{"id":6232,"date":"2024-10-03T07:42:57","date_gmt":"2024-10-03T07:42:57","guid":{"rendered":"https:\/\/heliview.com\/digital-identity-trust-belgium\/?p=6232"},"modified":"2024-10-03T07:42:57","modified_gmt":"2024-10-03T07:42:57","slug":"nis2-pam","status":"publish","type":"post","link":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/","title":{"rendered":"Whitepaper: Address the NIS2 Directive with Privileged Access Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]The Network and Information Security (NIS) Directive, created in 2016, was the first EU-wide cybersecurity law. Its objective was to achieve a higher and more uniform level of security for network and information systems throughout the EU (European Union).<\/p>\n<p>Given the considerable acceleration in digital transformation and evolution of threat vectors since then, the Directive was refreshed. NIS2 was formally adopted in November 2022 and entered into force in January 2023. NIS2 repeals and replaces the former version of the Directive. It represents a constructive step forward in defining the requirements for EU organizations to enhance their cyber-resilience over the coming years. NIS2 also clearly details reporting rules and the repercussions for ignoring them.<\/p>\n<p><strong>Read on to discover what&#8217;s required by the NIS2 framework<\/strong>,\u00a0and how BeyondTrust Privileged Access Management (PAM) solutions can help you address the following key sections of the NIS2 Directive.[\/vc_column_text]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    One or more fields have not been filled in or have been filled in incorrectly.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        First name*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Last name*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Company name*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Role*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Business email address*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>By clicking on sign up you give permission to be emailed, you will receive the whitepaper in your mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295242', '253a521d-33a6-42eb-a166-a689c701c3f8')\" type=\"button\" class=\"lgx-btn\" value=\"Sign up\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Thank you, you will receive an email within a few minutes to download the whitepaper.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Unfortunately something went wrong; your request was not successful. Please try again later.<\/div>\n            <\/form>\n        <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]The Network and Information Security (NIS) Directive, created in 2016, was the first EU-wide cybersecurity law. Its objective was to achieve a higher and more uniform level of security for network and information systems throughout the EU (European Union). Given the considerable acceleration in digital transformation and evolution of threat vectors since then, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":6233,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[42,43,44],"tags":[],"class_list":["post-6232","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws-en","category-congres-update-en","category-home-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Whitepaper: Address the NIS2 Directive with Privileged Access Management - Digital Identity &amp; Trust Conference<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Whitepaper: Address the NIS2 Directive with Privileged Access Management - Digital Identity &amp; Trust Conference\" \/>\r\n<meta property=\"og:description\" content=\"[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]The Network and Information Security (NIS) Directive, created in 2016, was the first EU-wide cybersecurity law. Its objective was to achieve a higher and more uniform level of security for network and information systems throughout the EU (European Union). Given the considerable acceleration in digital transformation and evolution of threat vectors since then, [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Digital Identity &amp; Trust Conference\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-10-03T07:42:57+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-content\/uploads\/sites\/58\/2024\/10\/beyond.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"siham\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"siham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/\",\"url\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/\",\"name\":\"Whitepaper: Address the NIS2 Directive with Privileged Access Management - Digital Identity &amp; Trust Conference\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-content\/uploads\/sites\/58\/2024\/10\/beyond.png\",\"datePublished\":\"2024-10-03T07:42:57+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-content\/uploads\/sites\/58\/2024\/10\/beyond.png\",\"contentUrl\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-content\/uploads\/sites\/58\/2024\/10\/beyond.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper: Address the NIS2 Directive with Privileged Access Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/#website\",\"url\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/\",\"name\":\"Digital Identity &amp; Trust Conference\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\",\"name\":\"siham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/heliview.com\/digital-identity-trust-belgium\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"caption\":\"siham\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper: Address the NIS2 Directive with Privileged Access Management - Digital Identity &amp; Trust Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/","og_locale":"en_US","og_type":"article","og_title":"Whitepaper: Address the NIS2 Directive with Privileged Access Management - Digital Identity &amp; Trust Conference","og_description":"[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]The Network and Information Security (NIS) Directive, created in 2016, was the first EU-wide cybersecurity law. Its objective was to achieve a higher and more uniform level of security for network and information systems throughout the EU (European Union). Given the considerable acceleration in digital transformation and evolution of threat vectors since then, [&hellip;]","og_url":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/","og_site_name":"Digital Identity &amp; Trust Conference","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2024-10-03T07:42:57+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-content\/uploads\/sites\/58\/2024\/10\/beyond.png","type":"image\/png"}],"author":"siham","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Written by":"siham","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/","url":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/","name":"Whitepaper: Address the NIS2 Directive with Privileged Access Management - Digital Identity &amp; Trust Conference","isPartOf":{"@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-content\/uploads\/sites\/58\/2024\/10\/beyond.png","datePublished":"2024-10-03T07:42:57+00:00","author":{"@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0"},"breadcrumb":{"@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#primaryimage","url":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-content\/uploads\/sites\/58\/2024\/10\/beyond.png","contentUrl":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-content\/uploads\/sites\/58\/2024\/10\/beyond.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/nis2-pam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/digital-identity-trust-belgium\/"},{"@type":"ListItem","position":2,"name":"Whitepaper: Address the NIS2 Directive with Privileged Access Management"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/#website","url":"https:\/\/heliview.com\/digital-identity-trust-belgium\/","name":"Digital Identity &amp; Trust Conference","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/digital-identity-trust-belgium\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0","name":"siham","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/heliview.com\/digital-identity-trust-belgium\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","caption":"siham"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/posts\/6232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/comments?post=6232"}],"version-history":[{"count":1,"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/posts\/6232\/revisions"}],"predecessor-version":[{"id":6234,"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/posts\/6232\/revisions\/6234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/media\/6233"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/media?parent=6232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/categories?post=6232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/digital-identity-trust-belgium\/wp-json\/wp\/v2\/tags?post=6232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}