{"id":7201,"date":"2024-02-02T12:52:56","date_gmt":"2024-02-02T10:52:56","guid":{"rendered":"https:\/\/heliview.com\/security-leadership\/?p=7201"},"modified":"2024-02-02T12:52:56","modified_gmt":"2024-02-02T10:52:56","slug":"managing-nis2","status":"publish","type":"post","link":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/","title":{"rendered":"Whitepaper: Managing NIS2"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Cyberaanvallen vormen een steeds groter economisch- en veiligheidsgevaar voor de kritieke infrastructuur van Nederland en Europa. Om de benodigde maatregelen hiertegen af te dwingen, is begin 2023 de NIS2-richtlijn in de EU in werking getreden. Lidstaten zijn verplicht de richtlijn uiterlijk in oktober 2024 om te zetten naar nationale wetgeving. Vanaf dat moment moeten kritieke infrastructuur sectoren waaronder energie, vervoer, gezondheidszorg en digitale diensten maatregelen treffen\/getroffen hebben om te voldoen aan de NIS2 richtlijn en de daaruit voortgevloeide Nederlandse wet. De richtlijn eist van organisaties onder andere maatregelen op het gebied van risicobeheer ten aanzien van cyberbeveiliging en bevat verplichtingen op het gebied van het melden van daaraan gerelateerde incidenten.[\/vc_column_text][vc_empty_space]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download de whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    One or more fields have not been filled in or have been filled in incorrectly.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        First name*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Last name*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Company name*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Role*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Business email address*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>By clicking on sign up you give permission to be emailed, you will receive the whitepaper in your mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', '5d65c782-3203-4aca-bdc5-d5194ea4c464')\" type=\"button\" class=\"lgx-btn\" value=\"Sign up\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Thank you, you will receive an email within a few minutes to download the whitepaper.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Unfortunately something went wrong; your request was not successful. Please try again later.<\/div>\n            <\/form>\n        <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJsZ3gtc3Vic2NyaWJlci1hcmVhJTIyJTNFJTBBJTNDZm9ybSUyMGNsYXNzJTNEJTIybmV3c2xldHRlciUyMiUzRSUwQSUzQ2xhYmVsJTNFJTIwRW1haWwlMjBhZGRyZXNzJTIwJTNDaW5wdXQlMjB0eXBlJTNEJTIydGV4dCUyMiUyMGlkJTNEJTIyRW1haWxBZGRyZXNzTmV3c2xldHRlciUyMiUyMG5hbWUlM0QlMjJlbWFpbCUyMiUyMHBsYWNlaG9sZGVyJTNEJTIyWW91ciUyMGVtYWlsJTIwYWRkcmVzcyUyMiUyMCUyRiUzRSUzQyUyRmxhYmVsJTNFJTBBJTNDaW5wdXQlMjB0eXBlJTNEJTIyYnV0dG9uJTIyJTIwY2xhc3MlM0QlMjJsZ3gtYnRuJTIyJTIwdmFsdWUlM0QlMjJyZWdpc3RlciUyMiUyMG9uY2xpY2slM0QlMjJXZWJzaXRlLlN1YnNjcmliZVRvTmV3c2xldHRlciUyOCUyNzg1MTI5MjI5NTIzNyUyNyUyOSUyMiUzRSUwQSUzQ2RpdiUyMGlkJTNEJTIyTmV3c2xldHRlclN1Y2Nlc3MlMjIlMjBjbGFzcyUzRCUyMm5pZXV3c2JyaWVmLXN1Y2NlcyUyMGhpZGRlbiUyMiUzRVRoYW5rJTIweW91JTJDJTIweW91ciUyMHJlZ2lzdHJhdGlvbiUyMGhhcyUyMGJlZW4lMjBzZW50JTIxJTNDJTJGZGl2JTNFJTBBJTNDZGl2JTIwaWQlM0QlMjJOZXdzbGV0dGVyRXJyb3IlMjIlMjBjbGFzcyUzRCUyMm5pZXV3c2JyaWVmLWVycm9yJTIwaGlkZGVuJTIyJTNFVW5mb3J0dW5hdGVseSUyMHNvbWV0aGluZyUyMHdlbnQlMjB3cm9uZyUzQiUyMHlvdXIlMjByZWdpc3RyYXRpb24lMjB3YXMlMjBub3QlMjBzdWNjZXNzZnVsLiUyMFBsZWFzZSUyMHRyeSUyMGFnYWluJTIwbGF0ZXIuLiUzQyUyRmRpdiUzRSUwQSUzQyUyRmZvcm0lM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Cyberaanvallen vormen een steeds groter economisch- en veiligheidsgevaar voor de kritieke infrastructuur van Nederland en Europa. Om de benodigde maatregelen hiertegen af te dwingen, is begin 2023 de NIS2-richtlijn in de EU in werking getreden. Lidstaten zijn verplicht de richtlijn uiterlijk in oktober 2024 om te zetten naar nationale wetgeving. Vanaf dat moment moeten kritieke [...]","protected":false},"author":7,"featured_media":7202,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,16],"tags":[],"class_list":["post-7201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Whitepaper: Managing NIS2 - Security Leadership<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Whitepaper: Managing NIS2 - Security Leadership\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Security Leadership\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-02-02T10:52:56+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/02\/tstc.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"siham\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"siham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/\",\"url\":\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/\",\"name\":\"Whitepaper: Managing NIS2 - Security Leadership\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/02\/tstc.png\",\"datePublished\":\"2024-02-02T10:52:56+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/02\/tstc.png\",\"contentUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/02\/tstc.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/security-leadership\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper: Managing NIS2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\",\"url\":\"https:\/\/heliview.com\/security-leadership\/\",\"name\":\"Security Leadership\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\",\"name\":\"siham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"caption\":\"siham\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper: Managing NIS2 - Security Leadership","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/","og_locale":"en_GB","og_type":"article","og_title":"Whitepaper: Managing NIS2 - Security Leadership","og_url":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/","og_site_name":"Security Leadership","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2024-02-02T10:52:56+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/02\/tstc.png","type":"image\/png"}],"author":"siham","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Written by":"siham","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/","url":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/","name":"Whitepaper: Managing NIS2 - Security Leadership","isPartOf":{"@id":"https:\/\/heliview.com\/security-leadership\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/02\/tstc.png","datePublished":"2024-02-02T10:52:56+00:00","author":{"@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0"},"breadcrumb":{"@id":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/security-leadership\/managing-nis2\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#primaryimage","url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/02\/tstc.png","contentUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/02\/tstc.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/security-leadership\/managing-nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/security-leadership\/"},{"@type":"ListItem","position":2,"name":"Whitepaper: Managing NIS2"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/security-leadership\/#website","url":"https:\/\/heliview.com\/security-leadership\/","name":"Security Leadership","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0","name":"siham","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","caption":"siham"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/7201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/comments?post=7201"}],"version-history":[{"count":1,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/7201\/revisions"}],"predecessor-version":[{"id":7203,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/7201\/revisions\/7203"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media\/7202"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media?parent=7201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/categories?post=7201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/tags?post=7201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}