{"id":638,"date":"2023-10-19T15:14:08","date_gmt":"2023-10-19T13:14:08","guid":{"rendered":"https:\/\/www.jussimetso.com\/?p=638"},"modified":"2025-03-06T23:16:44","modified_gmt":"2025-03-06T21:16:44","slug":"nis2-0-the-new-eu-wide-cybersecurity-directive-and-how-microsoft-solutions-can-help","status":"publish","type":"post","link":"https:\/\/www.jussimetso.com\/index.php\/2023\/10\/19\/nis2-0-the-new-eu-wide-cybersecurity-directive-and-how-microsoft-solutions-can-help\/","title":{"rendered":"NIS2.0 &#8211; The new EU-wide cybersecurity directive and how Microsoft solutions can help"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"638\" class=\"elementor elementor-638\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-428d07e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"428d07e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1d94a92\" data-id=\"1d94a92\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f2bc5b elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"3f2bc5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__3f2bc5b\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__3f2bc5b\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__3f2bc5b\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3059ceb elementor-widget elementor-widget-heading\" data-id=\"3059ceb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Summary for the C-LEVEL<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e0833a elementor-widget elementor-widget-text-editor\" data-id=\"8e0833a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NIS2.0 is the new EU directive on network and information security that aims to improve the resilience and preparedness of critical sectors and essential services against cyber threats. It will enter into force in October 2024 and will require organizations to comply with a set of standards and obligations, such as reporting incidents, conducting risk assessments, implementing security measures, and cooperating with national authorities.<\/p><p>As a C-LEVEL, you need to be aware of the implications of NIS2.0 for your organization and your customers. You need to ensure that your IT systems, processes, and staff are aligned with the new requirements and that you have a clear strategy and action plan to achieve compliance. You also need to communicate with your customers about the benefits of NIS2.0 and how it will enhance their security and trust in your services.<\/p><p>NIS2 will have a significant impact on business operations, reputation, and competitiveness. NIS2 will require companies to invest more in cybersecurity, comply with new rules and standards, and cooperate with national authorities and other stakeholders.<\/p><p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\">NIS2 is not only a <\/span><u style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\">challenge<\/u><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\">, but also an <\/span><u style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\">opportunity<\/u><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\"> for C-LEVELs to <\/span><u style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\">demonstrate their leadership and commitment to cybersecurity<\/u><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\">.<\/span><\/p><p>Failure to do so could result in fines of up to 10% of their annual turnover, as well as reputational damage and loss of customer trust. On the other hand, complying with NIS2 could also bring benefits, such as improved resilience, innovation, and market opportunities.<span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--petite-stories-background);\"><br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54ecf6b elementor-widget elementor-widget-image\" data-id=\"54ecf6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"NIS2objectivesandmanagementaccountability\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NjY0LCJ1cmwiOiJodHRwczpcL1wvd3d3Lmp1c3NpbWV0c28uY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8xMFwvTklTMm9iamVjdGl2ZXNhbmRtYW5hZ2VtZW50YWNjb3VudGFiaWxpdHktMS5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"328\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?fit=640%2C328&amp;ssl=1\" class=\"attachment-large size-large wp-image-664\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?w=1788&amp;ssl=1 1788w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?resize=300%2C154&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?resize=1024%2C524&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?resize=768%2C393&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?resize=1536%2C786&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?resize=850%2C435&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2objectivesandmanagementaccountability-1.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source : Microsoft Security. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4935c3f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4935c3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a21c52 elementor-widget elementor-widget-heading\" data-id=\"7a21c52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is NIS2 - Network and Information Systems 2?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3f5d46 elementor-widget elementor-widget-text-editor\" data-id=\"a3f5d46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">The NIS2 Directive is the EU-wide legislation on cybersecurity. It provides legal measures to boost the overall level of cybersecurity in the EU.<\/p><p>The <strong>Network and Information Systems 2<\/strong>\u00a0Directive \u2013 commonly referred to as NIS2 \u2013\u00a0represents the most comprehensive EU\u00a0cybersecurity legislation that the region has\u00a0ever seen.\u00a0<\/p><p>Scheduled to go into <b>effect on\u00a0<span style=\"text-decoration: underline;\">October 17, 2024<\/span><\/b>, NIS 2 covers 15 sectors\u00a0and over 160,000 companies \u2013 including\u00a0those with more than 250 employees.<\/p><p>The purpose of NIS2 is to <strong>establish a\u00a0baseline of cybersecurity measures for\u00a0organizations that provide essential\u00a0services<\/strong>. This includes organizations in the\u00a0public and private sectors, across industries<br \/>ranging from finance to transportation\u00a0to healthcare.<\/p><p>Preparing for NIS2 will require companies\u00a0to rethink the tools, processes and skills\u00a0that reinforce their cybersecurity.<\/p><p><b style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--petite-stories-background);\">What does NIS2 mean for me?<\/b><\/p><ul><li>Cybersecurity Risk Management Measures<\/li><li>Incident Reporting Obligations<\/li><\/ul><div>\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f39b512 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f39b512\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1fdb7a elementor-widget elementor-widget-heading\" data-id=\"f1fdb7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why has NIS2 been introduced?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc76717 elementor-widget elementor-widget-image\" data-id=\"cc76717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"NIS2whatdoesitmeantome\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NjQ0LCJ1cmwiOiJodHRwczpcL1wvd3d3Lmp1c3NpbWV0c28uY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8xMFwvTklTMndoYXRkb2VzaXRtZWFudG9tZS5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2047\" height=\"798\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?fit=2047%2C798&amp;ssl=1\" class=\"attachment-full size-full wp-image-644\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?w=2047&amp;ssl=1 2047w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?resize=300%2C117&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?resize=1024%2C399&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?resize=768%2C299&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?resize=1536%2C599&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?resize=850%2C331&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2whatdoesitmeantome.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52f84e8 elementor-widget elementor-widget-text-editor\" data-id=\"52f84e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A significant update to the original NIS\u00a0directive, NIS2 comes at a time when\u00a0<strong>Europe\u2019s cybersecurity threat landscape\u00a0continues to quickly evolve<\/strong>.<\/p><p>Since the war in Ukraine began, nation state\u00a0attacks have increased, according to\u00a0<span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noopener\">Microsoft\u2019s Digital Defense Report<\/a><\/span>.\u00a0These bad actors have become more\u00a0sophisticated, using automation and remote<br \/>access technologies to attack a wider set of\u00a0targets \u2013 often looking for a vulnerable\u00a0point of entry within IT supply chains.\u00a0And often targeting critical infrastructure.<\/p><p><br \/>In fact, the median time for an attacker\u00a0to begin moving within a corporate\u00a0network is less than 2 hours.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e85c33 elementor-widget elementor-widget-heading\" data-id=\"9e85c33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why it should be a priority?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60b1266 elementor-widget elementor-widget-text-editor\" data-id=\"60b1266\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NIS2 represents an opportunity for\u00a0organizations to ensure they have the\u00a0people, processes and partners in place\u00a0<strong>to protect operations, ensure business\u00a0continuity and enable digital\u00a0transformation<\/strong>. What\u2019s more, working\u00a0to ensure NIS2 compliance will help build\u00a0confidence among customers, partners\u00a0and shareholders.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85ad428 elementor-widget elementor-widget-heading\" data-id=\"85ad428\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Differences between NIS and NIS2<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b85342c elementor-widget elementor-widget-image\" data-id=\"b85342c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"nis1vsni2_uusi\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NjUyLCJ1cmwiOiJodHRwczpcL1wvd3d3Lmp1c3NpbWV0c28uY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8xMFwvbmlzMXZzbmkyX3V1c2kucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"386\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?fit=640%2C386&amp;ssl=1\" class=\"attachment-large size-large wp-image-652\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?w=1744&amp;ssl=1 1744w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?resize=300%2C180&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?resize=1024%2C617&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?resize=768%2C463&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?resize=1536%2C926&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?resize=850%2C512&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis1vsni2_uusi.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb3478b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"eb3478b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a05497 elementor-widget elementor-widget-heading\" data-id=\"1a05497\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Changes from NIS1 Directive to NIS2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a044d3 elementor-widget elementor-widget-text-editor\" data-id=\"1a044d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NIS2 expands the scope of the previous NIS Directive.<\/p><p style=\"line-height: 24px;\"><span style=\"font-weight: bold;\">NIS2 sets out a benchmark of minimum measures\u00a0<\/span>that companies need to take to improve their cybersecurity posture. These include conducting risk assessments, implementing multi-factor authentication, and having plans for incident response and supply chain security.<\/p><p style=\"line-height: 24px;\"><span style=\"font-weight: bold;\">NIS2 introduces stricter enforcement\u00a0<\/span>through enhanced measures and sanctions for non-compliance with the directive, as well as more stringent supervisory measures for national authorities. \u00a0\u00a0<\/p><p style=\"line-height: 24px;\"><span style=\"font-weight: bold;\">NIS2 establishes a framework for coordinated vulnerability disclosure<\/span>\u00a0and\u00a0creates an EU registry for vulnerabilities, operated by\u00a0<span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.enisa.europa.eu\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: bold;\">ENISA<\/span><\/a><\/span>, The European Union Agency for Cybersecurity.<\/p><p style=\"line-height: 24px;\">NIS2 also\u00a0<span style=\"font-weight: bold;\">enhances cooperation and information sharing<\/span>\u00a0between Member States and their authorities, including on cyber crisis management.<\/p><p>It is the most comprehensive EU cybersecurity legislation to date, covering 15 sectors including new sectors such as manufacturing and research, and includes medium-sized companies that are identified as critical infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37f2e23 elementor-widget elementor-widget-image\" data-id=\"37f2e23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"426\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2sectors.png?fit=640%2C426&amp;ssl=1\" class=\"attachment-large size-large wp-image-645\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2sectors.png?w=1936&amp;ssl=1 1936w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2sectors.png?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2sectors.png?resize=1024%2C681&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2sectors.png?resize=768%2C511&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2sectors.png?resize=1536%2C1022&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2sectors.png?resize=850%2C565&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2sectors.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-011be3c elementor-widget elementor-widget-text-editor\" data-id=\"011be3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Its purpose is to establish a baseline of minimum-security measures for digital service providers and operators of essential services, to mitigate the risk of cyber attacks and to improve the overall level of cybersecurity in the EU.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-812494c elementor-widget elementor-widget-text-editor\" data-id=\"812494c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here are four key objectives of NIS2 objectives which are broke out into NIS Principles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d6962f elementor-widget elementor-widget-image\" data-id=\"5d6962f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1882\" height=\"622\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2fromobjectivestoprinciples_short.png?fit=1882%2C622&amp;ssl=1\" class=\"attachment-full size-full wp-image-654\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2fromobjectivestoprinciples_short.png?w=1882&amp;ssl=1 1882w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2fromobjectivestoprinciples_short.png?resize=300%2C99&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2fromobjectivestoprinciples_short.png?resize=1024%2C338&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2fromobjectivestoprinciples_short.png?resize=768%2C254&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2fromobjectivestoprinciples_short.png?resize=1536%2C508&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2fromobjectivestoprinciples_short.png?resize=850%2C281&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/NIS2fromobjectivestoprinciples_short.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d611e8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5d611e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50c303b elementor-widget elementor-widget-heading\" data-id=\"50c303b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">To comply with NIS2, you will need to take the following steps:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19dde53 elementor-widget elementor-widget-text-editor\" data-id=\"19dde53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Identify your role and obligations under the NIS2 Directive. Depending your role, you will have different responsibilities and requirements to meet.<\/li><li>Assess your current level of cybersecurity and identify any gaps or weaknesses. You will need to follow common standards and guidelines for security and resilience that will be developed by ENISA and the European Commission.<\/li><li>Implement appropriate security measures and policies to protect your systems and data from cyber threats. You will need to adopt a risk-based approach and ensure that your security measures are proportionate to the level of risk you face.<\/li><li>Report any significant or major incidents to your national authorities and ENISA. You will need to follow a harmonized framework for incident notification that will specify the thresholds, formats and procedures for reporting.<\/li><li>Cooperate with your national authorities and other stakeholders. You will need to participate in regular audits and inspections by your national authorities and share information and best practices with other actors in your sector or across sectors.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b8b347 elementor-widget elementor-widget-heading\" data-id=\"8b8b347\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">More information about Cybersecurity Risk Management measures and Incident reporting   <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-181c2e1 elementor-widget elementor-widget-image\" data-id=\"181c2e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_moreinfo.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"nis2_moreinfo\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NjUwLCJ1cmwiOiJodHRwczpcL1wvd3d3Lmp1c3NpbWV0c28uY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8xMFwvbmlzMl9tb3JlaW5mby5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1011\" height=\"480\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_moreinfo.png?fit=1011%2C480&amp;ssl=1\" class=\"attachment-full size-full wp-image-650\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_moreinfo.png?w=1011&amp;ssl=1 1011w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_moreinfo.png?resize=300%2C142&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_moreinfo.png?resize=768%2C365&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_moreinfo.png?resize=850%2C404&amp;ssl=1 850w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31dd51f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"31dd51f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-625abe1 elementor-widget elementor-widget-heading\" data-id=\"625abe1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Microsoft's Solutions for NIS2 Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1842506 elementor-widget elementor-widget-text-editor\" data-id=\"1842506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here are listed Microsoft Solutions which correspond to NIS2 Compliance principles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85acdda elementor-widget elementor-widget-image\" data-id=\"85acdda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"299\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_microsoft_solutions.png?fit=640%2C299&amp;ssl=1\" class=\"attachment-large size-large wp-image-651\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_microsoft_solutions.png?w=1636&amp;ssl=1 1636w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_microsoft_solutions.png?resize=300%2C140&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_microsoft_solutions.png?resize=1024%2C478&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_microsoft_solutions.png?resize=768%2C358&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_microsoft_solutions.png?resize=1536%2C716&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_microsoft_solutions.png?resize=850%2C396&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/nis2_microsoft_solutions.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cd29cf elementor-widget elementor-widget-heading\" data-id=\"1cd29cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Risk assessments<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e44d37 elementor-widget elementor-widget-text-editor\" data-id=\"4e44d37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Use Microsoft 365 Compliance Manager and Microsoft Defender for Cloud to assess risks and comply with regulations. Microsoft 365 Compliance Manager already provides assessment templates with detailed recommendations for NIS1. NIS2 assessment templates will be provided soon.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af1b71d elementor-widget elementor-widget-heading\" data-id=\"af1b71d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Use of cryptography<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f0f312 elementor-widget elementor-widget-text-editor\" data-id=\"2f0f312\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Leverage Microsoft Azure Key Vault and Microsoft Defender for Cloud for secure key management and encryption.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-729489c elementor-widget elementor-widget-heading\" data-id=\"729489c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security around the procurement of systems<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb0abd0 elementor-widget elementor-widget-text-editor\" data-id=\"fb0abd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Utilize Microsoft Intune and Microsoft Defender for Endpoint to manage devices and ensure security controls are in place.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0d77f2 elementor-widget elementor-widget-heading\" data-id=\"d0d77f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security procedures for employees<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16289ed elementor-widget elementor-widget-text-editor\" data-id=\"16289ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With access to sensitive or important data: Implement identity and access management solutions such as Entra ID (previously Azure Active Directory) and Privileged Identity Management to control access to sensitive data.<\/p><p>Microsoft Information Protection including Data Loss Prevention can help to protect data and restrict how it can be used. In addition, Microsoft Insider Risk Management can help to detect and follow up on risky behavior of insiders.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfb8cb0 elementor-widget elementor-widget-heading\" data-id=\"dfb8cb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Multi-factor authentication<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1814c34 elementor-widget elementor-widget-text-editor\" data-id=\"1814c34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Use Entra ID Multi-factor Authentication to add an extra layer of security to user sign-ins.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-912227b elementor-widget elementor-widget-heading\" data-id=\"912227b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Policies and procedures<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d830b78 elementor-widget elementor-widget-text-editor\" data-id=\"d830b78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For evaluating the effectiveness of security measures: The Microsoft Defender suite and Microsoft Sentinel can help you monitor and detect security threats in real time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e898c61 elementor-widget elementor-widget-heading\" data-id=\"e898c61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Plan for handling security incidents<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e188f6e elementor-widget elementor-widget-text-editor\" data-id=\"e188f6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Information Protection including Data Loss Prevention and Microsoft Insider Risk Management provide their own alert and incident management views.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89e624d elementor-widget elementor-widget-heading\" data-id=\"89e624d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity training and a practice for basic computer hygiene<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9e6da8 elementor-widget elementor-widget-text-editor\" data-id=\"a9e6da8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Utilize Microsoft 365 Learning Pathways and Microsoft Defender for Office 365 to educate your employees on cybersecurity best practises.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6792f2e elementor-widget elementor-widget-heading\" data-id=\"6792f2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Plan for managing business operations during and after a security incident<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f33b70 elementor-widget elementor-widget-text-editor\" data-id=\"1f33b70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Use Microsoft Azure Site Recovery and Backup to ensure business continuity in the event of a security incident.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3466ec elementor-widget elementor-widget-heading\" data-id=\"c3466ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security around supply chains and the relationship between the company and direct supplier<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2c8450 elementor-widget elementor-widget-text-editor\" data-id=\"f2c8450\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Use Microsoft Defender for Endpoint to secure your devices and network against supply chain attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5aea43d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5aea43d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-629e200 elementor-widget elementor-widget-heading\" data-id=\"629e200\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Timeframe \/ Deadline for taking in use<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5db862 elementor-widget elementor-widget-text-editor\" data-id=\"f5db862\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>NIS2 entered 16 January 2023, to be in force at latest on 17 October 2024.<\/strong><\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be56449 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"be56449\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b85edd7 elementor-widget elementor-widget-heading\" data-id=\"b85edd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resources<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7866c8f elementor-widget elementor-widget-text-editor\" data-id=\"7866c8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.itgovernance.co.uk\/nis-regulations-cyber-assessment-framework\" target=\"_blank\" rel=\"noopener\">NIS<\/a><a href=\"https:\/\/www.itgovernance.co.uk\/nis-regulations-cyber-assessment-framework\" target=\"_blank\" rel=\"noopener\"> Regulations: Cyber Assessment Framework (itgovernance.co.uk)<\/a><\/span><\/p><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2021)689333\" target=\"_blank\" rel=\"noopener\">The NIS2 Directive: A high common level of cybersecurity in the EU | Think Tank | European Parliament (europa.eu)<\/a><\/span><\/p><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/valtioneuvosto.fi\/hanke?tunnus=LVM044:00\/2022\" target=\"_blank\" rel=\"noopener\">Kyberturvallisuusdirektiivin (NIS2-direktiivi) kansallista toimeenpanoa tukeva ty\u00f6ryhm\u00e4 (valtioneuvosto.fi)<\/a> (in finnish)<\/span><\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26cbc57 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"26cbc57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6847f90 elementor-author-box--avatar-yes elementor-author-box--name-yes elementor-author-box--biography-yes elementor-author-box--link-no elementor-widget elementor-widget-author-box\" data-id=\"6847f90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/secure.gravatar.com\/avatar\/f9b7dd236d1a48254723d8ff5d1d0c187953327c606be0a676e8f0f6432e226a?s=300&#038;r=g\" alt=\"Picture of Jussi Metso\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h6 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tJussi Metso\t\t\t\t\t\t<\/h6>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\tAuthor is a a lifelong IT enthusiast, Microsoft Security MVP and interested in Cloud Security, XDR, SIEM and AI. \r\nMotto: Learning is the key for your future.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Table of Contents Summary for the C-LEVEL NIS2.0 is the new EU directive on network&#8230;<\/p>\n","protected":false},"author":2,"featured_media":639,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7],"tags":[],"class_list":["post-638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2023\/10\/cyberlock-e1741295746573.jpg?fit=450%2C450&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pes24X-ai","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/comments?post=638"}],"version-history":[{"count":3,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/638\/revisions"}],"predecessor-version":[{"id":2035,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/638\/revisions\/2035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media\/639"}],"wp:attachment":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media?parent=638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/categories?post=638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/tags?post=638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}