{"id":9020,"date":"2024-03-28T10:59:51","date_gmt":"2024-03-28T09:59:51","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=9020"},"modified":"2025-10-16T15:50:06","modified_gmt":"2025-10-16T13:50:06","slug":"the-nis-2-directive","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/","title":{"rendered":"The NIS 2 Directive"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"705\" height=\"263\" alt=\"Banner Directive NIS 2\" title=\"banner-article-blog-directive-nis2\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" class=\"lazyload img-responsive wp-image-8975\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27705%27%20height%3D%27263%27%20viewBox%3D%270%200%20705%20263%27%3E%3Crect%20width%3D%27705%27%20height%3D%27263%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-200x75.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2-600x224.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg 705w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 705px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><\/p>\n<p>The introduction of the NIS 2 Directive represents an essential response to the growing cyber threat. Published in December 2022, it offers a unique opportunity for entities that influence citizens' daily lives to strengthen their ability to protect themselves against cyber-attacks. By imposing preventive measures and assessing potential risks, this directive aims to secure infrastructures and minimize the impact of attacks. <\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-bg-color:rgba(0,100,254,0.09);--awb-bg-color-hover:rgba(0,100,254,0.09);--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;--awb-font-size:18px;\"><p style=\"text-align: center;\"><b>Summary<\/b><\/p>\n<ol>\n<li><a href=\"#what-is-the-directive-nis-2\">What is the NIS 2 Directive? <\/a><\/li>\n<li><a href=\"#who-is-affected-by-nis-2\"> Who is affected by NIS 2? <\/a><\/li>\n<li><a href=\"#what-are-the-obligations-related-to-this-directive\">What are the obligations related to this directive? <\/a><\/li>\n<li><a href=\"#what-are-the-consequences-and-fines-for-non-compliance-with-the-nis2-directive\">What are the consequences and fines for non-compliance with the NIS 2 directive? <\/a><\/li>\n<li><a href=\"#how-can-our-dot-anonymizer-solution-for-anonymizing-personal-and-identifying-data-help-you-comply-with-nis2\">How can our DOT Anonymizer solution for anonymizing personal and identifying data help you comply with NIS 2? <\/a><\/li>\n<li><a href=\"#conclusion\">Conclusion<\/a><\/li>\n<\/ol>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"what-is-the-directive-nis-2\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">1. What is the NIS 2 Directive?<\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:left;\"><p><b>The NIS 2 Directive,<\/b> resulting from the previous NIS 1 Directive, <b>constitutes a major change in the national and European cybersecurity landscape. <\/b>This development stems from the European Union's cybersecurity strategy, announced in December 2020, calling for the revision of the NIS Directive and the adoption of a new directive on the resilience of critical entities.<b> It aims to unify cybersecurity practices across the European Union and broaden its scope to include a greater number of entities, covering a wider range of business sectors.  <\/b><\/p>\n<p><b>In the face of rapidly evolving cyber threats, this transition to NIS 2 is necessary to guarantee the EU's collective digital security.<\/b> The directive imposes obligations on operators of essential services and providers of digital services, and member states must identify operators subject to enhanced requirements. <b>Transposing NIS 2 into member states' national law by October 2024 <\/b>represents a major challenge, but essential to strengthening resilience in the face of growing cyber threats. On January 17, 2025, member states must inform the European Commission of the rules and measures they have adopted.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:450px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"566\" height=\"547\" alt=\"Key dates NIS 2 Directive EU\" title=\"key-dates-directive-nis-2\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/key-dates-directive-nis-2.png\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/key-dates-directive-nis-2.png\" class=\"lazyload img-responsive wp-image-9041\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27566%27%20height%3D%27547%27%20viewBox%3D%270%200%20566%20547%27%3E%3Crect%20width%3D%27566%27%20height%3D%27547%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/key-dates-directive-nis-2-200x193.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/key-dates-directive-nis-2-400x387.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/key-dates-directive-nis-2.png 566w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 566px\" \/><\/span><\/div><div class=\"fusion-menu-anchor\" id=\"who-is-affected-by-nis-2\"><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">2. Who is affected by NIS 2?<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p><b>The NIS 2 directive defines more than 18 sectors concerned<\/b>, separated into critical and highly critical sectors. It will affect around <b>600 distinct types of entity, including a variety of administrations of all sizes<\/b>, as well as businesses ranging from SMEs to CAC40 groups.  <\/p>\n<p> It introduces several significant changes, including <b>the expansion of the number of highly critical sectors from seven to eleven. <\/b>These sectors now include energy, transport, banking, financial market infrastructures, digital infrastructures, drinking water, wastewater, food (from production to delivery), healthcare, public administration, and space.   <\/p>\n<p><b>Digital infrastructures,<\/b> with their growing importance, cover a wide range of activities, including Internet service providers, DNS services, cloud solutions, data centers, content delivery services, trust services and public electronic communications networks.  <\/p>\n<p>Size criteria, such as number of employees or turnover, also determine the inclusion of entities in the directive. In addition, the directive <b>covers almost all medium-sized and large companies operating in the EU internal market,<\/b> including those located outside the EU but essential to its market. <\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"what-are-the-obligations-related-to-this-directive\"><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">3. What are the obligations related to this directive?<\/h2><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:left;\"><p>The NIS 2 directive, in line with the <a href=\"\/dot\/anonymization-and-gdpr-key-challenges-obligations-and-best-practices\/\"><u>GDPR<\/u><\/a>, focuses on securing information systems while preserving the protection of personal data, creating an integrated compliance challenge for the entities concerned.<\/p>\n<p><b>NIS 2 also imposes various obligations on entities with the aim of strengthening resilience in the face of cyber threats. These entities are required to:<\/b><\/p>\n<ul>\n<li><b>Report major IT security incidents<\/b> to <b>the relevant authorities<\/b> and affected individuals within 24 hours of their occurrence.<\/li>\n<li><b>Submit security audits to receive recommendations<\/b> and meet strict security standards. These obligations include risk analysis, information systems security, incident management, business continuity, supply chain security, information systems acquisition, development and maintenance, and the use of multi-factor authentication solutions.<\/li>\n<li><b>Compliance with minimum security measures<\/b>, such as the implementation of policies relating to risk analysis, incident management, business continuity plans, human resources security, the use of secure communication tools, and much more.<\/li>\n<\/ul>\n<p>NIS2 establishes a distinction between certain <b>mid-sized companies (ETI)<\/b>, which will be classified as <b>important entities (EI)<\/b>, while others will be considered essential entities (EE). Depending on their classification (EE or EI), and in accordance with the principle of proportionality, they will not be subject to the same requirements, and will be subject to consultation with the parties concerned in order to take account of their specific characteristics.<\/p>\n<p>Each EU member state must communicate a list of its essential and important entities by April 17, 2025, and this list must be regularly reviewed.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p><strong>Guide \u2013 Data Anonymization Keys to a Successful Cross-functional Project<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/guides-resources\/data-anonymization-keys-to-successful-cross-functional-project\/?\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download the guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"what-are-the-consequences-and-fines-for-non-compliance-with-the-nis2-directive\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">4. What are the consequences and fines for non-compliance with the NIS 2 directive?<\/h2><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:left;\"><p><b>The ANSSI (in France) has enhanced supervisory authority, depending on whether the controlled entity is essential or important.<\/b> Essential entities may be subject <b>to ex ante control,<\/b> even in the absence of security incidents, as well as ex post control. On the other hand, important entities are only subject to <b>ex-post control,<\/b> triggered by a security incident or indications of non-compliance. ANSSI is empowered to carry out on-site or remote inspections, including targeted security audits, security scans and requests for information on the security measures adopted by the entity.   <\/p>\n<p><b>Fines for non-compliance:  <\/b><\/p>\n<p>NIS 2 also provides for administrative fines in the event of non-compliance, with ceilings set in national law, <b>including 10 million euros or 2% of worldwide annual sales for essential entities, and 7 million euros or 1.4% of worldwide annual sales for important entities.   <\/b><\/p>\n<p>These fines may be imposed by competent authorities, such as ANSSI, and may be accompanied by additional penalties in the event of non-cooperation by the entity concerned. <\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"how-can-our-dot-anonymizer-solution-for-anonymizing-personal-and-identifying-data-help-you-comply-with-nis2\"><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">5. How can our DOT Anonymizer solution for anonymizing personal and identifying data help you comply with NIS 2?<\/p><\/h2><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-content-alignment:left;\"><p><b>DOT Anonymizer<\/b> is a major tool for compliance with the NIS 2 directive, offering a high-performance solution for the anonymization of personal and identifying data.   <\/p>\n<p><b>Although it does not explicitly specify data anonymization obligations, the NIS 2 directive nevertheless encourages IT security strategies that may encompass this practice. <\/b>It imposes high standards for digital risk prevention, incident reporting and supply chain security, thus indirectly suggesting the adoption of anonymization to improve data security.  <\/p>\n<p><b> DOT Anonymizer eliminates the possibility of exploiting data in the event of a security breach.<\/b> This helps strengthen the resilience of information systems against cyberthreats and bring companies into line with NIS 2 security requirements. <\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"conclusion\"><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">6. Conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:left;\"><p>The NIS 2 Directive represents a significant step forward in strengthening cybersecurity within the European Union. By extending security obligations and introducing enhanced monitoring mechanisms, it aims to harmonize data protection practices across different sectors. Ultimately, the NIS 2 Directive is essential to preserve citizens' confidence in a safe and secure European cyberspace.  <\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><p><strong>DOT Guide: our 5 tips for a successful anonymization project<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/guides-resources\/dot-guide-5-tips-for-a-successful-anonymization-project\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Read our Guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"Iv-vbM6J3FE\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.<\/p>\n","protected":false},"author":5,"featured_media":8975,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,111],"tags":[],"class_list":["post-9020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-resources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The NIS 2 Directive | Blog<\/title>\n<meta name=\"description\" content=\"Find out how the NIS 2 directive aims to enhance infrastructure security &amp; reduce the impact of cyberattacks on entities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The NIS 2 Directive | Blog\" \/>\n<meta property=\"og:description\" content=\"Find out how the NIS 2 directive aims to enhance infrastructure security &amp; reduce the impact of cyberattacks on entities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-28T09:59:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-16T13:50:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"705\" \/>\n\t<meta property=\"og:image:height\" content=\"263\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"The NIS 2 Directive\",\"datePublished\":\"2024-03-28T09:59:51+00:00\",\"dateModified\":\"2025-10-16T13:50:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\"},\"wordCount\":4384,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\",\"articleSection\":[\"Blog\",\"Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\",\"name\":\"The NIS 2 Directive | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\",\"datePublished\":\"2024-03-28T09:59:51+00:00\",\"dateModified\":\"2025-10-16T13:50:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"Find out how the NIS 2 directive aims to enhance infrastructure security & reduce the impact of cyberattacks on entities.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\",\"contentUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg\",\"width\":705,\"height\":263,\"caption\":\"Banner Directive NIS 2\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The NIS 2 Directive | Blog","description":"Find out how the NIS 2 directive aims to enhance infrastructure security & reduce the impact of cyberattacks on entities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/","og_locale":"en_US","og_type":"article","og_title":"The NIS 2 Directive | Blog","og_description":"Find out how the NIS 2 directive aims to enhance infrastructure security & reduce the impact of cyberattacks on entities.","og_url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2024-03-28T09:59:51+00:00","article_modified_time":"2025-10-16T13:50:06+00:00","og_image":[{"width":705,"height":263,"url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","type":"image\/jpeg"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"The NIS 2 Directive","datePublished":"2024-03-28T09:59:51+00:00","dateModified":"2025-10-16T13:50:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/"},"wordCount":4384,"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","articleSection":["Blog","Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/","url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/","name":"The NIS 2 Directive | Blog","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","datePublished":"2024-03-28T09:59:51+00:00","dateModified":"2025-10-16T13:50:06+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"Find out how the NIS 2 directive aims to enhance infrastructure security & reduce the impact of cyberattacks on entities.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/the-nis-2-directive\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","contentUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/03\/banner-article-blog-directive-nis2.jpg","width":705,"height":263,"caption":"Banner Directive NIS 2"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/9020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=9020"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/9020\/revisions"}],"predecessor-version":[{"id":12676,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/9020\/revisions\/12676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media\/8975"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=9020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/categories?post=9020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/tags?post=9020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}