{"id":14840,"date":"2023-03-28T09:50:45","date_gmt":"2023-03-28T07:50:45","guid":{"rendered":"http:\/\/www.orbit.cz\/?post_type=encyklopedie-cloudu&#038;p=14840"},"modified":"2025-08-27T13:43:03","modified_gmt":"2025-08-27T11:43:03","slug":"jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost","status":"publish","type":"encyklopedie-cloudu","link":"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/","title":{"rendered":"How NIS2 can help you improve your cyber security"},"content":{"rendered":"<div class=\"wp-block-image plnobarevny wp-image-14855 size-large\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023-1024x536.jpg\" alt=\"How NIS2 can help you improve your cyber security\" class=\"wp-image-14855\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023-1024x536.jpg 1024w, http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023-300x157.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023-768x402.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Source: <\/em>Image by rawpixel.com on Freepik<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n<style>.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box14840_9bcba3-18 .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box14840_9bcba3-18 .kt-blocks-info-box-link-wrap{background:#ffffff;padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:0px;}.kt-info-box14840_9bcba3-18.wp-block-kadence-infobox{max-width:100%;}.kt-info-box14840_9bcba3-18 .kadence-info-box-image-inner-intrisic-container .kadence-info-box-image-intrisic{padding-bottom:100%;max-width:100%;}.kt-info-box14840_9bcba3-18 .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box14840_9bcba3-18 .kt-info-svg-icon-flip, .kt-info-box14840_9bcba3-18 .kt-blocks-info-box-number{font-size:50px;}.kt-info-box14840_9bcba3-18 .kt-blocks-info-box-media{border-radius:200px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-info-box14840_9bcba3-18 .kt-infobox-textcontent p.kt-blocks-info-box-title{font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:400;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.wp-block-kadence-infobox.kt-info-box14840_9bcba3-18 .kt-blocks-info-box-text{font-weight:bold;}.kt-info-box14840_9bcba3-18 .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box14840_9bcba3-18 orbit-testimonial-second\"><span class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-left kt-info-halign-left\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><\/div><\/div><div class=\"kt-infobox-textcontent\"><p class=\"kt-blocks-info-box-title\">Scarecrow, more obligations, fines for non-compliance, the same hullabaloo as with GDPR. These are also the views expressed about the NIS2 directive. But why do they appear? What will the directive bring? Who will be covered by it, and from when? There are many questions, but one thing is clear. There is no need to panic, but it is a good idea to look at the state of cyber security in your organisation as soon as possible. \u00a0<\/p><p class=\"kt-blocks-info-box-text\">Jan Mare\u0161<\/p><\/div><\/span><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The essence of cyber security<\/h2>\n\n\n\n<p>Cybersecurity is a hot topic and will continue to be. Just as we know the principles of occupational health and safety (OHS) and fire protection (FP), so too should our knowledge of cyber security.<\/p>\n\n\n\n<p>Cybersecurity today is no longer just about firewalls and antivirus, but also about setting up processes, rules and responding to current threats. It's not just about IT, but also about the behaviour of employees and suppliers. <strong>So we all have a responsibility for data security<\/strong>not only in the context of work, but also in private life.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is NIS2&nbsp;<\/strong><\/h2>\n\n\n\n<p><strong>NIS2 Directive<\/strong> (more precisely <em>Directive of the European Parliament and of the Council on measures to ensure a high common level of cybersecurity<\/em>) is there to lay the foundations of cybersecurity for a wider range of organisations than NIS1, and thus enhance the cybersecurity of EU Member States. It is intended to do this in particular by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deepening cooperation between the EU and the national supervisory authority, which in our case is the National Cyber and Information Security Authority (NCIS),<\/li>\n\n\n\n<li>giving more powers to the supervisory authority (in the form of issuing warnings, taking action or carrying out audits of organisations),<\/li>\n\n\n\n<li>by adopting a national cybersecurity strategy,<\/li>\n\n\n\n<li>by increasing fines for non-compliance,<\/li>\n\n\n\n<li>expanding regulated services - i.e. increasing the number of organisations that will be subject to the obligations (estimated 6-12 thousand entities),<\/li>\n\n\n\n<li>introducing security measures for regulated services.<\/li>\n<\/ul>\n\n\n\n<p>The requirements of the NIS2 Directive are nothing new in the field of cyber security. If your organisation was covered by the Cybersecurity Act or you have an information security management system in place, you are likely to find the news minimal. However, if cybersecurity is new to your organization, then yes, you will need to make a greater effort to comply with the new obligations. But there's no need to panic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How much time do we have to implement NIS2<\/strong><\/h2>\n\n\n\n<p>It's important to note that <strong>the NIS2 Directive itself does not directly impose any obligations on organisations<\/strong>. Although it came into force on 16 January 2023, it also states that Member States have 21 months to incorporate the requirements of the Directive into their local legislation. This is therefore a different situation to that of, for example, the DORA regulation, <span style=\"text-decoration: underline;\"><a href=\"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/co-prinese-dora-nejvyznamnejsi-poskytovatele-cloudu-se-dostanou-pod-dohled-organu\/\" target=\"_blank\" rel=\"noopener\">which we wrote about here<\/a><\/span>.<\/p>\n\n\n\n<p>The amendment should be published within the mentioned period <em>Cybersecurity Act<\/em>which is likely to allow some time for the fulfilment of obligations. On a timeline, it would look like this:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"459\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2-02-1024x459.jpg\" alt=\"How NIS2 will improve your cyber security | ORBIT Cloud Encyclopedia\" class=\"wp-image-14841\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2-02-1024x459.jpg 1024w, http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2-02-300x135.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2-02-768x345.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2-02.jpg 1453w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>From this depiction, one could conclude that there is plenty of time and cybersecurity is not something that needs to be addressed. The opposite is true. Cybersecurity should not be underestimated, even in the light of what is happening in the world. It should not be underestimated by responsible organisations. <strong>deal with them continuously and do not wait for new legislation<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What the new draft Cybersecurity Act says&nbsp;<\/strong><\/h2>\n\n\n\n<p>In the second half of January this year, the NICB has already elaborated the requirements of the NIS2 Directive and issued <strong>draft of the new Cybersecurity Act and its decrees<\/strong>. So we know that some obligations will be even stricter than required by the NIS Directive2. In general terms, organisations will have to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>identify whether they are covered by the Act (unless determined by the NUCIB itself),<\/li>\n\n\n\n<li>register for the NCIB Portal,<\/li>\n\n\n\n<li>determine the scope of cyber security management,<\/li>\n\n\n\n<li>report cyber security incidents,<\/li>\n\n\n\n<li>inform customers about incidents and threats,<\/li>\n\n\n\n<li>implement countermeasures to reduce risks,<\/li>\n\n\n\n<li>manage the supply chain,<\/li>\n\n\n\n<li>implement organisational and technical security measures.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to find out what specifically <\/strong><strong>will have to <\/strong><strong style=\"color: #000000;\">according to NIS2, your organisation must meet<\/strong><\/h2>\n\n\n\n<p>The first thing to do is to look into <strong>draft decree on regulated services<\/strong>if it lists the service you provide. If so, you have met the first criterion for identification.<\/p>\n\n\n\n<p>The second criterion is <strong>the size of your organisation<\/strong>. If you are a large or medium-sized enterprise, you will be subject to the obligations. However, beware - some small businesses providing this service may also fall under the new law.<\/p>\n\n\n\n<p>Also, if you are a micro or small enterprise and your parent organisation is abroad, the number of employees is added up. So you need to look at this carefully and identify if your organisation's service is listed in the decree.<\/p>\n\n\n\n<p>You can use <a href=\"https:\/\/osveta.nukib.cz\/course\/view.php?id=145\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">this overview page<\/span><\/a>, which was prepared by NUCIB on the topic of NIS2.<\/p>\n\n\n\n<p>Like the NIS2 Directive, the new draft law divides regulated services into two groups. The Directive provides for a division into <em>Essential<\/em> and&nbsp;<em>Important<\/em>, which did not sound understandable when translated into Czech. Therefore, the draft of the new law and its decrees provides for<strong>by dividing it into higher and lower obligation regimes<\/strong>. It imposes obligations on organisations to put in place the following organisational and security measures:<\/p>\n\n\n<style>.kb-row-layout-id14840_32bfb1-27 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id14840_32bfb1-27 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id14840_32bfb1-27 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:repeat(2, minmax(0, 1fr));}.kb-row-layout-id14840_32bfb1-27 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id14840_32bfb1-27 > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id14840_32bfb1-27 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id14840_32bfb1-27 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column14840_2fff48-94 > .kt-inside-inner-col,.kadence-column14840_2fff48-94 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column14840_2fff48-94 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column14840_2fff48-94 > .kt-inside-inner-col{flex-direction:column;}.kadence-column14840_2fff48-94 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column14840_2fff48-94 > .kt-inside-inner-col{background-color:var(--global-palette1, #3182CE);}.kadence-column14840_2fff48-94 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column14840_2fff48-94, .kadence-column14840_2fff48-94 h1, .kadence-column14840_2fff48-94 h2, .kadence-column14840_2fff48-94 h3, .kadence-column14840_2fff48-94 h4, .kadence-column14840_2fff48-94 h5, .kadence-column14840_2fff48-94 h6{color:var(--global-palette9, #ffffff);}.kadence-column14840_2fff48-94{position:relative;}@media all and (max-width: 1024px){.kadence-column14840_2fff48-94 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column14840_2fff48-94 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column14840_2fff48-94\"><div class=\"kt-inside-inner-col\">\n<h4 class=\"wp-block-heading has-text-align-center has-theme-palette-9-color has-text-color has-link-color wp-elements-85eb8d8b12bb5d7dda30446bc9502678\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">A HIGHER REGIME OF OBLIGATIONS<\/h4>\n\n\n\n<h5 class=\"wp-block-heading has-theme-palette-9-color has-text-color has-link-color wp-elements-7ec525510501f20e03169b872c2cdbab\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--30);padding-bottom:0;padding-left:var(--wp--preset--spacing--30)\">ORGANISATIONAL MEASURES:<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information Security Management System<\/li>\n\n\n\n<li>Duties of top management<\/li>\n\n\n\n<li>Security role<\/li>\n\n\n\n<li>Security policy and documentation management<\/li>\n\n\n\n<li>Asset management and risk management<\/li>\n\n\n\n<li>Supplier management<\/li>\n\n\n\n<li>Human Resources Security<\/li>\n\n\n\n<li>Change Management<\/li>\n\n\n\n<li>Acquisition, development and maintenance<\/li>\n\n\n\n<li>Access Control<\/li>\n\n\n\n<li>Managing cyber events and incidents<\/li>\n\n\n\n<li>Business Continuity Management<\/li>\n\n\n\n<li>Cybersecurity audit<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading has-theme-palette-9-color has-text-color has-link-color wp-elements-4919d8bc23ba561d8aa0620bd864484f\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">TECHNICAL MEASURES:<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Physical security<\/li>\n\n\n\n<li>Security of communication networks<\/li>\n\n\n\n<li>Identity management and authentication<\/li>\n\n\n\n<li>Controlling access permissions<\/li>\n\n\n\n<li>Detection of cyber security events<\/li>\n\n\n\n<li>Recording of safety and relevant operational events<\/li>\n\n\n\n<li>Evaluating cyber security events<\/li>\n\n\n\n<li>Application security<\/li>\n\n\n\n<li>Cryptographic algorithms<\/li>\n\n\n\n<li>Ensuring the availability of the regulated service<\/li>\n\n\n\n<li>Security of industrial, control and similar specific technical assets<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n<style>.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{display:flex;}.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col,.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column14840_0aecc4-b0{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column14840_0aecc4-b0{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{background-color:var(--global-palette4, #2D3748);}.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column14840_0aecc4-b0, .kadence-column14840_0aecc4-b0 h1, .kadence-column14840_0aecc4-b0 h2, .kadence-column14840_0aecc4-b0 h3, .kadence-column14840_0aecc4-b0 h4, .kadence-column14840_0aecc4-b0 h5, .kadence-column14840_0aecc4-b0 h6{color:var(--global-palette9, #ffffff);}.kadence-column14840_0aecc4-b0{position:relative;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column14840_0aecc4-b0{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column14840_0aecc4-b0{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column14840_0aecc4-b0{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column14840_0aecc4-b0{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column14840_0aecc4-b0 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column14840_0aecc4-b0\"><div class=\"kt-inside-inner-col\">\n<h4 class=\"wp-block-heading has-text-align-center has-theme-palette-9-color has-text-color has-link-color wp-elements-636d5d48bfa63fd6af9694e6fd3bc19f\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">A LOWER REGIME OF OBLIGATIONS<br><\/h4>\n\n\n\n<h5 class=\"wp-block-heading has-theme-palette-9-color has-text-color has-link-color wp-elements-9d98bd4829ec8df13310a167a1231f16\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">ORGANISATIONAL MEASURES:<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensuring a minimum level of cyber security<\/li>\n\n\n\n<li>Duties of top management<\/li>\n\n\n\n<li>Security role<\/li>\n\n\n\n<li>Security policy and documentation management<\/li>\n\n\n\n<li>Asset management<\/li>\n\n\n\n<li>Supplier management<\/li>\n\n\n\n<li>Human Resources Security<\/li>\n\n\n\n<li>Change Management<\/li>\n\n\n\n<li>Acquisition, development and maintenance<\/li>\n\n\n\n<li>Access Control<\/li>\n\n\n\n<li>Managing cyber events and incidents<\/li>\n\n\n\n<li>Business Continuity Management<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading has-theme-palette-9-color has-text-color has-link-color wp-elements-4919d8bc23ba561d8aa0620bd864484f\" style=\"padding-right:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">TECHNICAL MEASURES:<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Physical security<\/li>\n\n\n\n<li>Security of communication networks<\/li>\n\n\n\n<li>Identity management and authentication<\/li>\n\n\n\n<li>Controlling access permissions<\/li>\n\n\n\n<li>Detection of cyber security events<\/li>\n\n\n\n<li>Application security<\/li>\n\n\n\n<li>Cryptographic algorithms<\/li>\n\n\n\n<li>Ensuring the availability of the regulated service<\/li>\n\n\n\n<li>Security of industrial, control and similar specific technical assets<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<p>There are several differences between the two modes. They differ in some measures and in the way they are implemented. An example is the security roles (persons with different responsibilities to deal with cybersecurity), where the higher regime describes four roles and the lower regime only two.<\/p>\n\n\n\n<p>There is also a difference in the potential fines for non-compliance: for the higher regime, the fine is set at up to \u20ac10 million or 2 % of worldwide annual turnover. For the lower regime, the fine is set at up to \u20ac7 million or 1.4 % of worldwide annual turnover. These are therefore not low amounts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What to do with NIS2 information?&nbsp;<\/strong><\/h2>\n\n\n\n<p>I understand the views and concerns expressed in the introduction to this article. They are usually based on the expectation of additional work and additional expenditure, the return on which will not be quick (perhaps more likely none).<\/p>\n\n\n\n<p>However, it is important to note that all security measures that will be mandatory (and which are also based on international information security management standards and best practices over a number of years) have only one goal: <strong>Protect your organisation's data and business, and therefore your customers<\/strong>.<\/p>\n\n\n\n<p>Cyber incidents are on the rise, and no organisation can guarantee that the next one won't be perpetrated against it - no matter how interesting we think we are to cyber criminals. <strong>So address cyber security now<\/strong>regardless of the legislation - either on your own or with professional help. Above all, keep your data safe, whether on local servers or in the cloud.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is new in the NIS2 Directive? Who will be covered and when? Better address your company's cyber security now.<\/p>","protected":false},"author":25,"featured_media":14855,"template":"","meta":{"_acf_changed":true,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":""},"categories":[129],"class_list":["post-14840","encyklopedie-cloudu","type-encyklopedie-cloudu","status-publish","has-post-thumbnail","hentry","category-cloud-compliance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i va\u0161i kybernetickou bezpe\u010dnost | ORBIT<\/title>\n<meta name=\"description\" content=\"Co nov\u00e9ho p\u0159in\u00e1\u0161\u00ed sm\u011brnice NIS2? Kdo pod jej\u00ed \u00fa\u010dinnost bude spadat a odkdy? \u0158e\u0161te rad\u011bji kybernetickou bezpe\u010dnost sv\u00e9 spole\u010dnosti u\u017e nyn\u00ed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i va\u0161i kybernetickou bezpe\u010dnost | Encyklopedie cloudu ORBIT\" \/>\n<meta property=\"og:description\" content=\"Co nov\u00e9ho p\u0159in\u00e1\u0161\u00ed sm\u011brnice NIS2? Kdo pod jej\u00ed \u00fa\u010dinnost bude spadat a odkdy?\" \/>\n<meta property=\"og:url\" content=\"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/\" \/>\n<meta property=\"og:site_name\" content=\"ORBIT | create IT your own way\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T11:43:03+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"418\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i va\u0161i kybernetickou bezpe\u010dnost | Encyklopedie cloudu ORBIT\" \/>\n<meta name=\"twitter:description\" content=\"Co nov\u00e9ho p\u0159inese sm\u011brnice NIS2? Kdo pod jej\u00ed \u00fa\u010dinnost bude spadat a odkdy?\" \/>\n<meta name=\"twitter:image\" content=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\\\/\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\\\/\",\"name\":\"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i va\u0161i kybernetickou bezpe\u010dnost | ORBIT\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/EC22-clanek-2023.jpg\",\"datePublished\":\"2023-03-28T07:50:45+00:00\",\"dateModified\":\"2025-08-27T11:43:03+00:00\",\"description\":\"Co nov\u00e9ho p\u0159in\u00e1\u0161\u00ed sm\u011brnice NIS2? Kdo pod jej\u00ed \u00fa\u010dinnost bude spadat a odkdy? \u0158e\u0161te rad\u011bji kybernetickou bezpe\u010dnost sv\u00e9 spole\u010dnosti u\u017e nyn\u00ed.\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\\\/#primaryimage\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/EC22-clanek-2023.jpg\",\"contentUrl\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/EC22-clanek-2023.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i va\u0161i kybernetickou bezpe\u010dnost\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/4.184.192.234\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i&nbsp;va\u0161i kybernetickou bezpe\u010dnost\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#website\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/\",\"name\":\"ORBIT | create IT your own way\",\"description\":\"ORBIT | create IT your own way\",\"publisher\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/4.184.192.234\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#organization\",\"name\":\"ORBIT s.r.o.\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logoslogan-01.png\",\"contentUrl\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logoslogan-01.png\",\"width\":1417,\"height\":829,\"caption\":\"ORBIT s.r.o.\"},\"image\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/orbit\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How NIS2 can help you improve your cyber security | ORBIT","description":"What is new in the NIS2 Directive? Who will be covered and when? Better address your company's cyber security now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/","og_locale":"en_GB","og_type":"article","og_title":"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i va\u0161i kybernetickou bezpe\u010dnost | Encyklopedie cloudu ORBIT","og_description":"Co nov\u00e9ho p\u0159in\u00e1\u0161\u00ed sm\u011brnice NIS2? Kdo pod jej\u00ed \u00fa\u010dinnost bude spadat a odkdy?","og_url":"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/","og_site_name":"ORBIT | create IT your own way","article_modified_time":"2025-08-27T11:43:03+00:00","og_image":[{"width":800,"height":418,"url":"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i va\u0161i kybernetickou bezpe\u010dnost | Encyklopedie cloudu ORBIT","twitter_description":"Co nov\u00e9ho p\u0159inese sm\u011brnice NIS2? Kdo pod jej\u00ed \u00fa\u010dinnost bude spadat a odkdy?","twitter_image":"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/NIS2.jpg","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/","url":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/","name":"How NIS2 can help you improve your cyber security | ORBIT","isPartOf":{"@id":"http:\/\/4.184.192.234\/#website"},"primaryImageOfPage":{"@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/#primaryimage"},"image":{"@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/#primaryimage"},"thumbnailUrl":"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023.jpg","datePublished":"2023-03-28T07:50:45+00:00","dateModified":"2025-08-27T11:43:03+00:00","description":"What is new in the NIS2 Directive? Who will be covered and when? Better address your company's cyber security now.","breadcrumb":{"@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["http:\/\/4.184.192.234\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/#primaryimage","url":"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023.jpg","contentUrl":"http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023.jpg","width":1200,"height":628,"caption":"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i va\u0161i kybernetickou bezpe\u010dnost"},{"@type":"BreadcrumbList","@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/jak-pomuze-nis2-zvysit-i-vasi-kybernetickou-bezpecnost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/4.184.192.234\/"},{"@type":"ListItem","position":2,"name":"Jak pom\u016f\u017ee NIS2 zv\u00fd\u0161it i&nbsp;va\u0161i kybernetickou bezpe\u010dnost"}]},{"@type":"WebSite","@id":"http:\/\/4.184.192.234\/#website","url":"http:\/\/4.184.192.234\/","name":"ORBIT | create IT your own way","description":"ORBIT | create IT your own way","publisher":{"@id":"http:\/\/4.184.192.234\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/4.184.192.234\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"http:\/\/4.184.192.234\/#organization","name":"ORBIT s.r.o.","url":"http:\/\/4.184.192.234\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"http:\/\/4.184.192.234\/#\/schema\/logo\/image\/","url":"http:\/\/4.184.192.234\/wp-content\/uploads\/2020\/11\/logoslogan-01.png","contentUrl":"http:\/\/4.184.192.234\/wp-content\/uploads\/2020\/11\/logoslogan-01.png","width":1417,"height":829,"caption":"ORBIT s.r.o."},"image":{"@id":"http:\/\/4.184.192.234\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/orbit\/"]}]}},"taxonomy_info":{"category":[{"value":129,"label":"Cloud compliance"}]},"featured_image_src_large":["http:\/\/4.184.192.234\/wp-content\/uploads\/2023\/03\/EC22-clanek-2023-1024x536.jpg",1024,536,true],"author_info":{"display_name":"Jan Mare\u0161","author_link":"http:\/\/4.184.192.234\/en\/author\/bfc4263ecdb4cec7\/"},"comment_info":"","_links":{"self":[{"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/encyklopedie-cloudu\/14840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/encyklopedie-cloudu"}],"about":[{"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/types\/encyklopedie-cloudu"}],"author":[{"embeddable":true,"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/users\/25"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/media\/14855"}],"wp:attachment":[{"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/media?parent=14840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/categories?post=14840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}