October 2024. <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Who is affected by NIS2?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>All companies and institutions that are considered critical infrastructure sectors fall under the new NIS2 directive if they have at least 50 employees or at least EUR 10 million in annual revenue and annual balance sheet. Some important ones fall under regulation regardless of their size (e.g., CRITIS). A brief overview of all sectors and requirements can be found in our <a href=\\\"#download\\\">PDF download on NIS2<\\\/a>.<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"What are the fines for violations of NIS2?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Depending on the classification (significant\\\/important, large\\\/medium\\\/small), the amount of the fine differs. The maximum amount is \\u20ac10 million or 2% of global sales. <\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Who oversees compliance with NIS2 requirements?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Essential facilities are proactively, regularly audited by authorities. For important setups, a reactive check takes place, i.e. only when there are indications of violations.<\\\/p>\\n\"}},{\"@type\":\"Question\",\"name\":\"Who is responsible for compliance with NIS2?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>With NIS 2 comes liability for management and the board of directors. They must monitor the implementation of the measures and participate in training.<\\\/p>\\n\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/section><\/div>\n\t\t\n\t\t\t\t\n\t\t","protected":false},"excerpt":{"rendered":"<p>Risk Management Measures for IT Security NIS2 Directive Compliance for Cybersecurity in the EU The overall requirements of cybersecurity criteria and the number of affected companies have increased significantly with NIS2. Companies are required to implement the new security measures by October 2024. If you want to implement the requirements of the NIS2 Directive easily [&#x2026;]<\/p>\n","protected":false},"author":30,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-25597","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/25597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/comments?post=25597"}],"version-history":[{"count":0,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/25597\/revisions"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/media?parent=25597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}