{"id":3868,"date":"2024-08-04T08:05:17","date_gmt":"2024-08-04T08:05:17","guid":{"rendered":"https:\/\/fuentis.com\/?p=3868"},"modified":"2025-04-15T21:19:57","modified_gmt":"2025-04-15T21:19:57","slug":"nis2-richtlinie","status":"publish","type":"post","link":"https:\/\/fuentis.com\/en\/nis2-richtlinie\/","title":{"rendered":"NIS2 Directive"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3868\" class=\"elementor elementor-3868\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-756b7365 e-flex e-con-boxed e-con e-parent\" data-id=\"756b7365\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-364b5ab elementor-widget elementor-widget-image\" data-id=\"364b5ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"6129\" data-permalink=\"https:\/\/fuentis.com\/en\/nis2-richtlinie\/nis-2-logo\/\" data-orig-file=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&amp;ssl=1\" data-orig-size=\"855,666\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NIS-2-LOGO\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&amp;ssl=1\" width=\"855\" height=\"666\" src=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&amp;ssl=1\" class=\"attachment-large size-large wp-image-6129\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?w=855&amp;ssl=1 855w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=300%2C234&amp;ssl=1 300w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=768%2C598&amp;ssl=1 768w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=15%2C12&amp;ssl=1 15w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=24%2C19&amp;ssl=1 24w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=36%2C28&amp;ssl=1 36w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=48%2C37&amp;ssl=1 48w\" sizes=\"(max-width: 855px) 100vw, 855px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b99e6b elementor-widget elementor-widget-heading\" data-id=\"6b99e6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NIS2 Directive: Everything companies need to know now<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-800999e e-con-full e-flex e-con e-child\" data-id=\"800999e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95d5a8b elementor-widget elementor-widget-text-editor\" data-id=\"95d5a8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Key findings:<\/strong><\/p><ul><li><b>Extended cyber security requirements:<\/b> Around 30,000 German companies must implement the strict requirements of the NIS2 directive.<\/li><li><b>Stricter penalties and liability:<\/b> Introduction of higher penalties for offences and private liability for managing directors.<\/li><li><b><a href=\"https:\/\/fuentis.com\/en\/fuentis-isms\/\">ISMS according to ISO 27001<\/a>:<\/b> Implementation of the NIS2 directive can be effectively managed with an information security management system (ISMS) in accordance with ISO 27001.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1255b34 elementor-widget elementor-widget-text-editor\" data-id=\"1255b34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is becoming increasingly important in today\u2019s digital world. In light of the growing threats from cyberattacks and other cyber incidents, the European Union (EU) has intensified its efforts to strengthen the protection of network and information systems. A significant step in this direction is the introduction of the revised NIS2 Directive, which will come into effect on October 18, 2024. This directive replaces the previous NIS1 Directive and brings more comprehensive and stricter requirements for companies.<\/p><p>In Germany, around 30,000 companies will be affected by the new regulations and must adapt their cybersecurity measures accordingly. The NIS2 Directive not only introduces higher penalties for violations but also includes personal liability for executives, underscoring the urgency of compliance.<\/p><p>This article provides a comprehensive overview of the NIS2 Directive, explaining the specific requirements and detailing how companies can implement them. It also covers the potential costs and necessary timeframe to ensure timely and effective preparation. The aim is to best prepare companies in Germany and the EU for the upcoming changes and to help them optimize their cybersecurity strategies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c495f69 elementor-widget elementor-widget-heading\" data-id=\"c495f69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Overview of the NIS2 directive\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26d4e14 elementor-widget elementor-widget-text-editor\" data-id=\"26d4e14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive is a revised and expanded version of the original NIS1 Directive, which was introduced by the EU in 2016. This first cybersecurity directive was a response to the growing threats and rising demands on IT security in Europe, with the aim of ensuring a high level of common security for network and information systems across the EU.<\/p><p>With the NIS2 Directive, the EU is taking it a step further. It focuses on harmonizing cybersecurity standards and strengthens risk management and incident reporting obligations. The directive sets out comprehensive requirements for businesses and authorities to ensure that risks are systematically assessed and appropriate security measures are in place.<\/p><p>A key objective of the NIS2 Directive is to enhance the EU\u2019s cyber resilience. This includes not only the protection of critical infrastructures such as energy supply, healthcare, and transportation but also securing digital services and ensuring compliance among a broader range of companies. The new directive also introduces stricter penalties for non-compliance, increasing the enforceability of the measures.<\/p><p>The NIS2 Directive was officially signed on December 14, 2022, and came into force on December 27, 2022. EU member states, including Germany, now have until October 18, 2024, to implement these new regulations into national law. This means that companies need to start preparing and implementing the necessary measures now to meet the new requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68f781e elementor-widget elementor-widget-heading\" data-id=\"68f781e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Scope of the NIS2 Directive<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46cf289 elementor-widget elementor-widget-text-editor\" data-id=\"46cf289\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive significantly expands its scope compared to the previous NIS1. While NIS1 primarily applied to operators of critical infrastructures (CRITIS), NIS2 extends the requirements to a broader range of companies and sectors. This means that not only energy providers, healthcare services, and transportation companies are affected, but also digital marketplaces, the food industry, and many more.<\/p><p>NIS2 also introduces a new classification of companies, distinguishing between \u201cEssential\u201d and \u201cImportant\u201d entities. This differentiation is crucial, as it determines which specific security requirements and reporting obligations apply to a company. Additionally, companies operating in multiple EU member states must register with the relevant authorities in each country and comply with respective regulations.<\/p><p>Furthermore, NIS2 expands the definition of affected sectors. There are now eleven \u201cEssential\u201d and seven \u201cImportant\u201d sectors. If a company meets the size criteria and operates in one of these sectors, it falls under NIS2. Newly included sectors now cover areas such as wastewater management, public administration, and the space economy. Additionally, postal and courier services, waste management, the chemical industry, and food production and processing are now classified as \u201cImportant\u201d entities.<\/p><p>Lastly, the introduction of the \u201csize-cap\u201d rule is significant. This rule states that companies of at least medium size operating in the defined sectors are subject to NIS2 requirements. As a result, the number of affected companies has increased substantially. Consequently, many businesses previously unaffected by NIS1 must now prepare for NIS2 compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f9d615 elementor-widget elementor-widget-heading\" data-id=\"9f9d615\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Requirements of the NIS2 directive<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61319ad elementor-widget elementor-widget-text-editor\" data-id=\"61319ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive imposes extensive requirements on affected companies to strengthen cybersecurity within the EU. First, companies must implement a comprehensive cybersecurity risk management system. This involves systematically assessing risks and implementing measures to minimize them, including regular risk analyses, the development and implementation of security concepts, and ensuring security within supply chains.<\/p><p>Second, the NIS2 Directive mandates the establishment of technical and organizational measures (TOM) in line with the current state of technology. These measures must consider recent technological advancements and aim to ensure the security of digital infrastructures and services. Examples of TOM include firewalls, encryption technologies, regular security updates, and employee training in cybersecurity matters.<\/p><p>Additionally, the NIS2 Directive requires companies to establish reporting obligations and processes for security incidents. Security incidents must be reported within 24 hours of detection, with an initial assessment and possible update within 72 hours. A comprehensive report is required no later than one month after the incident\u2019s detection. These reporting obligations are intended to improve transparency and coordination in addressing cybersecurity incidents.<\/p><p>Another important aspect of the NIS2 Directive is participation in information sharing. Companies classified as \u201cessential\u201d entities must actively engage in information exchange through central platforms, such as those of the Federal Office for Information Security (BSI). This ensures effective communication and cooperation during security incidents.<\/p><p>Finally, companies must comply with the security requirements of the NIS2 Directive. These requirements encompass not only technical measures but also organizational and procedural aspects. For instance, companies must ensure they have the appropriate structures and processes in place to respond to security incidents, including establishing emergency plans and regularly conducting security exercises.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e75d39f elementor-widget elementor-widget-heading\" data-id=\"e75d39f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Implementation of the NIS2 directive<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d52994b elementor-widget elementor-widget-text-editor\" data-id=\"d52994b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementing the NIS2 Directive requires significant effort and resources from affected companies. The most effective way to meet NIS2\u2019s strict requirements is by implementing a comprehensive Information Security Management System (ISMS) according to the international ISO 27001 standard. An ISMS provides a structured and systematic approach to managing and securing sensitive company information and helps to efficiently fulfill NIS2 requirements.<\/p><p>First, companies need to conduct an assessment of their current security measures and compare them with NIS2 requirements. This gap analysis identifies areas where improvements are needed. The identified gaps must then be addressed through the implementation of new security measures and processes. This includes both technical measures, such as deploying modern security technologies, and organizational measures, like employee training and establishing clear responsibilities.<\/p><p>Additionally, it is crucial for companies to set a clear timeline for implementing the NIS2 Directive. Experience shows that establishing an ISMS can take between six and 18 months, depending on the size and complexity of the company. Therefore, companies should begin planning and implementing early to meet the October 18, 2024 deadline.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbafc21 elementor-widget elementor-widget-heading\" data-id=\"fbafc21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Financial planning and regular audits<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfb1519 elementor-widget elementor-widget-text-editor\" data-id=\"dfb1519\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Another important aspect of implementation is cost planning. Implementing an ISMS and meeting the NIS2 requirements can require significant financial resources. According to estimates from the Federal Statistical Office, the one-time costs for introducing the NIS2 Directive in Germany amount to approximately \u20ac1.37 billion, with ongoing annual costs estimated at \u20ac1.65 billion. Companies need to incorporate these costs into their budget planning and, if necessary, consider external consultants or service providers to efficiently meet the requirements.<\/p><p>Finally, companies should conduct regular reviews and audits to ensure that the implemented measures comply with NIS2 requirements and are continuously improved. This includes internal audits conducted by the company itself, as well as external audits by independent bodies to verify the effectiveness of the ISMS and to obtain ISO 27001 certification.<\/p><p>Through careful planning and implementation of the NIS2 Directive, companies can not only fulfill legal requirements but also significantly enhance their cybersecurity, thereby strengthening their resilience against cyberattacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52bc785 e-con-full e-flex e-con e-child\" data-id=\"52bc785\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a4c540 elementor-widget elementor-widget-heading\" data-id=\"6a4c540\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">You can find out more on our social media profiles:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ab05e3 elementor-shape-rounded elementor-grid-0 e-grid-align-center elementor-widget elementor-widget-social-icons\" data-id=\"9ab05e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-4c839fa\" href=\"https:\/\/www.linkedin.com\/company\/fuentis\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-6ef8579\" href=\"https:\/\/www.youtube.com\/@fuentisAG\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Youtube<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-youtube\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M549.655 124.083c-6.281-23.65-24.787-42.276-48.284-48.597C458.781 64 288 64 288 64S117.22 64 74.629 75.486c-23.497 6.322-42.003 24.947-48.284 48.597-11.412 42.867-11.412 132.305-11.412 132.305s0 89.438 11.412 132.305c6.281 23.65 24.787 41.5 48.284 47.821C117.22 448 288 448 288 448s170.78 0 213.371-11.486c23.497-6.321 42.003-24.171 48.284-47.821 11.412-42.867 11.412-132.305 11.412-132.305s0-89.438-11.412-132.305zm-317.51 213.508V175.185l142.739 81.205-142.739 81.201z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook elementor-repeater-item-61370a6\" href=\"https:\/\/www.facebook.com\/fuentisAG\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-facebook\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-instagram elementor-repeater-item-b564b41\" href=\"https:\/\/www.instagram.com\/fuentisag\/#\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Instagram<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-instagram\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-threads elementor-repeater-item-1821122\" href=\"https:\/\/www.threads.net\/@fuentisag\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Threads<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-threads\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M331.5 235.7c2.2 .9 4.2 1.9 6.3 2.8c29.2 14.1 50.6 35.2 61.8 61.4c15.7 36.5 17.2 95.8-30.3 143.2c-36.2 36.2-80.3 52.5-142.6 53h-.3c-70.2-.5-124.1-24.1-160.4-70.2c-32.3-41-48.9-98.1-49.5-169.6V256v-.2C17 184.3 33.6 127.2 65.9 86.2C102.2 40.1 156.2 16.5 226.4 16h.3c70.3 .5 124.9 24 162.3 69.9c18.4 22.7 32 50 40.6 81.7l-40.4 10.8c-7.1-25.8-17.8-47.8-32.2-65.4c-29.2-35.8-73-54.2-130.5-54.6c-57 .5-100.1 18.8-128.2 54.4C72.1 146.1 58.5 194.3 58 256c.5 61.7 14.1 109.9 40.3 143.3c28 35.6 71.2 53.9 128.2 54.4c51.4-.4 85.4-12.6 113.7-40.9c32.3-32.2 31.7-71.8 21.4-95.9c-6.1-14.2-17.1-26-31.9-34.9c-3.7 26.9-11.8 48.3-24.7 64.8c-17.1 21.8-41.4 33.6-72.7 35.3c-23.6 1.3-46.3-4.4-63.9-16c-20.8-13.8-33-34.8-34.3-59.3c-2.5-48.3 35.7-83 95.2-86.4c21.1-1.2 40.9-.3 59.2 2.8c-2.4-14.8-7.3-26.6-14.6-35.2c-10-11.7-25.6-17.7-46.2-17.8H227c-16.6 0-39 4.6-53.3 26.3l-34.4-23.6c19.2-29.1 50.3-45.1 87.8-45.1h.8c62.6 .4 99.9 39.5 103.7 107.7l-.2 .2zm-156 68.8c1.3 25.1 28.4 36.8 54.6 35.3c25.6-1.4 54.6-11.4 59.5-73.2c-13.2-2.9-27.8-4.4-43.4-4.4c-4.8 0-9.6 .1-14.4 .4c-42.9 2.4-57.2 23.2-56.2 41.8l-.1 .1z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-x-twitter elementor-repeater-item-a19b592\" href=\"https:\/\/x.com\/fuentisAG\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">X-twitter<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-x-twitter\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a0d192 elementor-widget elementor-widget-heading\" data-id=\"5a0d192\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Strafen und Haftung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-012f53e elementor-widget elementor-widget-text-editor\" data-id=\"012f53e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive introduces a significant tightening of penalties and liability regulations to ensure the enforcement of cybersecurity measures. This aims to encourage companies and authorities to take the new regulations seriously and implement them consistently.<\/p><p>Firstly, the NIS2 Directive imposes much higher fines than its predecessor. For essential entities, fines can reach up to \u20ac10 million or 2% of global annual turnover, whichever is higher. For important entities, fines can be as high as \u20ac7 million or 1.4% of global annual turnover. These severe penalties emphasize the urgency and importance of complying with cybersecurity requirements.<\/p><p>Secondly, personal liability for executives is introduced, extending responsibility to top management. In the German implementation of the NIS2, it is stipulated that executive bodies \u2013 specifically management \u2013 may be personally liable with their private assets for ensuring compliance with risk management measures. This provision ensures that executives are personally motivated to implement the necessary cybersecurity measures and avoid violations.<\/p><p>Additionally, there is no transition period, as was granted with the introduction of the General Data Protection Regulation (GDPR). Starting October 18, 2024, all affected companies must fully comply with the new requirements. This means that companies must already begin preparing to meet the NIS2 Directive to avoid legal consequences.<\/p><p>Finally, the introduction of these strict penalties and liability regulations means companies must seriously rethink and improve their cybersecurity strategies. Compliance with the NIS2 Directive should be seen as an opportunity to strengthen cybersecurity and, in doing so, gain the trust of customers and partners.<\/p><p>Through these measures, the NIS2 Directive aims to achieve greater commitment and enforcement of cybersecurity requirements. Companies must ensure they take the necessary steps to meet the new regulations, thereby avoiding potential fines and liability risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c9fd9c elementor-widget elementor-widget-heading\" data-id=\"6c9fd9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The challenges<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca4d178 elementor-widget elementor-widget-text-editor\" data-id=\"ca4d178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementing the NIS2 Directive presents both challenges and opportunities for companies. On one hand, the stringent requirements, along with the resources and costs involved, pose a significant challenge, especially for small and medium-sized enterprises (SMEs). On the other hand, the directive also offers numerous opportunities to enhance cybersecurity and strengthen competitiveness.<\/p><p>First, the extensive requirements of the NIS2 Directive represent a major challenge. Companies must invest substantial financial and human resources to meet the new standards. This includes implementing a comprehensive Information Security Management System (ISMS), conducting regular risk analyses, and applying technical and organizational measures. SMEs, in particular, may struggle to allocate the necessary funds and expertise to meet these rigorous requirements.<\/p><p>Additionally, the new reporting obligations and participation in information sharing can add administrative burdens. Companies need to establish effective processes and systems to report security incidents within the specified timeframes and participate in central exchange platforms. This demands close collaboration with the relevant authorities and continuous monitoring of the cybersecurity landscape.<\/p><p>However, the NIS2 Directive also offers numerous opportunities. Establishing an ISMS in line with ISO 27001 can help companies to systematize and improve their cybersecurity strategies. By identifying and addressing security gaps, companies can increase their resilience to cyberattacks and reduce the risk of security incidents. This not only aids in legal compliance but also strengthens the trust of customers and business partners.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56650f7 elementor-widget elementor-widget-heading\" data-id=\"56650f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Opportunities of the NIS2 Directive<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e05162 elementor-widget elementor-widget-text-editor\" data-id=\"2e05162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive also provides an opportunity to improve collaboration and information sharing between companies and authorities. By actively participating in central exchange platforms and fulfilling reporting obligations, companies can benefit from the experiences and insights of others, continuously optimizing their own security measures. This increased cooperation helps to strengthen cybersecurity across the EU and enables a united approach to combating threats.<\/p><p>Moreover, companies that successfully implement the NIS2 requirements can gain a competitive advantage. Compliance with high cybersecurity standards can serve as a quality feature to build trust with customers and business partners, setting the company apart from competitors. In an increasingly digital world, where cyberattacks are becoming more frequent, strong cybersecurity is a crucial factor for business success.<\/p><p>Overall, the NIS2 Directive presents significant challenges but also numerous opportunities to enhance cybersecurity and strengthen competitiveness. With careful planning and implementation of the required measures, companies can meet the new standards while simultaneously optimizing their security strategies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20be6a7 elementor-widget elementor-widget-heading\" data-id=\"20be6a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a34478 elementor-widget elementor-widget-text-editor\" data-id=\"2a34478\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive marks a significant step forward in the development of the EU\u2019s cybersecurity landscape. It challenges companies to significantly enhance their security measures and meet the new, stricter requirements. Although implementation involves considerable costs and resource investment, it also offers the opportunity to elevate cybersecurity to a new level.<\/p><p>By implementing an Information Security Management System (ISMS) according to ISO 27001, companies can respond systematically and effectively to the NIS2 requirements. This measure not only strengthens protection against cyberattacks but also aids in meeting legal requirements and avoiding substantial fines. The reporting obligations and participation in information sharing further promote collaboration and knowledge exchange between companies and authorities, contributing to a stronger cybersecurity posture across the EU.<\/p><p>The introduction of personal liability for executives and higher fines underscores the urgency and importance of the NIS2 Directive. Companies must therefore ensure they take the necessary steps to comply with regulations in a timely manner. This requires careful planning and early implementation to meet the new standards by the October 18, 2024 deadline.<\/p><p>In conclusion, the NIS2 Directive is not just a legal obligation but also an opportunity to optimize cybersecurity strategies and build trust with customers and business partners. Companies that proactively address the new requirements can increase their resilience to cyber threats and gain a competitive advantage. In a world where digital security is becoming increasingly crucial, compliance with the NIS2 Directive is a decisive step toward ensuring long-term success and security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8a244b elementor-widget elementor-widget-button\" data-id=\"e8a244b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Regulierte-Wirtschaft\/NIS-2-regulierte-Unternehmen\/NIS-2-Betroffenheitspruefung\/nis-2-betroffenheitspruefung_node.html\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">#nis2know - More information from the BSI<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57d8fa7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"57d8fa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fuentis.com\/en\/fuentis-suite-4\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Set up ISMS according to NIS2 here free of charge<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In a world that is increasingly reliant on digital systems, protecting networks and information systems is a top priority. One of the biggest threats to these systems is Distributed Denial of Service (DDoS) attacks. Such attacks can cause significant damage to both businesses and individuals. But don't worry, knowledge is power. In this article, we explore what DDoS attacks are, how they work, and more importantly, what strategies and tools are available to defend against these insidious cyber threats. Don't wait until it's too late, learn how to protect your network from the invisible dangers on the internet.<\/p>","protected":false},"author":249796503,"featured_media":6129,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[1],"tags":[],"class_list":["post-3868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Umsetzung der NIS2 Richtlinie<\/title>\n<meta name=\"description\" content=\"So planen Unternehmen effektiv die Umsetzung der NIS2 Richtlinie. Dieser Leitfaden bietet Einblicke in Anforderungen und Herausforderungen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fuentis.com\/en\/nis2-richtlinie\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Umsetzung der NIS2 Richtlinie\" \/>\n<meta property=\"og:description\" content=\"So planen Unternehmen effektiv die Umsetzung der NIS2 Richtlinie. Dieser Leitfaden bietet Einblicke in Anforderungen und Herausforderungen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fuentis.com\/en\/nis2-richtlinie\/\" \/>\n<meta property=\"og:site_name\" content=\"fuentis\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fuentisAG\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-04T08:05:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-15T21:19:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"855\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Srdan Manasijevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Umsetzung der NIS2 Richtlinie\" \/>\n<meta name=\"twitter:description\" content=\"So planen Unternehmen effektiv die Umsetzung der NIS2 Richtlinie. Dieser Leitfaden bietet Einblicke in Anforderungen und Herausforderungen.\" \/>\n<meta name=\"twitter:creator\" content=\"@fuentisAG\" \/>\n<meta name=\"twitter:site\" content=\"@fuentisAG\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Srdan Manasijevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/\"},\"author\":{\"name\":\"Srdan Manasijevic\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/person\\\/b8e4b7a7ae41aff4c7a9849c181a65b8\"},\"headline\":\"NIS2 Richtlinie\",\"datePublished\":\"2024-08-04T08:05:17+00:00\",\"dateModified\":\"2025-04-15T21:19:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/\"},\"wordCount\":2579,\"publisher\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/\",\"url\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/\",\"name\":\"Umsetzung der NIS2 Richtlinie\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1\",\"datePublished\":\"2024-08-04T08:05:17+00:00\",\"dateModified\":\"2025-04-15T21:19:57+00:00\",\"description\":\"So planen Unternehmen effektiv die Umsetzung der NIS2 Richtlinie. Dieser Leitfaden bietet Einblicke in Anforderungen und Herausforderungen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1\",\"width\":855,\"height\":666},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/nis2-richtlinie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fuentis.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 Richtlinie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#website\",\"url\":\"https:\\\/\\\/fuentis.com\\\/\",\"name\":\"fuentis AG | fuentis Suite\",\"description\":\"Die IT-Compliance Plattform f\u00fcr ISO 27001, BSI IT-Grundschutz und Risikomanagement.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\"},\"alternateName\":\"fuentis AG | Homepage\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fuentis.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\",\"name\":\"fuentis AG\",\"alternateName\":\"fuentis\",\"url\":\"https:\\\/\\\/fuentis.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"fuentis AG\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/fuentisAG\\\/\",\"https:\\\/\\\/x.com\\\/fuentisAG\",\"https:\\\/\\\/mastodon.social\\\/@fuentisag\",\"https:\\\/\\\/de.linkedin.com\\\/company\\\/fuentis\",\"https:\\\/\\\/www.youtube.com\\\/@fuentisAG\",\"https:\\\/\\\/www.instagram.com\\\/fuentisag\\\/\"],\"description\":\"Fuentis vereint Cybersicherheit, Informationssicherheit und Datenschutz in einem Tool. Jetzt pers\u00f6nliches Angebot anfordern!\",\"email\":\"info@fuentis.com\",\"telephone\":\"+ 49 (331) 885 9211 -0\",\"legalName\":\"fuentis AG\",\"foundingDate\":\"2016-01-01\",\"vatID\":\"DE313123288\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/person\\\/b8e4b7a7ae41aff4c7a9849c181a65b8\",\"name\":\"Srdan Manasijevic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"caption\":\"Srdan Manasijevic\"},\"url\":\"https:\\\/\\\/fuentis.com\\\/en\\\/author\\\/srdan-manasijevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Implementation of the NIS2 directive","description":"So planen Unternehmen effektiv die Umsetzung der NIS2 Richtlinie. Dieser Leitfaden bietet Einblicke in Anforderungen und Herausforderungen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fuentis.com\/en\/nis2-richtlinie\/","og_locale":"en_GB","og_type":"article","og_title":"Umsetzung der NIS2 Richtlinie","og_description":"So planen Unternehmen effektiv die Umsetzung der NIS2 Richtlinie. Dieser Leitfaden bietet Einblicke in Anforderungen und Herausforderungen.","og_url":"https:\/\/fuentis.com\/en\/nis2-richtlinie\/","og_site_name":"fuentis","article_publisher":"https:\/\/www.facebook.com\/fuentisAG\/","article_published_time":"2024-08-04T08:05:17+00:00","article_modified_time":"2025-04-15T21:19:57+00:00","og_image":[{"width":855,"height":666,"url":"https:\/\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg","type":"image\/jpeg"}],"author":"Srdan Manasijevic","twitter_card":"summary_large_image","twitter_title":"Umsetzung der NIS2 Richtlinie","twitter_description":"So planen Unternehmen effektiv die Umsetzung der NIS2 Richtlinie. Dieser Leitfaden bietet Einblicke in Anforderungen und Herausforderungen.","twitter_creator":"@fuentisAG","twitter_site":"@fuentisAG","twitter_misc":{"Written by":"Srdan Manasijevic","Estimated reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fuentis.com\/nis2-richtlinie\/#article","isPartOf":{"@id":"https:\/\/fuentis.com\/nis2-richtlinie\/"},"author":{"name":"Srdan Manasijevic","@id":"https:\/\/fuentis.com\/#\/schema\/person\/b8e4b7a7ae41aff4c7a9849c181a65b8"},"headline":"NIS2 Richtlinie","datePublished":"2024-08-04T08:05:17+00:00","dateModified":"2025-04-15T21:19:57+00:00","mainEntityOfPage":{"@id":"https:\/\/fuentis.com\/nis2-richtlinie\/"},"wordCount":2579,"publisher":{"@id":"https:\/\/fuentis.com\/#organization"},"image":{"@id":"https:\/\/fuentis.com\/nis2-richtlinie\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1","articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/fuentis.com\/nis2-richtlinie\/","url":"https:\/\/fuentis.com\/nis2-richtlinie\/","name":"Implementation of the NIS2 directive","isPartOf":{"@id":"https:\/\/fuentis.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fuentis.com\/nis2-richtlinie\/#primaryimage"},"image":{"@id":"https:\/\/fuentis.com\/nis2-richtlinie\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1","datePublished":"2024-08-04T08:05:17+00:00","dateModified":"2025-04-15T21:19:57+00:00","description":"So planen Unternehmen effektiv die Umsetzung der NIS2 Richtlinie. Dieser Leitfaden bietet Einblicke in Anforderungen und Herausforderungen.","breadcrumb":{"@id":"https:\/\/fuentis.com\/nis2-richtlinie\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fuentis.com\/nis2-richtlinie\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fuentis.com\/nis2-richtlinie\/#primaryimage","url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1","width":855,"height":666},{"@type":"BreadcrumbList","@id":"https:\/\/fuentis.com\/nis2-richtlinie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fuentis.com\/"},{"@type":"ListItem","position":2,"name":"NIS2 Richtlinie"}]},{"@type":"WebSite","@id":"https:\/\/fuentis.com\/#website","url":"https:\/\/fuentis.com\/","name":"fuentis AG | fuentis Suite","description":"Die IT-Compliance Plattform f\u00fcr ISO 27001, BSI IT-Grundschutz und Risikomanagement.","publisher":{"@id":"https:\/\/fuentis.com\/#organization"},"alternateName":"fuentis AG | Homepage","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fuentis.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fuentis.com\/#organization","name":"fuentis AG","alternateName":"fuentis","url":"https:\/\/fuentis.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fuentis.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"fuentis AG"},"image":{"@id":"https:\/\/fuentis.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fuentisAG\/","https:\/\/x.com\/fuentisAG","https:\/\/mastodon.social\/@fuentisag","https:\/\/de.linkedin.com\/company\/fuentis","https:\/\/www.youtube.com\/@fuentisAG","https:\/\/www.instagram.com\/fuentisag\/"],"description":"Fuentis vereint Cybersicherheit, Informationssicherheit und Datenschutz in einem Tool. Jetzt pers\u00f6nliches Angebot anfordern!","email":"info@fuentis.com","telephone":"+ 49 (331) 885 9211 -0","legalName":"fuentis AG","foundingDate":"2016-01-01","vatID":"DE313123288","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/fuentis.com\/#\/schema\/person\/b8e4b7a7ae41aff4c7a9849c181a65b8","name":"Srdan Manasijevic","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","caption":"Srdan Manasijevic"},"url":"https:\/\/fuentis.com\/en\/author\/srdan-manasijevic\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1",855,666,false],"thumbnail":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=300%2C234&ssl=1",300,234,true],"medium_large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=768%2C598&ssl=1",768,598,true],"large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1",855,666,true],"1536x1536":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1",855,666,true],"2048x2048":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1",855,666,true],"trp-custom-language-flag":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=15%2C12&ssl=1",15,12,true],"newspack-article-block-landscape-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=855%2C666&ssl=1",855,666,true],"newspack-article-block-portrait-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=855%2C666&ssl=1",855,666,true],"newspack-article-block-square-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=855%2C666&ssl=1",855,666,true],"newspack-article-block-landscape-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=800%2C600&ssl=1",800,600,true],"newspack-article-block-portrait-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=600%2C666&ssl=1",600,666,true],"newspack-article-block-square-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=800%2C666&ssl=1",800,666,true],"newspack-article-block-landscape-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=600%2C450&ssl=1",600,450,true],"newspack-article-block-portrait-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=450%2C600&ssl=1",450,600,true],"newspack-article-block-square-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=600%2C600&ssl=1",600,600,true],"newspack-article-block-landscape-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=400%2C300&ssl=1",400,300,true],"newspack-article-block-portrait-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=300%2C400&ssl=1",300,400,true],"newspack-article-block-square-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=400%2C400&ssl=1",400,400,true],"newspack-article-block-landscape-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=200%2C150&ssl=1",200,150,true],"newspack-article-block-portrait-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=150%2C200&ssl=1",150,200,true],"newspack-article-block-square-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?resize=200%2C200&ssl=1",200,200,true],"newspack-article-block-uncropped":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=855%2C666&ssl=1",855,666,true],"menu-24x24":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=24%2C19&ssl=1",24,19,true],"menu-36x36":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=36%2C28&ssl=1",36,28,true],"menu-48x48":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/08\/NIS-2-LOGO.jpg?fit=48%2C37&ssl=1",48,37,true]},"uagb_author_info":{"display_name":"Srdan Manasijevic","author_link":"https:\/\/fuentis.com\/en\/author\/srdan-manasijevic\/"},"uagb_comment_info":0,"uagb_excerpt":"In einer Welt, die zunehmend auf digitale Systeme angewiesen ist, hat der Schutz von Netzwerken und Informationssystemen h\u00f6chste Priorit\u00e4t. Eine der gr\u00f6\u00dften Bedrohungen f\u00fcr diese Systeme sind Distributed Denial of Service (DDoS)-Angriffe. Solche Angriffe k\u00f6nnen sowohl Unternehmen als auch Einzelpersonen erheblich sch\u00e4digen. Doch keine Sorge, Wissen ist Macht. In diesem Artikel erkunden wir, was DDoS-Angriffe&hellip;","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfIFB2-10o","jetpack-related-posts":[{"id":6508,"url":"https:\/\/fuentis.com\/en\/cybersecurity-trends-2025\/","url_meta":{"origin":3868,"position":0},"title":"Cybersecurity Trends 2025","author":"Srdan Manasijevic","date":"January 20, 2025","format":false,"excerpt":"Cybersecurity Trends 2025 Das Jahr 2025 markiert ein neues Kapitel in der Cybersicherheitslandschaft, die komplexer und dynamischer ist als je zuvor. Mit der fortschreitenden Digitalisierung und der zunehmenden Vernetzung von Unternehmen, Organisationen und kritischen Infrastrukturen steigen auch die Anforderungen an den Schutz sensibler Daten und Systeme. Gleichzeitig wachsen die Bedrohungen.\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"Die Cybersecurity entwickelt sich stetig voran. Hier geht es um die wichtigsten Cybersecurity Trends f\u00fcr 2025.","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Cybersecuritytrends-2025-05.01.2025.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Cybersecuritytrends-2025-05.01.2025.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Cybersecuritytrends-2025-05.01.2025.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Cybersecuritytrends-2025-05.01.2025.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Cybersecuritytrends-2025-05.01.2025.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7451,"url":"https:\/\/fuentis.com\/en\/was-unternehmen-ueber-die-nis2-richtlinie-wissen-muessen\/","url_meta":{"origin":3868,"position":1},"title":"Was Unternehmen \u00fcber die NIS2-Richtlinie wissen m\u00fcssen","author":"Srdan Manasijevic","date":"April 16, 2025","format":false,"excerpt":"Warum NIS2 jetzt wichtig ist Cyberangriffe auf Unternehmen, \u00f6ffentliche Einrichtungen und kritische Infrastrukturen nehmen in Anzahl und Professionalit\u00e4t stetig zu. Ob Datendiebstahl, Erpressung mit Ransomware oder gezielte Angriffe auf Versorgungssysteme, die Bedrohungslage ist real und betrifft Unternehmen jeder Gr\u00f6\u00dfe. Vor diesem Hintergrund hat die Europ\u00e4ische Union mit der NIS2-Richtlinie (Network\u2026","rel":"","context":"In &quot;NIS2&quot;","block_context":{"text":"NIS2","link":"https:\/\/fuentis.com\/en\/category\/nis2\/"},"img":{"alt_text":"NIS2 jetzt mit der fuentis Suite 4 umsetzen","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/NIS2-jetzt-mit-der-fuentis-Suite-4-umsetzen.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/NIS2-jetzt-mit-der-fuentis-Suite-4-umsetzen.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/NIS2-jetzt-mit-der-fuentis-Suite-4-umsetzen.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/NIS2-jetzt-mit-der-fuentis-Suite-4-umsetzen.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/NIS2-jetzt-mit-der-fuentis-Suite-4-umsetzen.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6164,"url":"https:\/\/fuentis.com\/en\/bewertung-der-audit-bereitschaft\/","url_meta":{"origin":3868,"position":2},"title":"Assessment of audit readiness: everything you need to know","author":"Srdan Manasijevic","date":"October 30, 2024","format":false,"excerpt":"Bewertung der Audit Bereitschaft In diesem Jahr kosteten Datenverletzungen Unternehmen im Durchschnitt 4,88 Mio US-Dollar. Das stellt ein 10% Wachstum im vergleich zum Vorjahr da. Sicherlich m\u00f6chte Sie nicht, dass Ihr Unternehmen auf dieser Liste steht, deshalb ist es entscheidend, sich auf die Verteidigung und den Schutz gegen Cyber-Bedrohungen vorzubereiten.\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"Wie bereite ich mich auf ein Audit vor","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Wie-bereite-ich-mich-auf-ein-Audit-vor.webp?fit=1200%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Wie-bereite-ich-mich-auf-ein-Audit-vor.webp?fit=1200%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Wie-bereite-ich-mich-auf-ein-Audit-vor.webp?fit=1200%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Wie-bereite-ich-mich-auf-ein-Audit-vor.webp?fit=1200%2C1200&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Wie-bereite-ich-mich-auf-ein-Audit-vor.webp?fit=1200%2C1200&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7929,"url":"https:\/\/fuentis.com\/en\/nis2-regierungsentwurf-eine-meldepflichten-fuer-unternehmen\/","url_meta":{"origin":3868,"position":3},"title":"NIS2 Regierungsentwurf &#8211; Eine Meldepflichten f\u00fcr Unternehmen","author":"Srdan Manasijevic","date":"August 1, 2025","format":false,"excerpt":"NIS2 Meldepflicht - Was der Regierungsentwurf f\u00fcr Unternehmen bedeutet Die Cybersicherheitslandschaft in Deutschland steht vor einem bedeutenden Wandel: Mit der Ver\u00f6ffentlichung des Regierungsentwurfs zur Umsetzung der NIS2-Richtlinie werden die NIS2 Meldepflichten deutlich versch\u00e4rft und auf einen wesentlich gr\u00f6\u00dferen Kreis von Unternehmen ausgeweitet. Was bisher haupts\u00e4chlich Betreiber kritischer Infrastrukturen betraf, wird\u2026","rel":"","context":"In &quot;NIS2&quot;","block_context":{"text":"NIS2","link":"https:\/\/fuentis.com\/en\/category\/nis2\/"},"img":{"alt_text":"NIS2 Meldepflicht - Was der Regierungsentwurf fu\u0308r Unternehmen bedeutet","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/08\/NIS2-Meldepflicht-Was-der-Regierungsentwurf-fuer-Unternehmen-bedeutet.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/08\/NIS2-Meldepflicht-Was-der-Regierungsentwurf-fuer-Unternehmen-bedeutet.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/08\/NIS2-Meldepflicht-Was-der-Regierungsentwurf-fuer-Unternehmen-bedeutet.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/08\/NIS2-Meldepflicht-Was-der-Regierungsentwurf-fuer-Unternehmen-bedeutet.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/08\/NIS2-Meldepflicht-Was-der-Regierungsentwurf-fuer-Unternehmen-bedeutet.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7647,"url":"https:\/\/fuentis.com\/en\/was-gehoert-zur-kritischen-infrastruktur-kritis\/","url_meta":{"origin":3868,"position":4},"title":"Was geh\u00f6rt zur kritischen Infrastruktur?","author":"Srdan Manasijevic","date":"June 1, 2025","format":false,"excerpt":"Was geh\u00f6rt zur kritischen Infrastruktur?Was ist KRITIS?KRITIS (Kritische Infrastrukturen) bezeichnen Einrichtungen und Organisationen, die f\u00fcr das Funktionieren des Gemeinwesens essenziell sind. Ein Ausfall oder eine St\u00f6rung dieser Strukturen kann schwerwiegende Folgen haben. Etwa langanhaltende Versorgungsprobleme, erhebliche Beeintr\u00e4chtigungen der \u00f6ffentlichen Ordnung oder andere weitreichende Auswirkungen.Wann gilt etwas als kritische Infrastruktur?Nicht jede\u2026","rel":"","context":"In &quot;KRITIS&quot;","block_context":{"text":"KRITIS","link":"https:\/\/fuentis.com\/en\/category\/kritis\/"},"img":{"alt_text":"fuentis AG - OG Image - Was geho\u0308rt zur kritischen Infrastruktur - 1.00","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/06\/fuentis-AG-OG-Image-Was-gehoert-zur-kritischen-Infrastruktur-1.00.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/06\/fuentis-AG-OG-Image-Was-gehoert-zur-kritischen-Infrastruktur-1.00.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/06\/fuentis-AG-OG-Image-Was-gehoert-zur-kritischen-Infrastruktur-1.00.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/06\/fuentis-AG-OG-Image-Was-gehoert-zur-kritischen-Infrastruktur-1.00.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/06\/fuentis-AG-OG-Image-Was-gehoert-zur-kritischen-Infrastruktur-1.00.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7502,"url":"https:\/\/fuentis.com\/en\/nis2-richtlinie-einfach-erklaert-was-unternehmen-jetzt-wissen-muessen\/","url_meta":{"origin":3868,"position":5},"title":"NIS2-Richtlinie einfach erkl\u00e4rt \u2013 Was Unternehmen jetzt wissen m\u00fcssen","author":"adminfuentis","date":"April 28, 2025","format":false,"excerpt":"NIS2-Richtlinie einfach erkl\u00e4rt \u2013 Was Unternehmen jetzt wissen m\u00fcssenDie NIS2-Richtlinie der Europ\u00e4ischen Union ist ein entscheidender Schritt, um die Cybersicherheit und Widerstandsf\u00e4higkeit kritischer Infrastrukturen nachhaltig zu verbessern. Mit dem zunehmenden digitalen Wandel und den damit verbundenen Cyberrisiken steigen auch die Anforderungen an Unternehmen, ihre Sicherheitsstrategien zu st\u00e4rken. Die NIS2-Richtlinie definiert\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"fuentis_handshake_rechenzentrum_fortschritt","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/fuentis_handshake_rechenzentrum_fortschritt-1024x683.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/fuentis_handshake_rechenzentrum_fortschritt-1024x683.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/fuentis_handshake_rechenzentrum_fortschritt-1024x683.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/fuentis_handshake_rechenzentrum_fortschritt-1024x683.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/3868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/users\/249796503"}],"replies":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/comments?post=3868"}],"version-history":[{"count":24,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/3868\/revisions"}],"predecessor-version":[{"id":6231,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/3868\/revisions\/6231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/media\/6129"}],"wp:attachment":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/media?parent=3868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/categories?post=3868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/tags?post=3868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}