{"id":1650,"date":"2024-07-11T08:30:00","date_gmt":"2024-07-11T08:30:00","guid":{"rendered":"https:\/\/proget.pl\/en\/?p=1650"},"modified":"2026-03-03T13:16:18","modified_gmt":"2026-03-03T13:16:18","slug":"nis2-compliance","status":"publish","type":"post","link":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/","title":{"rendered":"NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives"},"content":{"rendered":"<div class=\"!my-16 md:!my-24\">\n  <div \n    class=\"is-layout-constrained\" style=\"--wp--style--global--content-size: 70.75rem;\"\n>\n    <main class=\"xl:grid xl:gap-10 xl:grid-cols-[741px_1fr]\">\n      <article>\n                  <div class=\"inline-grid grid-cols-2 gap-5 sm:flex sm:flex-wrap mb-3\">\n                          <a class=\"uppercase text-[10px] leading-3 text-text-tertiary font-medium w-fit hover:no-underline\"\n                 href=\"https:\/\/proget.pl\/en\/blog\/category\/public-safety\/\"\n              >\n                Public safety\n              <\/a>\n                      <\/div>\n                          <h1 class=\"font-[600] text-3xl text-text-primary mb-7 md:mb-12\">NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives<\/h1>\n                <div class=\"flex items-center gap-x-8\">\n                      <div class=\"flex items-center gap-x-1.5\">\n                              <div class=\"shrink-0\">\n                  <img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Agnieszka-P-100.webp\" class=\"w-8 h-8 object-cover rounded-full\" alt=\"\" \/>                <\/div>\n                                            <p class=\"text-xs\">Agnieszka Pierlak<\/p>\n                          <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M19.5 3.75h-15a.75.75 0 0 0-.75.75v15c0 .414.336.75.75.75h15a.75.75 0 0 0 .75-.75v-15a.75.75 0 0 0-.75-.75Zm-3-1.5v3m-9-3v3m-3.75 3h16.5\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">11.07.2024<\/p>\n            <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-miterlimit=\"10\" d=\"M12 21a9 9 0 1 0 0-18 9 9 0 0 0 0 18Z\"\/><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M12 6.75V12h5.25\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">\n                6 min\n              <\/p>\n            <\/div>\n                  <\/div>\n        <div class=\"mt-7 md:mt-12 single-post-content\">\n          \n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/proget.pl\/en\/\">Proget<\/a><\/span> &gt; <span><a href=\"https:\/\/proget.pl\/en\/blog\/category\/public-safety\/\">Public safety<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\"><strong>NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives<\/strong><\/span><\/span><\/div>\n\n\n<div class=\"wp-block-group has-primary-50-background-color has-background has-xs-font-size is-layout-constrained wp-container-core-group-is-layout-6bf6b0c8 wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm);padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">\n<p class=\"has-base-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--2-xs)\"><strong>Jump to:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><ul><li><a href=\"#h-what-is-the-nis2-directive-and-its-purpose\" data-level=\"2\">What is the NIS2 directive and its purpose?<\/a><\/li><li><a href=\"#h-key-aspects-of-nis2\" data-level=\"2\">Key aspects of NIS2<\/a><\/li><li><a href=\"#h-who-is-affected-by-the-new-regulations\" data-level=\"2\">Who is affected by the new regulations?<\/a><\/li><li><a href=\"#h-new-directive-new-responsibilities\" data-level=\"2\">New directive \u2013 new responsibilities<\/a><\/li><li><a href=\"#h-mobile-device-security-as-part-of-nis2-compliance\" data-level=\"2\">Mobile device security as part of NIS2 compliance<\/a><\/li><li><a href=\"#h-how-does-proget-support-nis2-compliance\" data-level=\"2\">How does Proget support NIS2 compliance?<\/a><\/li><li><a href=\"#h-summary\" data-level=\"2\">Summary<\/a><\/li><\/ul><\/div>\n<\/div>\n\n\n\n<p class=\"has-2-xl-font-size\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">By October 17, 2024, organizations must implement the requirements of the EU&#8217;s NIS2 directive, which introduces several cyber security obligations. It also significantly expands the scope of regulated sectors and entities.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">What is NIS2? Find out if your business needs to adhere to it and how you can make it easier to comply with the new directive.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-what-is-the-nis2-directive-and-its-purpose\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">What is the NIS2 directive and its purpose?<\/h2>\n\n\n\n<p class=\"has-neutral-100-background-color has-background has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><strong>NIS2 <\/strong>(Network and Information Security Directive 2) is a development of the 2016 NIS Directive, Europe&#8217;s first cybersecurity law.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">It was created in response to the need to adapt current regulations to the rapidly evolving landscape of cyber threats and increasingly sophisticated attacks. The goal of NIS2 is to achieve a high, standard level of cyber security across the European Union and to strengthen the protection of critical infrastructure and services vital to society and the economy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-key-aspects-of-nis2\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Key aspects of NIS2<\/h2>\n\n\n\n<ol class=\"wp-block-list has-lg-font-size\">\n<li><strong>Expanded scope<\/strong> \u2013 NIS2 covers more economic sectors than the previous directive, increasing the number of sectors from 7 to 18. As a result, more industries and entities are affected.<\/li>\n\n\n\n<li><strong>New responsibilities<\/strong> \u2013 regulated organizations must implement minimum security measures to ensure effective risk management. In addition, NIS2 tightens incident reporting rules.<\/li>\n\n\n\n<li><strong>Penalties and sanctions<\/strong> \u2013 the directive clearly specifies the amount of administrative penalties for evasion. They can reach up to \u20ac10 million or 2% of total annual turnover.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-who-is-affected-by-the-new-regulations\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Who is affected by the new regulations?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">NIS2 divides regulated companies into <strong>essential and important entities<\/strong>. The first group includes those whose disruption of operations, e.g., as a result of a cyber attack, could have severe consequences for the functioning of society and the economy (for example, energy, drinking water, banking). The second group includes companies of lesser but still vital importance (e.g., postal services, manufacturing).<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-what-are-the-rules-for-identifying-entities\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">What are the rules for identifying entities?<\/h3>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">The directive lists the following criteria:<\/p>\n\n\n\n<ul style=\"margin-bottom:var(--wp--preset--spacing--sm)\" class=\"wp-block-list has-lg-font-size\">\n<li><strong>Self-identification<\/strong>: the organization must self-assess whether it is subject to the directive and notify the relevant state authority.<\/li>\n\n\n\n<li><strong>Size<\/strong>: the regulations apply to medium- and large-sized enterprises, i.e., those with <strong>more than 50 employees<\/strong> and an annual turnover or balance sheet total exceeding <strong>\u20ac10 million<\/strong>, among others.<\/li>\n\n\n\n<li><strong>Area of activity<\/strong>: entities that <strong>provide services within the EU<\/strong> and operate in sectors deemed essential to the economy and society are subject to the directive.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignfull size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"637\" height=\"1129\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/infografika_pion_EN.webp\" alt=\"NIS2 icons essential entities, NIS2 important entities, NI2 essential sectors, NIS2 important sectors\" class=\"wp-image-2848\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/infografika_pion_EN.webp 637w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/infografika_pion_EN-169x300.webp 169w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/infografika_pion_EN-609x1080.webp 609w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-new-directive-new-responsibilities\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">New directive \u2013 new responsibilities<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">NIS2 introduces the exact minimum security requirements for all entities. Obligations under the directive are described in general terms, which gives flexibility in choosing solutions to help meet the objectives. In addition, each EU country can impose its regulations \u2013 provided they are no less stringent than those contained in NIS2.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-what-risk-management-measures-need-to-be-implemented\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">What risk management measures need to be implemented?<\/h3>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">The directive focuses not only on technical and organizational aspects of security. It also requires that employees be aware of the risks and adequately trained. Risk management measures should be adequate to the level of risk and cover at least these areas:<\/p>\n\n\n\n<ul style=\"margin-bottom:var(--wp--preset--spacing--sm)\" class=\"wp-block-list has-lg-font-size\">\n<li>Policies on risk analysis \u2013 procedures to identify, analyze, assess and minimize cyber security risks.<\/li>\n\n\n\n<li>Incident handling \u2013 procedures to detect, respond to, and prevent incidents.<\/li>\n\n\n\n<li>Business continuity \u2013 restoring normal operations of an organization after an emergency, such as through the use of backups.<\/li>\n\n\n\n<li>Security of networks and information systems \u2013 in the process of their acquisition, development, and maintenance, as well as handling the discovery of vulnerabilities.<\/li>\n\n\n\n<li>Security of the supply chain \u2013 establishing the requirements for external service providers.<\/li>\n\n\n\n<li>Security of human resources, asset management, and access control.<\/li>\n\n\n\n<li>Procedures for using cryptography, encryption, multi-factor or continuous authentication, secure voice, text, and video communications, and secure internal communications systems used in emergencies.<\/li>\n\n\n\n<li><span style=\"text-decoration: underline\"><a href=\"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/\">Cyber hygiene<\/a><\/span> \u2013 introducing its basic practices and regular training of employees in cyber security.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignfull size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"417\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/iStock-1336250974_proget.webp\" alt=\"NIS2 mobile device management, administrator with tablet\" class=\"wp-image-2849\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/iStock-1336250974_proget.webp 673w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/iStock-1336250974_proget-300x186.webp 300w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-reporting-incidents\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Reporting incidents<\/h3>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-1583dc0162bbfc0c65c8e7aff0522c7b\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">NIS2 tightens incident reporting requirements. Every essential entity must be ready to identify, respond to, and report cyber incidents quickly.<\/p>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-a5893959c642b4219dead6d30df33d6a\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">The most important obligation is to report serious incidents to the relevant CSIRT (Computer Security Incident Response Team) <strong>upon detection and without undue delay<\/strong>.<\/p>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-f8a8a3f236a78852f96d508b401dd948\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">An initial notification should be sent <strong>within 24 hours of the detection of a breach<\/strong>, and more detailed information \u2013 up to 72 hours. The organization must provide a final report no later than one month after reporting the incident. The document should include a description of the incident&#8217;s course, the threat&#8217;s type and cause, and the countermeasures taken.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-administrative-fines\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Administrative fines<\/h3>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-4472ee52c8a324e0c4c5936e46a3aa1d\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">There are legal and financial sanctions for non-compliance with NIS2 regulations. Legal sanctions can include, for example, compliance orders, implementation of security audit recommendations, and the obligation to inform customers of risks. Financial penalties vary depending on the category to which the organization belongs.<\/p>\n\n\n\n<p class=\"has-neutral-100-background-color has-background has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><strong>Essential entities<\/strong>: at least <strong>\u20ac10 million or 2%<\/strong> of total annual turnover.<br><br><strong>Important entities<\/strong>: at least <strong>\u20ac7 million or 1.4%<\/strong> of total annual turnover.<\/p>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-4ce61b9411c60a5622b2d6373e52f6ff\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">Consequences, including financial and personal liability for non-compliance, may also be incurred by those in management positions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-mobile-device-security-as-part-of-nis2-compliance\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Mobile device security as part of NIS2 compliance<\/h2>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-06787235c6448017fcf58e90414f57be\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">Network and information system security is an essential aspect of risk management in light of NIS2. As digitization advances, business IT infrastructures cover an increasingly <strong>broad spectrum of devices<\/strong>, as reflected in the new regulations.<\/p>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-d0fe1a19c674d4a0f2fca51e4f1ac4b3\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">How does the directive define &#8216;networks and information systems&#8217;? It includes not just desktop computers and servers but <span style=\"text-decoration: underline\"><a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32022L2555\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">any device that processes digital data<\/a><\/span> (Chapter 1, Article 6). So <strong>mobile devices, such as laptops, cell phones, tablets, and amplified equipment, are also included<\/strong>.<\/p>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-fcb8c95e7fed13b5d51f10fbcd5add84\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">Today, mobile devices are indispensable for conducting business, allowing employees to access applications, data, and resources from anywhere. <strong>According to NIS2, they must be appropriately protected<\/strong> \u2013 on par with traditional IT systems. Advanced mobility management solutions such as Proget are invaluable in accomplishing this task.<\/p>\n\n\n\n<figure class=\"wp-block-image alignfull size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"414\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/iStock-1401165602_proget-EN.webp\" alt=\"NIS2 mobile device management, administrator works on computer, at two screens with Proget console\" class=\"wp-image-2851\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/iStock-1401165602_proget-EN.webp 673w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/iStock-1401165602_proget-EN-300x185.webp 300w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-how-does-proget-support-nis2-compliance\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">How does Proget support NIS2 compliance?<\/h2>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-0229b82f6d955eb15607df1618e7264f\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">Proget is an <span style=\"text-decoration: underline\"><a href=\"https:\/\/proget.pl\/en\/all-in-one-platform\/\">All-in-One<\/a><\/span> platform centralizing business mobile device management, monitoring, and protection. <strong>It helps IT administrators meet NIS2 requirements<\/strong> by offering various functionalities in the directive-regulated areas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-full-visibility-and-compliance\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Full visibility and compliance<\/h3>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-323f7602ce51bdc91745ca5fca5769a5\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">NIS2 requires constant monitoring of all mobile devices, which process corporate data and assess their associated risks. <strong>The Proget console includes a comprehensive inventory of equipment<\/strong> deployed to the system, providing knowledge of who has what devices and what they are. In addition, the solution enables ongoing <strong>tracking of mobile devices&#8217; <span style=\"text-decoration: underline\"><a href=\"https:\/\/proget.pl\/en\/location\/\">location<\/a><\/span> and security status<\/strong>, dividing them into compliant and non-compliant with the organization&#8217;s established policies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-incident-handling-and-preventive-measures\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Incident handling and preventive measures<\/h3>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-22914dc58d81f659e9b30d9be59645a7\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">The directive mandates that <strong>effective procedures must be implemented to prevent, detect, and respond quickly to security incidents<\/strong>. Proget&#8217;s <span style=\"text-decoration: underline\"><a href=\"https:\/\/proget.pl\/en\/mobile-threat-prevention\/\">Mobile Threat Prevention Profile<\/a><\/span> monitors devices, applications, and networks for potential threats. It also allows you to <strong>set up immediate, automatic responses<\/strong> to detected incidents \u2013 for example, an attempt to install a dangerous app. When a device is lost or stolen, administrators can <strong>remotely lock it or wipe corporate data<\/strong>, protecting it from unauthorized access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-consistent-and-rigorous-security-policies\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Consistent and rigorous security policies<\/h3>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-ddcbf84c86fa28a443e78e2ed264e696\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">NIS2 obliges companies to develop and implement security policies, including for mobile devices. This extends to policies for the <strong>day-to-day use of equipment and methods of securing it<\/strong>. Proget allows you to <strong>configure consistent policies<\/strong> for individual devices or groups (such as employees in a particular department) and enforce compliance. Policies can impose, among other things, the need to set strong passwords, enforce encryption, and control access to device functions such as the camera or microphone. This approach <strong>minimizes the risk of typical security oversights<\/strong>, ensuring NIS2 compliance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-effective-application-management\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Effective application management<\/h3>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-681f1bdfb47f6436f4cb78b3539fdb86\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">Since mobile apps <strong>often access corporate IT systems and data<\/strong>, they should be properly controlled, as they can become a source of security risks. Proget enables app <strong>whitelisting and blacklisting<\/strong> to block the installation of apps from unknown sources and minimize the risk of malware being installed on the device. The system also ensures that <strong>apps are regularly updated<\/strong>, eliminating security vulnerabilities from outdated, cyberattack-prone versions.<\/p>\n\n\n<div class=\"alignfull !px-0 bg-background-black text-text-inverted\">\n  <div \n    class=\"is-layout-constrained is-layout-constrained-root px-6 md:px-16\"\n>\n    \n\n<div class=\"wp-block-group has-lg-font-size is-layout-constrained wp-block-group-is-layout-constrained\"><div\n  id=\"block_3a2c3f36fdeb3caad1b90714bc57230f\"\n  class=\"grid grid-cols-1 lg:grid-cols-12 gap-y-16 gap-x-10 py-[--wp--preset--spacing--2-xl] items-center\"\n  style=\"padding-top:var(--wp--preset--spacing--lg);padding-bottom:var(--wp--preset--spacing--lg)\"\n>\n  <div \n    class=\"is-layout-constrained lg:col-span-6 lg:order-1 order-3\"\n>\n    \n<h2\n  class=\"text-3xl !leading-[1.2] font-bold wp-block-heading align-text-left\" style=\";\" id=\"block_ec73924630c44ac4b84292e99ab61093\"\n>\n  Your data in&nbsp;the right hands.\n<\/h2>\n\n<div \n  id=\"block_304b8a2eb7d89e7cb2c94af7a59561cd\"\n  class=\"flex flex-wrap gap-4 wp-block-buttons justify-start\"\n  style=\"padding-top:var(--wp--preset--spacing--sm)\"\n>\n  \n<a\n    href=\"https:\/\/proget.pl\/en\/trial\/\" target=\"\" rel=\"noopener\" style=\"min-width: 200px\" class=\"!inline-flex items-center justify-center outline outline-1 -outline-offset-1 rounded-full font-prebold no-underline hover:no-underline focus:no-underline transition-colors duration-300 linear whitespace-nowrap font-sans-alt !leading-[1.362] [&amp;_svg]:flex-none bg-button-primary-main-fill !text-button-primary-main-text outline-button-primary-main-outline hover:bg-button-primary-hover-fill hover:!text-button-primary-hover-text hover:outline-button-primary-hover-outline disabled:bg-button-primary-disabled-fill disabled:!text-button-primary-disabled-text disabled:outline-button-primary-disabled-outline focus:bg-button-primary-selected-fill focus:!text-button-primary-selected-text focus:outline-button-primary-selected-outline button-small text-[0.8125rem] px-4 py-2 gap-2 [&amp;_svg]:w-4 [&amp;_svg]:h-4 wp-block-button !inline-flex\"\n>\n    \n    <span\n        class=\"\"\n    >\n        Test the system\n    <\/span>\n\n            <svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M2.5 8H13.5\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n<path d=\"M9 3.5L13.5 8L9 12.5\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n<\/svg>\n    <\/a>\n\n<\/div>\n\n<\/div>\n  <div class=\"hidden lg:block order-2\"><\/div>\n\n  <div class=\"text-center lg:col-span-5 hidden md:block lg:order-3 order-1\">\n          <img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"350\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp\" class=\"inline-block w-full h-auto rounded-lg\" alt=\"tablet and phone, home screen view with application icons\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp 510w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4-300x206.webp 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>      <\/div>\n\n      <div class=\"text-center lg:col-span-5 block md:hidden lg:order-3 order-1\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"350\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp\" class=\"inline-block w-full h-auto rounded-lg\" alt=\"tablet and phone, home screen view with application icons\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp 510w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4-300x206.webp 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>    <\/div>\n  <\/div><\/div>\n\n\n<\/div><\/div>\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-summary\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Summary<\/h2>\n\n\n\n<p class=\"has-base-black-color has-text-color has-link-color has-lg-font-size wp-elements-ed23108936a17aba89113d2885ea9d77\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">Although many companies are implementing cybersecurity policies and solutions mainly because of regulations, the market will likely soon impose these standards on its own, responding to rapidly evolving threats. Information security will become a key criterion for business cooperation, so it&#8217;s a good idea to implement appropriate protection measures now. Even if your company is not directly covered by NIS2, awareness of potential threats and a proactive approach to security is an investment that will ensure your organization&#8217;s future safety and stability.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-brand-fog-color has-alpha-channel-opacity has-brand-fog-background-color has-background is-style-default\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:0\" \/>\n\n\n\n<div class=\"wp-block-group has-base-white-background-color has-background is-nowrap is-layout-flex wp-container-core-group-is-layout-837611ba wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:0;padding-top:0;padding-right:var(--wp--preset--spacing--sm);padding-bottom:0;padding-left:var(--wp--preset--spacing--sm)\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-700cb50f wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-f078265f wp-block-column-is-layout-constrained\" style=\"padding-right:0;flex-basis:48px\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Agnieszka-P-100.webp\" alt=\"\" class=\"wp-image-2976\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-e1564d08 wp-block-column-is-layout-constrained\" style=\"padding-left:0\">\n<p>Author: Agnieszka Pierlak<\/p>\n\n\n\n<p style=\"margin-top:0;margin-bottom:0.7em;font-size:0.7em\">Marketing specialist with experience in the IT industry. Interested in issues related to cybersecurity and internal security. Privately, a lover of good literature, Asian cuisine and mountain hiking.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n        <\/div>\n      <\/article>\n      <aside class=\"mt-10 xl:mt-0\">\n        <div class=\"hidden xl:block xl:mb-10\">\n          <form role=\"search\" action=\"https:\/\/proget.pl\/en\/blog\/\" autocomplete=\"off\">\n  <div class=\"w-full inline-block relative \">\n    <input\n      class=\"peer w-full bg-transparent text-text-primary font-medium text-sm shadow-01 pr-3 pl-10 pt-xs border border-border-secondary rounded-lg transition-all hover:border-border-active hover:bg-surface-hover-01 focus:border-border-active focus:outline-0 focus:ring-0 disabled:bg-border-disabled disabled:text-text-disabled disabled:cursor-not-allowed disabled:border-border-disabled h-[50px]\"\n      placeholder=\" \"\n      type=\"text\"\n      name=\"s\"\n      value=\"\"\n      id=\"search\"\n    \/>\n    <label\n      class=\"flex w-full h-full select-none pointer-events-none absolute left-0 pr-3 pl-10 transition-all !overflow-visible truncate leading-tigh text-text-tertiary peer-placeholder-shown:text-text-tertiary peer-disabled:text-text-disabled peer-disabled:peer-placeholder-shown:text-text-disabled peer-placeholder-shown:text-sm text-xs peer-focus:text-xs top-[7px] peer-placeholder-shown:top-[15px] peer-focus:top-[7px]\"\n      for=\"search\"\n    >\n      Search\n    <\/label>\n    <button type=\"submit\" class=\"absolute left-0 top-[calc(50%-20px)] w-10 h-[40px] pl-1 flex items-center justify-center\">\n      <svg class=\"w-5 h-5 shrink-0 stroke-primary-500 pointer-events-none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 20 20\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M9.063 15.625a6.562 6.562 0 1 0 0-13.125 6.562 6.562 0 0 0 0 13.125Zm4.64-1.922L17.5 17.5\"\/><\/svg>    <\/button>\n  <\/div>\n<\/form>\n        <\/div>\n                  <h2 class=\"text-text-secondary text-lg font-semibold mb-6\">More articles:<\/h2>\n          <div class=\"grid gap-6\">\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/customer-story-kaem-construction-industry\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2026\/02\/KAEM-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with KAEM logo, two mobile devices laptop and tablet, document icon with magnifying glass\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Find out how Proget streamlined the management of phones and tablets in the KAEM warehouse\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/proget-trademark-registration\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2026\/04\/trademark-1-90-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner trademark registration\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Proget officially registered as a trademark\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/the-mobile-workforce-and-mdm-time-to-focus-on-field-workers\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2026\/03\/seo-3-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner featuring employees: driver, paramedic, courier, construction worker, service technician\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    The mobile workforce and MDM \u2013 time to focus on field workers\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/roi-from-mdm-how-to-calculate-the-benefits-of-implementing-mobile-device-management\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2026\/03\/seo-2-90-proc-2_02-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"ROI from MDM: shield icon with text, costs, productivity gains, system gears\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    ROI from MDM \u2013 how to calculate the benefits of implementing Mobile Device Management\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/zero-trust-for-mobile-devices-role-of-the-mdm-system\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2026\/03\/seo-1_02-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"zero trust banner concept\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Zero Trust for mobile devices \u2013 role of the MDM system\n                  <\/h3>\n                <\/div>\n              <\/a>\n                      <\/div>\n              <\/aside>\n    <\/main>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>By October 17, 2024, organizations must implement the requirements of the EU&#8217;s NIS2 directive, which introduces several cyber security obligations. It also significantly expands the scope of regulated sectors and entities. What is NIS2? Find out if your business needs to adhere to it and how you can make it easier to comply with the new directive. What is the NIS2 directive and its purpose? NIS2 (Network and Information Security Directive 2) is a development of the 2016 NIS Directive, Europe&#8217;s first cybersecurity law. It was created in response to the need to adapt current regulations to the rapidly evolving landscape of cyber threats and increasingly sophisticated attacks. The goal of NIS2 is to achieve a high, standard level of cyber security across the European Union and to strengthen the protection of critical infrastructure and services vital to society and the economy.<\/p>\n","protected":false},"author":3,"featured_media":2683,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-1650","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-public-safety"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIS2: how to meet its cybersecurity requirements | Proget<\/title>\n<meta name=\"description\" content=\"NIS2: new cybersecurity related regulations. Learn about the directive&#039;s objectives and how you can meet them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives\" \/>\n<meta property=\"og:description\" content=\"NIS2: new cybersecurity related regulations. Learn about the directive&#039;s objectives and how you can meet them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Proget\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-11T08:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T13:16:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/NIS2_blog_banner_1351x296.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1351\" \/>\n\t<meta property=\"og:image:height\" content=\"296\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Agnieszka Pierlak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Agnieszka Pierlak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/\"},\"author\":{\"name\":\"Agnieszka Pierlak\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/person\\\/2511d4c9e540e5daf31b4f90bc874539\"},\"headline\":\"NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives\",\"datePublished\":\"2024-07-11T08:30:00+00:00\",\"dateModified\":\"2026-03-03T13:16:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/\"},\"wordCount\":1396,\"publisher\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/07\\\/NIS2_blog_banner_1351x296.webp\",\"articleSection\":[\"Public safety\"],\"inLanguage\":\"en-GB\",\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/\",\"name\":\"NIS2: how to meet its cybersecurity requirements | Proget\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/07\\\/NIS2_blog_banner_1351x296.webp\",\"datePublished\":\"2024-07-11T08:30:00+00:00\",\"dateModified\":\"2026-03-03T13:16:18+00:00\",\"description\":\"NIS2: new cybersecurity related regulations. Learn about the directive's objectives and how you can meet them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/07\\\/NIS2_blog_banner_1351x296.webp\",\"contentUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/07\\\/NIS2_blog_banner_1351x296.webp\",\"width\":1351,\"height\":296,\"caption\":\"banner with laptop and NIS2 logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/nis2-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Proget\",\"item\":\"https:\\\/\\\/proget.pl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Public safety\",\"item\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/category\\\/public-safety\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/\",\"name\":\"Proget\",\"description\":\"Enterprise Mobility Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/proget.pl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\",\"name\":\"Proget Sp. z o.o.\",\"alternateName\":\"Proget\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/04\\\/logo-space-white-1.svg\",\"contentUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/04\\\/logo-space-white-1.svg\",\"width\":1,\"height\":1,\"caption\":\"Proget Sp. z o.o.\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/proget-software\\\/\"],\"description\":\"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\\\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.\",\"legalName\":\"Proget Sp. z o.o.\",\"foundingDate\":\"2012-03-27\",\"taxID\":\"5472142508\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/person\\\/2511d4c9e540e5daf31b4f90bc874539\",\"name\":\"Agnieszka Pierlak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"caption\":\"Agnieszka Pierlak\"},\"description\":\"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/author\\\/apierlak\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIS2: how to meet its cybersecurity requirements | Proget","description":"NIS2: new cybersecurity related regulations. Learn about the directive's objectives and how you can meet them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/","og_locale":"en_GB","og_type":"article","og_title":"NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives","og_description":"NIS2: new cybersecurity related regulations. Learn about the directive's objectives and how you can meet them.","og_url":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/","og_site_name":"Proget","article_published_time":"2024-07-11T08:30:00+00:00","article_modified_time":"2026-03-03T13:16:18+00:00","og_image":[{"width":1351,"height":296,"url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/NIS2_blog_banner_1351x296.webp","type":"image\/webp"}],"author":"Agnieszka Pierlak","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Agnieszka Pierlak","Estimated reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/#article","isPartOf":{"@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/"},"author":{"name":"Agnieszka Pierlak","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539"},"headline":"NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives","datePublished":"2024-07-11T08:30:00+00:00","dateModified":"2026-03-03T13:16:18+00:00","mainEntityOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/"},"wordCount":1396,"publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/NIS2_blog_banner_1351x296.webp","articleSection":["Public safety"],"inLanguage":"en-GB","accessibilityFeature":["tableOfContents"]},{"@type":"WebPage","@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/","url":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/","name":"NIS2: how to meet its cybersecurity requirements | Proget","isPartOf":{"@id":"https:\/\/proget.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/#primaryimage"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/NIS2_blog_banner_1351x296.webp","datePublished":"2024-07-11T08:30:00+00:00","dateModified":"2026-03-03T13:16:18+00:00","description":"NIS2: new cybersecurity related regulations. Learn about the directive's objectives and how you can meet them.","breadcrumb":{"@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proget.pl\/en\/blog\/nis2-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/#primaryimage","url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/NIS2_blog_banner_1351x296.webp","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/07\/NIS2_blog_banner_1351x296.webp","width":1351,"height":296,"caption":"banner with laptop and NIS2 logo"},{"@type":"BreadcrumbList","@id":"https:\/\/proget.pl\/en\/blog\/nis2-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Proget","item":"https:\/\/proget.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Public safety","item":"https:\/\/proget.pl\/en\/blog\/category\/public-safety\/"},{"@type":"ListItem","position":3,"name":"NIS2 \u2013 new cybersecurity regulations and how to facilitate meeting their objectives"}]},{"@type":"WebSite","@id":"https:\/\/proget.pl\/en\/#website","url":"https:\/\/proget.pl\/en\/","name":"Proget","description":"Enterprise Mobility Management","publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proget.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/proget.pl\/en\/#organization","name":"Proget Sp. z o.o.","alternateName":"Proget","url":"https:\/\/proget.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","width":1,"height":1,"caption":"Proget Sp. z o.o."},"image":{"@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/proget-software\/"],"description":"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.","legalName":"Proget Sp. z o.o.","foundingDate":"2012-03-27","taxID":"5472142508"},{"@type":"Person","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539","name":"Agnieszka Pierlak","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","caption":"Agnieszka Pierlak"},"description":"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.","url":"https:\/\/proget.pl\/en\/blog\/author\/apierlak\/"}]}},"_links":{"self":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/comments?post=1650"}],"version-history":[{"count":10,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1650\/revisions"}],"predecessor-version":[{"id":2988,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1650\/revisions\/2988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media\/2683"}],"wp:attachment":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media?parent=1650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/categories?post=1650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/tags?post=1650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}