{"id":7058,"date":"2024-04-15T10:10:00","date_gmt":"2024-04-15T08:10:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=7058"},"modified":"2025-08-13T19:24:07","modified_gmt":"2025-08-13T17:24:07","slug":"nis2-cyber-resilience","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/nis2-cyber-resilienz\/","title":{"rendered":"NIS-2 for more cyber resilience"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7058\" class=\"elementor elementor-7058\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fc16887 e-con-full e-flex e-con e-parent\" data-id=\"5fc16887\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23c42082 elementor-widget elementor-widget-text-editor\" data-id=\"23c42082\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">NIS-2 \"Network and Information Security\" Directive<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>With the NIS 2 Directive, mandatory security measures and reporting obligations will apply to many companies and organizations in 18 critical sectors from October 2024. This includes many SMEs that were not previously affected. This NIS2 replaces the NIS Directive from 2016 with the aim of achieving a better common level of cybersecurity in the EU.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Compared to the previous NIS Directive, NIS-2 greatly expands the group of affected companies, the obligations and the official supervision. Violations of the NIS2 Directive can even result in heavy fines.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Who is affected?\u00a0<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Public and private institutions in 18 sectors\u00a0<strong>with at least 50 employees<\/strong>\u00a0or at least EUR 10 million in annual turnover and annual balance sheet total. All of these entities carry out their activities in the EU. In addition, the following entities, regardless of their size, are also covered by the <a href=\"https:\/\/d7ote1jo.sibpages.com\">NIS2 Directive<\/a>:<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Providers of public electronic communications networks or publicly available electronic communications services<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Trust service provider<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>TLD name registries and DNS service providers (except operators of root name servers)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Sole providers that are essential for society and the economy<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Facilities whose failure would have a major impact on public order, safety or health<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Facilities whose failure could lead to a systemic risk with cross-border consequences<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Facilities that are critical due to special national or regional importance<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Central government public administration body defined by the EU Member State or critical public administration body at regional level<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Critical infrastructures according to Directive (EU) 2022\/2557<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Entities providing domain name registration services<br \/><br \/><\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:image {\"id\":7039,\"scale\":\"cover\",\"sizeSlug\":\"large\",\"linkDestination\":\"none\"} -->\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"449\" class=\"wp-image-7039\" style=\"object-fit: cover;\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Bildschirmfoto-2024-05-06-um-13.59.52-1024x449.png\" alt=\"Sector classification\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Bildschirmfoto-2024-05-06-um-13.59.52-1024x449.png 1024w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Bildschirmfoto-2024-05-06-um-13.59.52-300x132.png 300w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Bildschirmfoto-2024-05-06-um-13.59.52-768x337.png 768w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Bildschirmfoto-2024-05-06-um-13.59.52-1000x439.png 1000w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Bildschirmfoto-2024-05-06-um-13.59.52-1276x560.png 1276w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Bildschirmfoto-2024-05-06-um-13.59.52-600x263.png 600w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Bildschirmfoto-2024-05-06-um-13.59.52.png 1358w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<!-- \/wp:image --><!-- wp:paragraph -->\n<p>The new directive also applies indirectly to service providers and suppliers of affected facilities.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Cybersecurity measures a MUST<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The following cybersecurity measures must be implemented by companies:<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li><strong>Policies<\/strong>Concepts for risk analysis and security for information systems<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Incident management<\/strong>Detection, analysis, containment and response to incidents<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Business Continuity<\/strong>Backup management and recovery, crisis management<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Supply Chain<\/strong>Security in the supply chain<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Purchasing<\/strong>Security in the acquisition, development and maintenance of IT systems, including management and disclosure of vulnerabilities<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Effectiveness<\/strong>Evaluation of the effectiveness of risk management measures<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Cyber hygiene, training<\/strong>Cyber hygiene (e.g. updates) and training in cyber security<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Cryptography<\/strong>Use of cryptography and encryption where appropriate<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Personnel, access, assets<\/strong>Personnel security, access control and asset management<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Authentication<\/strong>Multi-factor authentication or continuous authentication<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Communication<\/strong>Secure voice, video and text communication, also in an emergency if necessary<br \/><br \/><\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">CRITIS<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>NIS-2 is a further development of existing security measures that are already anchored in many companies through ISO standards legislation such as the KRITIS Regulation or the Security Act 2.0. With the introduction of NIS2, a Europe-wide harmonization of these standards will now be achieved, building on the efforts and investments already made by companies.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Even if you as an SME are not affected, cybersecurity is an issue that should be prioritized by management: <a href=\"https:\/\/defenderbox.de\/en\/news\/directors-and-officers-liability\/\">Because as a managing director you are liable\u00a0<\/a>and as a small and medium-sized company, you are also faced with the tricky task of making the right level of investment in the corresponding infrastructure.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p><a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\">What is the state of cyber security in your company?<\/a><\/p>\n<!-- \/wp:image --><!-- wp:paragraph --><!-- \/wp:paragraph --><!-- wp:separator {\"className\":\"is-style-wide\",\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|x-small\",\"bottom\":\"var:preset|spacing|x-small\"}}},\"backgroundColor\":\"tertiary\"} --><!-- \/wp:columns --><!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>With the NIS 2 Directive, mandatory security measures and reporting obligations will apply to many companies and organizations from October 2024.<\/p>","protected":false},"author":3,"featured_media":7042,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34],"tags":[41,39,38,40,37,36],"class_list":["post-7058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defenderbox","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS-2 f\u00fcr mehr Cyber-Resilienz - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/nis2-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS-2 f\u00fcr mehr Cyber-Resilienz - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/nis2-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-15T08:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T17:24:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"NIS-2 f\u00fcr mehr Cyber-Resilienz\",\"datePublished\":\"2024-04-15T08:10:00+00:00\",\"dateModified\":\"2025-08-13T17:24:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/\"},\"wordCount\":484,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"Produkt\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/\",\"name\":\"NIS-2 f\u00fcr mehr Cyber-Resilienz - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg\",\"datePublished\":\"2024-04-15T08:10:00+00:00\",\"dateModified\":\"2025-08-13T17:24:07+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg\",\"width\":2560,\"height\":1536,\"caption\":\"Organisatorischer Prozess zur Erh\u00f6hung der Cyber-Resilienz\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/nis2-cyber-resilienz\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS\u20112 f\u00fcr mehr Cyber-Resilienz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS-2 for more cyber resilience - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/nis2-cyber-resilience\/","og_locale":"en_US","og_type":"article","og_title":"NIS-2 f\u00fcr mehr Cyber-Resilienz - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/nis2-cyber-resilience\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-04-15T08:10:00+00:00","article_modified_time":"2025-08-13T17:24:07+00:00","og_image":[{"width":2560,"height":1536,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg","type":"image\/jpeg"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"NIS-2 f\u00fcr mehr Cyber-Resilienz","datePublished":"2024-04-15T08:10:00+00:00","dateModified":"2025-08-13T17:24:07+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/"},"wordCount":484,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["Produkt"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/","url":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/","name":"NIS-2 for more cyber resilience - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg","datePublished":"2024-04-15T08:10:00+00:00","dateModified":"2025-08-13T17:24:07+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/nis2-cyber-resilienz\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/db5d09c9-7f00-4d1c-aebe-8e2ef0fae918.jpeg","width":2560,"height":1536,"caption":"Organisatorischer Prozess zur Erh\u00f6hung der Cyber-Resilienz"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/nis2-cyber-resilienz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"NIS\u20112 f\u00fcr mehr Cyber-Resilienz"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=7058"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7058\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/7042"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=7058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=7058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=7058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}