{"id":17468,"date":"2025-01-20T06:00:58","date_gmt":"2025-01-20T06:00:58","guid":{"rendered":"https:\/\/letslaw.es\/?p=17468"},"modified":"2025-01-09T10:14:57","modified_gmt":"2025-01-09T10:14:57","slug":"directive-nis2-impact","status":"publish","type":"post","link":"https:\/\/letslaw.es\/en\/directive-nis2-impact\/","title":{"rendered":"Impact of NIS2 Directive"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The NIS2 Directive (Network and Information Systems Directive 2) represents a significant step in the evolution of the legislative framework for cybersecurity in the European Union. Adopted in 2022, its objective is <\/span><b>to strengthen the resilience of critical infrastructures and mitigate risks associated with increasingly sophisticated cyberattacks<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This new directive expands the scope of the original 2016 NIS Directive by imposing stricter obligations and covering a greater number of key sectors. The impact on businesses will be significant, requiring operational and technological adaptations that will enhance their security and competitiveness.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybersecurity obligations<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The NIS2 establishes a set of obligations aimed at ensuring an effective response to security incidents. Companies will be required to redouble efforts in their <\/span><a title=\"cybersecurity lawyers\" href=\"https:\/\/letslaw.es\/en\/corporate-compliance-lawyers\/cibersecurity\/\"><span style=\"font-weight: 400;\">cybersecurity<\/span><\/a><span style=\"font-weight: 400;\"> strategies. The main requirements include:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Technical and organizational measures<\/b><span style=\"font-weight: 400;\">: entities must implement adequate and proportionate measures to manage risks affecting the security of their networks and information systems. Companies will need to invest in encryption tools, network segmentation, access controls, and incident detection and response solutions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Incident notification<\/b><span style=\"font-weight: 400;\">: organizations are obliged to notify competent authorities of any significant cybersecurity incident within a maximum of 24 hours from its initial detection. Companies must establish internal communication channels and rapid response teams.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk assessment and audits<\/b><span style=\"font-weight: 400;\">: risk assessments and audits will be mandatory. Companies will need to allocate resources to identify vulnerabilities and strengthen their security posture.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Secure supply chain<\/b><span style=\"font-weight: 400;\">: entities must ensure that their suppliers and partners comply with the required security standards. This obliges companies to review contracts and collaborate with their partners to protect the supply chain.<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">Entities required to implement it<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The NIS2 Directive expands the scope of application compared to its predecessor, affecting more businesses across various sectors. The entities required to comply with NIS2 are divided into two main categories:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Essential entities<\/b><span style=\"font-weight: 400;\">: these include critical infrastructures whose disruption could have a significant impact on the economy, health, or public safety. Among them are:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Energy sector (electricity, gas, and oil).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Transport (air, rail, maritime, and road).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Banking and financial markets.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Health (hospitals and laboratories).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Drinking water supply and wastewater management.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Important entities<\/b><span style=\"font-weight: 400;\">: this category includes organizations that, while not critical infrastructures, play a relevant role in maintaining essential services. These include:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Manufacturing of chemicals, electronics, and machinery.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Digital services (web hosting providers, cloud services, social networks).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Public administrations at regional and local levels.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The impact on businesses will be considerable, not only due to the economic and technical effort involved but also because of the need to redefine cybersecurity strategies and establish rapid response mechanisms.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Solutions for NIS2 compliance<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">To comply with NIS2 requirements, companies must adopt a comprehensive approach that combines advanced technologies, continuous training, and constant improvement processes. Key solutions include:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk management platforms<\/b><span style=\"font-weight: 400;\">: cyber risk management tools allow organizations to proactively identify, assess, and mitigate potential threats. Companies must allocate budgets and specialized personnel to implement these platforms.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Security operations centers (SOC)<\/b><span style=\"font-weight: 400;\">: establishing or outsourcing SOCs allows for real-time monitoring of networks and systems, detecting suspicious activities, and responding immediately to incidents. Medium and large companies should consider this option as a priority.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Training and awareness<\/b><span style=\"font-weight: 400;\">: staff training is essential to reduce risks arising from human error. Companies must invest in continuous training programs that include attack simulations and crisis management exercises.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Penetration testing and vulnerability assessments<\/b><span style=\"font-weight: 400;\">: conducting regular penetration tests allows companies to identify weaknesses in their systems before they can be exploited by malicious actors.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Public-private collaboration<\/b><span style=\"font-weight: 400;\">: cooperation with government agencies and other companies facilitates the exchange of information on emerging threats and cybersecurity best practices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regulatory compliance and legal advisory<\/b><span style=\"font-weight: 400;\">: hiring legal advisors and compliance experts ensures that organizations align with legal requirements and avoid penalties.<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The NIS2 Directive reflects the European Union&#8217;s commitment to strengthening the security of its digital infrastructures against an evolving threat landscape. Its implementation entails a significant impact on businesses, which must redesign their security strategies, invest in technology, and train their staff. Organizations that adopt a proactive approach will not only protect their assets but also gain a competitive advantage and contribute to the stability of the European digital single market.<\/span><\/p>\n<div class=\"cyp_post_formulario\"><h2>Contact Us<\/h2>\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f3074-o1\" lang=\"es-ES\" dir=\"ltr\" data-wpcf7-id=\"3074\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/17468#wpcf7-f3074-o1\" method=\"post\" class=\"wpcf7-form init wpcf7-acceptance-as-validation\" aria-label=\"Formulario de contacto\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"3074\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_ES\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f3074-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"campo_nombre\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><\/div>\n<div class=\"campo_telefono\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"your-phone\" \/><\/span><\/div>\n<div class=\"campo_email\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><\/div>\n<div class=\"campo_asunto\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-asunto\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"your-asunto\" \/><\/span><\/div>\n<div class=\"campo_mensaje\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-mensaje\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"your-mensaje\"><\/textarea><\/span><\/div>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"cyp_form_url\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"cyp_zonaweb\" type=\"hidden\" name=\"zonaweb\" \/>\n<span class=\"wpcf7-form-control-wrap recaptcha\" data-name=\"recaptcha\"><span data-sitekey=\"6LfbCuUpAAAAAGu5f0__hms_y9Kscc_NCNdDGnEJ\" class=\"wpcf7-form-control wpcf7-recaptcha g-recaptcha\"><\/span>\r\n<noscript>\r\n\t<div class=\"grecaptcha-noscript\">\r\n\t\t<iframe loading=\"lazy\" src=\"https:\/\/www.google.com\/recaptcha\/api\/fallback?k=6LfbCuUpAAAAAGu5f0__hms_y9Kscc_NCNdDGnEJ\" frameborder=\"0\" scrolling=\"no\" width=\"310\" height=\"430\">\r\n\t\t<\/iframe>\r\n\t\t<textarea name=\"g-recaptcha-response\" rows=\"3\" cols=\"40\" placeholder=\"Aqu\u00ed la respuesta de reCAPTCHA\">\r\n\t\t<\/textarea>\r\n\t<\/div>\r\n<\/noscript>\r\n<\/span>\n<div style=\"width:100%\">\n<p class=\"form-input-check\" style=\"color:#444444 !important;padding:0px !important;margin:0px !important;font-size:12px !important;margin-bottom:15px !important\">\nBy clicking on \"Send\" you accept our <a href=\"https:\/\/letslaw.es\/en\/privacy-policy\/\" target=\"_blank\">Privacy Policy<\/a> - <a href=\"javascript:\/\/\" class=\"cyp_legal_popup_ingles\">+ Info<\/a>\n<\/p>\n<p class=\"form-input-check\" style=\"color:#444444 !important;padding:0px !important;margin:0px !important;font-size:12px !important\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"checkbox-173\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-exclusive-checkbox\"><span class=\"wpcf7-list-item first last\"><label><input type=\"checkbox\" name=\"checkbox-173\" value=\"\" \/><span class=\"wpcf7-list-item-label\"><\/span><\/label><\/span><\/span><\/span> I agree to receive outlined commercial communications from LETSLAW, S.L. in accordance with the provisions of our <a href=\"https:\/\/letslaw.es\/en\/privacy-policy\/\" target=\"_blank\">Privacy Policy<\/a> - <a href=\"javascript:\/\/\" class=\"cyp_legal_popup\">+ Info<\/a>\n<\/p>\n<\/div>\n<div class=\"vc_col-sm-12 botton-datos-contacto\"><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/><\/div><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<div>","protected":false},"excerpt":{"rendered":"<p>The NIS2 Directive represents a significant step in the evolution of the legislative framework for cybersecurity in the European Union. <\/p>\n","protected":false},"author":44,"featured_media":17467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[258],"tags":[],"class_list":["post-17468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-law"],"_links":{"self":[{"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/posts\/17468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/comments?post=17468"}],"version-history":[{"count":5,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/posts\/17468\/revisions"}],"predecessor-version":[{"id":17469,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/posts\/17468\/revisions\/17469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/media\/17467"}],"wp:attachment":[{"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/media?parent=17468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/categories?post=17468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/tags?post=17468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}