{"id":27653,"date":"2023-07-11T05:04:00","date_gmt":"2023-07-11T12:04:00","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=27653"},"modified":"2025-04-24T02:48:47","modified_gmt":"2025-04-24T09:48:47","slug":"nis2-compliance","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance","title":{"rendered":"NIS2 Directive Compliance Solutions"},"content":{"rendered":"\n\t\t<div  class=\"block-01547941-f1ab-4d43-ab55-566776a825b1 areoi-element vh-100 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-e71da01d-d616-4c2d-87df-f903681903eb areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e79be192-2ec0-4fa9-8b81-92fd81e6272a row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-206b522e-32bb-4c32-b0ca-de4866036850 col areoi-element d-flex flex-column align-items-center d-md-block align-self-center\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4 h1-new-design has-text-color has-link-color wp-elements-d1e9c9df8d42d8232e4794a6b5d78a49\" style=\"color:#fefefe\">NIS2 Compliance Solutions<\/h1>\n\n\n\n<p class=\"has-text-align-center text-22-16 mb-4 has-text-color has-link-color wp-elements-e004cd8fe6a3218abc50405ca6998eb3\" style=\"color:#ffffff;font-style:normal;font-weight:500\">Monitor insider activity. Manage access. Respond to incidents. ALL IN ONE.<\/p>\n\n\n\n\t\t<div  class=\"block-dcf22588-9050-4432-ab92-5384de738301 areoi-element new-design d-flex justify-content-center align-self-center  flex-wrap button-block\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-46b385e4-b508-40bb-bf24-8145d04615cc btn areoi-has-url position-relative hsBtn-demo btn-primary me-md-1 mb-1 mb-md-0 btn-primary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-95c4dab5-d4a1-476b-98f2-04ea6fbfee65 btn areoi-has-url position-relative btn btn-outline-light ms-md-4 mt-3 mt-md-0 btn-outline-light\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a29471be-bfd4-4f3a-95e0-a00e94bf6bec areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(246, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-ca9cfd92-e1d5-4398-b497-8ae35583947e areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f592af52-cea6-4845-a208-f7df2fb6945b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-760e7804-5345-46e6-abaf-315560596cc6 col areoi-element with-link align-self-center align-self-md-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"text-22-18 p-poppins with-link\" style=\"font-style:normal;font-weight:500\">What is NIS2? <a href=\"https:\/\/www.nis-2-directive.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Directive (EU) 2022\/2555<\/a>, or NIS2, aims to enhance the overall level of cybersecurity within the European Union (EU) and ensure the resilience of networks and information systems of critical entities operating in the EU.<\/p>\n\n\n\n<p class=\"text-22-18 pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">Syteca helps you achieve compliance with the NIS2 Directive by leveraging comprehensive insider risk management and other cybersecurity capabilities.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e0808569-f96f-4625-a8dc-7cad19e2f988 col areoi-element d-none d-sm-none d-md-none d-lg-none d-xl-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full text-xxl-end\"><img decoding=\"async\" width=\"939\" height=\"632\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072510\/pic-What-is-NIS2.png\" alt=\"\" class=\"wp-image-54509\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072510\/pic-What-is-NIS2.png 939w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072510\/pic-What-is-NIS2-300x202.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072510\/pic-What-is-NIS2-768x517.png 768w\" sizes=\"(max-width: 939px) 100vw, 939px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f6a69794-b086-4595-8ade-68347bd3e82e areoi-element container-xl\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c426daa1-cac4-4cd6-a17f-681c83c4b356 areoi-element d-flex align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"44\" height=\"51\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04023858\/Poligon.svg\" alt=\"\" class=\"wp-image-50211\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading h3-new-design mb-0 ps-2 ms-1 ms-md-0 ps-md-4\">What is NIS2 compliance?<\/h3>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"container px-xl-0 text-20-16 with-link\" style=\"font-style:normal;font-weight:500\">NIS2 compliance refers to adherence to the <a href=\"https:\/\/www.nis-2-directive.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Network and Information Security (NIS) Directive 2<\/a>, a cybersecurity directive adopted by the European Union (EU) in December 2022.<\/p>\n\n\n\n<p class=\"container px-xl-0 text-20-16\" style=\"font-style:normal;font-weight:500\">NIS2 updated and replaced the original NIS Directive of 2016 to address evolving cyber threats and ensure a higher level of cybersecurity across critical sectors in the EU. The new directive covers more sectors, establishes stricter cybersecurity and incident reporting requirements, and imposes higher penalties for non-compliance.<\/p>\n\n\n\n\t\t<div  class=\"block-704bca4c-6358-4233-9a39-da73c4b33aae areoi-element container px-xl-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-61e65853-2f93-4cc3-8524-1aab90c9b4ec areoi-element container rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-528d5488-0692-4b46-9511-30b1e05423d6 row areoi-element align-items-center\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c12185e5-9a7b-464e-8fd7-6bb7ad4d0aae col areoi-element px-xl-0 col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n<h4 class=\"wp-block-heading text-start mb-5 mb-xl-0 has-white-color has-text-color\" style=\"font-size:1.75rem\">Benefits of using Syteca for NIS2 compliance<\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4ccb3351-28d2-47d5-86f8-f8a4ef551bfd col areoi-element d-flex flex-wrap ps-xl-5 col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf2d269d-fd0e-4107-a451-2a0541a483e7 areoi-element d-flex align-items-center pb-4 ps-xl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 text-18-15 has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Enhance organizational security<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0c96961-4794-4587-8e06-d1f7abf207ff areoi-element d-flex align-items-center pb-4 ps-xl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 text-18-15 has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Detect insider threats<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d8b09e86-fa2e-48f8-b795-df3db13ac973 areoi-element d-flex align-items-center pb-4 pb-md-0 ps-xl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 text-18-15 has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Avoid fines and lawsuits<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-40018c16-879d-4abc-87c7-64e5f49e290f col areoi-element d-flex flex-wrap col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf2d269d-fd0e-4107-a451-2a0541a483e7 areoi-element d-flex align-items-center pb-4 ps-xl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 text-18-15 has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Promptly respond to incidents<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0c96961-4794-4587-8e06-d1f7abf207ff areoi-element d-flex align-items-center pb-4 ps-xl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 text-18-15 has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Prevent data breaches<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d8b09e86-fa2e-48f8-b795-df3db13ac973 areoi-element d-flex align-items-center ps-xl-3\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 text-18-15 has-white-color has-text-color\" style=\"font-style:normal;font-weight:500\">Secure access to sensitive data<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-23c4a979-a29f-4f93-a081-17fab227ca5d areoi-element container section-4 px-xl-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ed76e28a-30ff-4b7f-a94e-13f4d2ab0994 areoi-element d-flex align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"44\" height=\"51\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04023858\/Poligon.svg\" alt=\"\" class=\"wp-image-50211\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading h3-new-design mb-0 ps-2 ms-1 ms-md-0 ps-md-4\">Who does NIS2 apply to?<\/h3>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"with-link container px-xl-0 text-20-16\" style=\"font-style:normal;font-weight:500\">NIS2 applies to <a href=\"https:\/\/www.nis-2-directive.com\/NIS_2_Directive_Article_3.html\" target=\"_blank\" rel=\"noreferrer noopener\">essential and important<\/a> entities providing services in the European Union. Even if your organization isn\u2019t physically located in the EU, it may be subject to NIS2 if it provides services within any EU Member State.<\/p>\n\n\n\n<p class=\"with-link container px-xl-0 text-20-16 mb-0\" style=\"font-style:normal;font-weight:500\">According to <a href=\"https:\/\/www.nis-2-directive.com\/NIS_2_Directive_Article_2.html\" target=\"_blank\" rel=\"noreferrer noopener\">Article 2<\/a>, NIS2 applies to all medium-sized enterprises or larger entities in sectors referred to in <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022L2555&amp;qid=1685461642597\" target=\"_blank\" rel=\"noreferrer noopener\">Annexes I and II<\/a> to the directive:<\/p>\n\n\n\n\t\t<div  class=\"block-e3321373-33d1-4b52-a883-75ac409a66d5 areoi-element container rounded-bg-12px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(246, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center text-28-22 mb-0 p-poppins\" style=\"font-style:normal;font-weight:600\">Sectors of high criticality (NIS2 Annex I)<\/p>\n\n\n\n\t\t<div  class=\"block-4efba7d9-3336-4320-b6ef-bdcc8bd82be8 row areoi-element justify-content-center row-cols-2 row-cols-md-4 row-cols-xl-5\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-232b13df-b986-435c-89fb-217591bd2f3f areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24233812\/energy.svg\" alt=\"\" class=\"wp-image-54567\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Energy<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e4534a7-2b7d-4b33-8050-19499b2addf9 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235038\/transport.svg\" alt=\"\" class=\"wp-image-54576\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Transport<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e8e286b6-5645-49bb-8e4c-8250052a3059 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235105\/cost.svg\" alt=\"\" class=\"wp-image-54584\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Banking<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e65c795-6e3c-49c4-bedb-0ac27acd0f49 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235120\/healthcare.svg\" alt=\"\" class=\"wp-image-54591\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Health<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ce0bb48-bce9-46df-ad4e-1411f0ceb859 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235134\/water.svg\" alt=\"\" class=\"wp-image-54598\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Drinking and waste water<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3 mb-xl-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-aa8fe8b7-0b44-4a9d-969b-2e3a2683de2d areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235150\/space.svg\" alt=\"\" class=\"wp-image-54605\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Space<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-482480be-774d-4af2-8a1d-2599941af0c3 col areoi-element mb-3 mb-xl-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e4534a7-2b7d-4b33-8050-19499b2addf9 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235204\/digital-infrastructure.svg\" alt=\"\" class=\"wp-image-54612\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Digital infrastructure<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ebfc7c0-8fb5-4a93-8223-6aa04e0a0563 col areoi-element mb-3 mb-xl-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e8e286b6-5645-49bb-8e4c-8250052a3059 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235222\/financial-market-infrastructures.svg\" alt=\"\" class=\"wp-image-54619\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Financial market infrastructures<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ac58be7-3509-4ba2-9a3a-098c96a3ccd9 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e65c795-6e3c-49c4-bedb-0ac27acd0f49 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235230\/ICT-service-management-B2B.svg\" alt=\"\" class=\"wp-image-54626\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">&nbsp;ICT service management (B2B)<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-14fc0294-6be0-4468-b2bc-d22abd8f9f1d col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ce0bb48-bce9-46df-ad4e-1411f0ceb859 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24235251\/public-administration.svg\" alt=\"\" class=\"wp-image-54633\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Public administration<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-dd75bc39-5ba2-4a6c-bf18-720402d6e7f1 areoi-element container rounded-bg-12px section-4-3\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(19, 60, 149,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center text-28-22 mb-0 p-poppins\" style=\"font-style:normal;font-weight:600\">Sectors of high criticality (NIS2 Annex I)<\/p>\n\n\n\n\t\t<div  class=\"block-3f6b3aa1-9d5c-430b-a2a3-7cf72422fade row areoi-element justify-content-center row-cols-2 row-cols-md-4\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3 offset-xl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-232b13df-b986-435c-89fb-217591bd2f3f areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25002224\/postal-and-courier-services.svg\" alt=\"\" class=\"wp-image-54645\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Postal and courier services<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3 offset-xl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e4534a7-2b7d-4b33-8050-19499b2addf9 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25002232\/chemical-industry.svg\" alt=\"\" class=\"wp-image-54652\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Chemical industry<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3 offset-xl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e8e286b6-5645-49bb-8e4c-8250052a3059 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25002241\/waste-management.svg\" alt=\"\" class=\"wp-image-54659\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Waste management<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3 offset-xl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e65c795-6e3c-49c4-bedb-0ac27acd0f49 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"48\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25002249\/digital-providers.svg\" alt=\"\" class=\"wp-image-54666\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Digital providers<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3 offset-xl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ce0bb48-bce9-46df-ad4e-1411f0ceb859 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25002300\/manufacturing.svg\" alt=\"\" class=\"wp-image-54673\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Manufacturing<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-09df3be3-0b70-448b-9993-e7d6d1d52500 col areoi-element mb-3 mb-xl-0 offset-xl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-aa8fe8b7-0b44-4a9d-969b-2e3a2683de2d areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25002308\/food.svg\" alt=\"\" class=\"wp-image-54680\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">&nbsp;Food industry<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-482480be-774d-4af2-8a1d-2599941af0c3 col areoi-element mb-3 mb-xl-0 offset-xl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e4534a7-2b7d-4b33-8050-19499b2addf9 areoi-element justify-content-around equalize-height d-flex flex-column align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"49\" height=\"48\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25002315\/research.svg\" alt=\"\" class=\"wp-image-54687\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center mb-0 p-poppins\" style=\"font-size:0.88rem;font-style:normal;font-weight:500\">Research<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<p class=\"with-link container text-20-16 has-text-color has-link-color wp-elements-b849af317d62427566075095114a0187\" style=\"color:#5d6e92;font-style:italic;font-weight:500\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#3A62F2\" class=\"has-inline-color\">Note:<\/mark> For detailed information about the sectors and organizations affected by NIS2, see <a href=\"https:\/\/www.nis-2-directive.com\/NIS_2_Directive_Article_2.html\" target=\"_blank\" rel=\"noreferrer noopener\">Article 2<\/a> of the Directive and <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022L2555&amp;qid=1685461642597\" target=\"_blank\" rel=\"noreferrer noopener\">Annexes I and II<\/a>.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-95c87def-0ed9-4306-a9bb-a67454507777 areoi-element container px-xl-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-eb2b02bb-52b7-4ebf-b07d-f61cd88d9895 areoi-element d-flex align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"44\" height=\"51\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04023858\/Poligon.svg\" alt=\"\" class=\"wp-image-50211\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading h3-new-design mb-0 ps-2 ms-1 ms-md-0 ps-md-4\">What are NIS2 security requirements?<\/h3>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"with-link container px-xl-0 mb-0 text-20-16\" style=\"font-style:normal;font-weight:500\"><a href=\"https:\/\/www.nis-2-directive.com\/NIS_2_Directive_Article_21.html\" target=\"_blank\" rel=\"noreferrer noopener\">Article 21<\/a> outlines the main NIS2 requirements. Most of them focus on taking appropriate measures to ensure organizational security.<\/p>\n\n\n\n\t\t<div  class=\"block-00311d26-c112-4ded-a8bb-ac33f55052df areoi-element container rounded-bg-20px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(246, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mb-3\"><img decoding=\"async\" width=\"45\" height=\"33\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/07055744\/quotes.svg\" alt=\"\" class=\"wp-image-46749\"\/><\/figure>\n\n\n\n<p class=\"text-20-18 p-poppins pt-3\" style=\"font-style:normal;font-weight:500\">\u201cMember States shall ensure that essential and important entities take appropriate and proportionate technical, operational and organisational measures to manage the risks posed to the security of network and information systems which those entities use for their operations or for the provision of their services, and to prevent or minimise the impact of incidents on recipients of their services and on other services.\u201d<\/p>\n\n\n\n<p class=\"has-text-align-right text-20-18 mb-0 p-poppins pt-3\" style=\"font-style:normal;font-weight:600\">NIS2 Directive, Article 21<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-872a884a-4956-4a95-abb1-a89b23ca3716 areoi-element container rounded-bg-12px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(19, 60, 149,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center text-28-22 mb-0 p-poppins\" style=\"font-style:normal;font-weight:600\">Security measures required by NIS2<\/p>\n\n\n\n\t\t<div  class=\"block-d4e22512-5c2f-4a65-a995-c669b6b124b8 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-25e5013b-9226-49c2-beea-a3ff94725871 col areoi-element mb-3 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a52116a8-af3c-49d9-8d20-d8c84d4a0d68 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 me-2 has-text-color has-link-color wp-elements-508d842c81b862baa6df7f989cbe7801\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">01<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Risk analysis and information system security<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-25e5013b-9226-49c2-beea-a3ff94725871 col areoi-element mb-3 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf7cef48-60fb-4fe3-bf79-69c1895e1ee6 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 has-text-color has-link-color wp-elements-67741b60010b3ac67a29d1857dca998f\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">02<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Incident handling and reporting<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-25e5013b-9226-49c2-beea-a3ff94725871 col areoi-element mb-3 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-29af0dab-b9ba-458b-a23a-1daa6ad21de1 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 has-text-color has-link-color wp-elements-b09b5e2f6183431702f51c4bc0f62ede\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">03<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Business continuity<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-25e5013b-9226-49c2-beea-a3ff94725871 col areoi-element mb-3 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2a13bc6e-5a4f-4683-bf98-022eba8bd8f5 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 has-text-color has-link-color wp-elements-7361000a0aed283cc84f75d0d4c44219\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">04<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Assessment of the effectiveness of cybersecurity risk management measures<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-25e5013b-9226-49c2-beea-a3ff94725871 col areoi-element mb-3 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0ea94f1c-bc69-48d5-86e1-d89ca326c8a1 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 has-text-color has-link-color wp-elements-9d4d8151153e01e04541d97a1c5f4e14\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">05<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Supply chain security<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-91e5901a-f053-46d9-a5f8-8018dd3ff732 col areoi-element mb-3 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-25e5013b-9226-49c2-beea-a3ff94725871 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 has-text-color has-link-color wp-elements-d3ee7d06688f4896af019322cdf31856\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">06<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Security in network and information systems acquisition, development, and maintenance<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a518ce9c-eede-480a-b19d-500baa2c5570 col areoi-element mb-3 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf7cef48-60fb-4fe3-bf79-69c1895e1ee6 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 has-text-color has-link-color wp-elements-874abb2e9a4cdb8c58a4115a23547d16\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">07<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Basic cyber hygiene practices and cybersecurity training<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ae25bf54-bd2b-474b-94cb-bced4fcd30fa col areoi-element mb-3 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-29af0dab-b9ba-458b-a23a-1daa6ad21de1 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 has-text-color has-link-color wp-elements-46176dd865dd4f4464a83add08e570e4\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">08<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Policies and procedures regarding the use of cryptography and encryption<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-91675ca0-d7ca-4537-ada9-f31aadc853e1 col areoi-element mb-3 mb-xl-0 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2a13bc6e-5a4f-4683-bf98-022eba8bd8f5 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 has-text-color has-link-color wp-elements-42b1817c9c049b128caf9d3bf0ef4ce8\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">09<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Use of multi-factor authentication or continuous authentication solutions<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-27f690af-656a-4b77-bafa-18dbf27af92e col areoi-element mb-3 mb-md-0 col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0ea94f1c-bc69-48d5-86e1-d89ca326c8a1 areoi-element rounded-bg-13px equalize-height p-3 p-md-4 d-flex align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 me-2 has-text-color has-link-color wp-elements-9d570e87fbb0443772cd502c1ae02b40\" style=\"color:#3a62f2;font-size:2.63rem;font-style:normal;font-weight:600\">10<\/p>\n\n\n\n<p class=\"text-18-15 mb-0 ms-3 ms-md-4 p-poppins\" style=\"font-style:normal;font-weight:500\">Human resources security, access control policies, and asset management<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<p class=\"text-20-16 container\" style=\"font-style:normal;font-weight:500\">Each EU Member State transposes the NIS2 Directive into its own laws in different ways. Although these laws may vary across Member States, they all codify NIS2 cybersecurity requirements. Syteca can help you meet these requirements.<\/p>\n\n\n\n<p class=\"text-20-16 mb-0 container\" style=\"font-style:normal;font-weight:500\">As of early 2025, only a few Member States have successfully met the deadline (October 2024), while the rest faced significant delays \u2014 meaning you still might have time to prepare if you haven\u2019t already done so.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-de98567d-c602-4bc6-951b-420b766bcf65 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(246, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4ee52c99-1004-4baa-b69e-e51a683fe7bd areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center h3-new-design pb-2 pb-md-0 mb-4\">Comply with NIS2 using Syteca<\/h3>\n\n\n\n<p class=\"has-text-align-center with-link text-20-16 mb-0\" style=\"font-style:normal;font-weight:500\">Syteca is a comprehensive cybersecurity platform that helps you enhance your organization\u2019s resilience to cybersecurity incidents. Syteca\u2019s extensive user activity monitoring, access management, incident response, auditing and reporting, and other cybersecurity capabilities can help you cover key NIS2 compliance requirements. Here\u2019s how:<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"has-text-align-center text-28-22 mb-0 p-poppins\" style=\"font-style:normal;font-weight:600\">Meeting NIS2 requirements with Syteca<\/p>\n\n\n\n\t\t<div  class=\"block-9f139e62-ccf4-4c21-8990-4055d19a71d8 areoi-element container table-block-5\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e773ef5b-1b21-4cb1-bb1d-0ac06ac54fc7 row areoi-element d-none d-sm-none d-md-none d-lg-none d-xl-flex\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-937df5dd-5e4a-440c-a9bd-5688505992a6 col areoi-element px-4 py-3 col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b22b08f5-6d20-4371-81c4-933f64b7cb03 col areoi-element px-4 py-3 col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bc6dd2fd-5c8c-4799-b263-3a3376429569 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-12fd98cf-6e1b-4b78-add6-8ced43c542fe col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bbb428ac-99a9-4497-b63a-146d5a700f2f col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Risk analysis and information system security<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5d12db8b-09cf-482f-b2fd-558a30698b1a col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-01c2e14a-96d8-4f40-a6f3-742ebedbb1b6 col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\">Manage cybersecurity risks with Syteca\u2019s <a href=\"\/en\/solutions\/preventing-insider-threat\" target=\"_blank\" rel=\"noreferrer noopener\">insider threat management<\/a> capabilities.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Enhance visibility and eliminate blind spots with continuous <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">user activity monitoring<\/a> and <a href=\"\/en\/product\/privileged-account-discovery\" target=\"_blank\" rel=\"noreferrer noopener\">privileged account discovery<\/a>.<\/li>\n\n\n\n<li class=\"mb-3 with-link\"><a href=\"\/en\/product\/privileged-account-discovery\" target=\"_blank\" rel=\"noreferrer noopener\">Detect unmanaged privileged accounts<\/a> to eliminate blind spots.<\/li>\n\n\n\n<li class=\"with-link\">Enforce access control policies, granularly <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">manage user access<\/a>, and <a href=\"\/en\/solutions\/privileged-user-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">monitor privileged user<\/a> activity.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bc6dd2fd-5c8c-4799-b263-3a3376429569 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-85380eb0-11bf-417c-b324-4e32d16b8b4f col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-91bbf01c-2567-4ec3-9912-59b9d1925ed2 col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(243, 245, 249,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Incident handling and reporting<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f7aae902-0cfd-4844-b133-9d12686dbea4 col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5855a2d5-1c0e-43e8-9ccd-6ccb285ae53b col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(243, 245, 249,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\">Manage threats in real time by <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">promptly identifying and responding<\/a> to security incidents.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Review detailed <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">user session recordings<\/a> to reconstruct the chain of events.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Provide authorities with a comprehensive audit trail with Syteca\u2019s <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">reporting<\/a> functionality.<\/li>\n\n\n\n<li class=\"with-link\">Export cybersecurity evidence for <a href=\"\/en\/solutions\/investigate-security-incidents\" target=\"_blank\" rel=\"noreferrer noopener\">forensic investigation<\/a>.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4ea0738d-a2ff-4b97-a35c-f6a0f3a26a1f row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-da21bc59-d6af-4465-b531-f48f88e5a1be col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bbb428ac-99a9-4497-b63a-146d5a700f2f col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Business continuity<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ffbab4b9-184d-4d95-b588-6c7fdddef05d col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-009f1a13-5c06-439f-8c8f-773b1e0c0e5f col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\">Promptly detect security events that could potentially lead to a crisis with the help of <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">real-time user activity alerts<\/a>.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Use <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">session recordings and user activity logs<\/a> to assess the impact on systems and data and to develop recovery plans and procedures.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Reduce the risk of unauthorized activity that may disrupt business operations by getting hold of <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">access privileges<\/a> in your IT infrastructure.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Facilitate communication by providing accurate and <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">detailed information<\/a> about a crisis and its impact.<\/li>\n\n\n\n<li class=\"with-link\">Restore your organization\u2019s audit trail and continue monitoring and recording user activity in case of server failure with Syteca\u2019s <a href=\"https:\/\/docs.syteca.com\/view\/high-availability\" target=\"_blank\" rel=\"noreferrer noopener\">High Availability<\/a> and <a href=\"https:\/\/docs.syteca.com\/view\/disaster-recovery\" target=\"_blank\" rel=\"noreferrer noopener\">Disaster Recovery<\/a> modes.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-80881cf9-004a-4f22-8e7f-d93bfad763c9 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-85380eb0-11bf-417c-b324-4e32d16b8b4f col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-91bbf01c-2567-4ec3-9912-59b9d1925ed2 col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(243, 245, 249,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Assessment of the effectiveness of cybersecurity risk management measures<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f7aae902-0cfd-4844-b133-9d12686dbea4 col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5855a2d5-1c0e-43e8-9ccd-6ccb285ae53b col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(243, 245, 249,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\">Use an <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">audit trail<\/a> generated by Syteca to assess how cybersecurity measures work in your organization.<\/li>\n\n\n\n<li class=\"with-link\"><a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor how your employees<\/a> and other users stick to data security policies and other cybersecurity rules in your organization.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9a4a23c6-0d4f-4ae3-9c4e-2f7e8c7899ad row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-1754fc13-ed98-43d4-b6fb-1372e747125b col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-84d8c3f8-8fba-4f83-9dff-af94aa132b9d col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Supply chain security<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7b596353-f96e-449b-90ae-ee9a400b484c col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-fdf4949d-ee0f-4604-acdb-b1da37763d83 col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\"><a href=\"\/en\/solutions\/third-party-vendor-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor the activity of third-party vendors<\/a>, partners, and other supply chain entities accessing your infrastructure.<\/li>\n\n\n\n<li class=\"mb-3 with-link\"><a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">Verify and manage the identities<\/a> of supply chain members accessing your infrastructure.<\/li>\n\n\n\n<li class=\"mb-3 with-link\"><a href=\"\/en\/product\/supported-platforms\/windows-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Secure RDP connections<\/a> to your environment and detect unauthorized data access, data exfiltration, or any remote user behavior indicating a potential insider threat.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Protect access to sensitive data and critical systems by providing third-party vendors with <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">one-time passwords<\/a> and limiting their user session time in your IT infrastructure.<\/li>\n\n\n\n<li>Enhance the security of your supply chain by installing Syteca on your third-party vendors\u2019 endpoints.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-89d20cf6-1fa8-49ab-ab86-a8845d7e788d row areoi-element last-row\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-960e9b41-10e6-4997-bffc-2188ac09f025 col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c1fc4807-2b77-4a24-b4e5-5e68beeb6771 col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(243, 245, 249,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Basic cyber hygiene practices and cybersecurity training<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-39bea308-adbd-462b-a450-eae0e4ff077b col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f210cb3b-22b4-410c-9974-8b2475fe3e5e col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(243, 245, 249,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\">Get visibility into user actions and behaviors to identify and address any lapses in basic cyber hygiene practices and detect policy violations.<\/li>\n\n\n\n<li class=\"mb-3 with-link\"><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor user actions<\/a> during penetration testing to provide targeted feedback to users and promote adherence to cybersecurity best practices.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Use recorded user sessions to develop materials and case studies for cybersecurity awareness training initiatives.<\/li>\n\n\n\n<li>Nurture users\u2019 cybersecurity habits by displaying warning messages in response to forbidden actions.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f13d46e7-5c27-4cb3-9beb-97c6c10d222d row areoi-element hidden-row\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c384aa6d-e60d-4f91-b3a7-b58d0468877f col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-efe23bb4-9ce2-4287-9561-a939ce29c434 col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Policies and procedures regarding the use of cryptography and encryption<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1b9dfc0a-4035-449f-b5eb-4d50b19e865f col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5db838bc-45e4-4458-a4ea-fac1fc936912 col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\">Leverage Syteca\u2019s <a href=\"https:\/\/docs.syteca.com\/view\/ekran-system-encryption?_gl=1*t247tp*_gcl_au*MzU3MzkwMzc2LjE3MzczNzQ1OTIuMjA4ODc1MjY0MS4xNzM5MTk0NzQ0LjE3MzkxOTg3NDk.*_ga*OTU4MTUzMjU5LjE3Mjk1OTQ1ODk.*_ga_3SYH6XSJXQ*MTc0Mjg4NDQ1OC4xNDguMS4xNzQyODg5OTc3LjYwLjAuMA..\" target=\"_blank\" rel=\"noreferrer noopener\">encryption<\/a> of user activity monitoring data, connections, and other sensitive records.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Secure your organization\u2019s <a href=\"\/en\/product\/workforce-password-management\" target=\"_blank\" rel=\"noreferrer noopener\">passwords<\/a> and user secrets using SHA-256 and AES-256 algorithms.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Encrypt your exported user session data using RSA-1024 to prevent any changes in cybersecurity evidence.<\/li>\n\n\n\n<li class=\"with-link\">Apply FIPS 140-2 certified encryption of all usernames and aliases with Syteca\u2019s <a href=\"\/en\/user-privacy\" target=\"_blank\" rel=\"noreferrer noopener\">data anonymization<\/a> feature.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1dc7a57d-43b1-4faa-ab79-1b29f6cf6951 row areoi-element hidden-row\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-773e0851-db23-47df-b933-8ec697eac117 col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1a0d3582-8b15-4a79-95f8-58282c37c7fe col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(243, 245, 249,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Use of multi-factor authentication and communication solutions<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c479ee57-9086-43f3-8bc9-f833d195a5e2 col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-30253b80-7c0d-44ef-a539-b63dbc6debfc col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(243, 245, 249,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\">Mitigate the risk of unauthorized access and account compromise with the help of <a href=\"\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a>.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Use Syteca\u2019s <a href=\"\/en\/product\/workforce-password-management\" target=\"_blank\" rel=\"noreferrer noopener\">password<\/a> and <a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">identity management<\/a> capabilities to establish a secure access request and approval workflow and enhance authentication procedures in your organization.<\/li>\n\n\n\n<li class=\"with-link\">Integrate Syteca with Active Directory and ticketing systems.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9f742154-d309-459c-bf9e-d6eb5770b8c1 row areoi-element hidden-row last-row\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-a529ab0b-5a92-4fc8-981c-3b5f7d1adeff col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-b60ae9135aca2e79d778507ae2af22a5\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Security measure required by NIS2<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c66bbf6d-8201-488c-8969-688f917ac8c8 col areoi-element p-4 d-flex flex-column justify-content-center col-12 col-xl-4\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Human resources security, access control policies, and asset management<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e0466a42-5524-4487-9940-da0c74699e85 col areoi-element px-4 py-3 col-12 d-xl-none d-xxl-none\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 text-22-18 p-poppins has-text-color has-link-color wp-elements-1c234b35651af042d146f63b26f6d87f\" style=\"color:#ffffff;font-style:normal;font-weight:600\">Corresponding Syteca functionality<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7fefb4eb-2013-4fec-a8e3-8ee6d503c1ac col areoi-element p-4 d-flex align-items-center col-12 col-xl-8\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"mb-3 with-link\">Ensure human resources security by <a href=\"\/en\/solutions\/investigate-security-incidents\" target=\"_blank\" rel=\"noreferrer noopener\">detecting and investigating<\/a> any unauthorized or suspicious activities carried out by employees.<\/li>\n\n\n\n<li class=\"mb-3 with-link\">Control access to sensitive assets and implement the principle of least privilege with Syteca\u2019s <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">privileged access management<\/a> functionality.<\/li>\n\n\n\n<li class=\"with-link\">Capture users\u2019 interactions with critical assets and systems to ensure asset tracking, accountability, and protection.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7157cbe0-a59c-4c51-9f5e-b30997ab8a57 areoi-element new-design d-flex justify-content-center align-self-center  flex-wrap button-block\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-2b4de946-123e-48df-8d1c-72b82212af45 btn areoi-has-url position-relative load-row btn-outline-secondary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tLoad more \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a77e8eae-3c11-413f-a799-801ce1c609da areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-11b6e401-6951-4d0e-b884-830193dcc8b7 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9f6c2f8a-0f3b-4f68-b76a-c8230e238439 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center h3-new-design\">Meet other IT security requirements with Syteca<\/h3>\n\n\n\n\t\t<div  class=\"block-ce59ecde-e09c-4dc0-8772-a2845b211ce1 row areoi-element standard-set\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b5b19f3a-8089-430d-b8df-57779e2561cb col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b76cc725-7c87-49f5-8142-351b878979d7 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100 \"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a6bed40c-b544-464a-a83b-b3204282f7cf col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a124878b-4ffa-4003-b4cc-a0b614be59c9 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/pci-dss-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">PCI DSS<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-33613801-d2d1-48a5-a170-d3cd136178ca col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8add58f2-3e03-40bd-825b-92e94567f5f8 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SWIFT CSP<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e43326f9-047f-494e-af2d-695055055472 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e7b7441d-517e-4d22-8c31-5939b6b7cf14 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/sox-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOX<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ed3edea-864d-4cd9-8204-0f39f65ea416 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2c0dd273-60c2-48b0-a1d1-0d5bf595e4f0 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/fisma-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">FISMA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f5c71927-e795-4fc7-b5d8-1336d19fefb0 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-71978f43-04dc-4ab3-83ed-a8c22cca778e areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f3b08ab4-5a59-4633-af80-1f6ede1c1bf6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c6aee13f-6acd-496a-b450-3c7793846e59 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-53<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af56e4f7-5aa8-4e97-9e7f-1110ff8c81d6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d277acf6-c0e8-4906-b4b8-9eeb22640812 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-800-171-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-171<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6c49f66f-789d-4a8e-a47d-f2eef32621f7 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-988ff469-99a6-48bb-a06c-749de2e59159 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nerc-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NERC<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/glba-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GLBA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a class=\"pe-5\" href=\"\/en\/solutions\/meeting-compliance-requirements\/nispom-change-2-and-h-r-act-666\" target=\"_blank\" rel=\"noreferrer noopener\">NISPOM Change 2 and H.R. 666<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/soc-2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/hipaa-compliance-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">DORA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-aebe6149-4148-4821-bd0d-2489c73c861b areoi-element text-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(58, 98, 242,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center text-54-42-36 p-poppins mb-5 has-text-color has-link-color wp-elements-66824428a1ed7e8a60f0320df4b9c6ff\" style=\"color:#ffffff;font-style:normal;font-weight:500\">Let&#8217;s get the conversation started<\/p>\n\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-d8cb5977-f678-4c09-a8e7-3bd1231eaa59 btn areoi-has-url position-relative btn btn-primary mx-auto mb-0 btn-primary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8ccf32fe-40ad-49ef-af33-63d5b9ca3d9f areoi-element new-design overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center h3-new-design has-text-color has-link-color wp-elements-4fa0ea0fdd1c391420782666e3e052af\" style=\"color:#ffffff\">Blog spotlight<\/h3>\n\n\n\n<div class=\"container posts-slider\">\n\t\t\t<div class=\"row blog-slider\">\n\t\t\t\n\n<article id=\"post-44549\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"800\" height=\"251\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora-1024x321.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora-1024x321.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora-300x94.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora-768x240.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora-1536x481.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/07\/03015745\/banner-five-pillars-of-dora.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<div class=\"d-flex justify-content-between align-items-center mb-3\"><span class=\"date\">July 03, 2024<\/span><a href=\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\" target=\"_blank\" class=\"category-label\">Industry Compliance<\/a><\/div>\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/digital-operational-resilience-act-compliance\" class=\"d-block p-poppins hoverable\" title=\"Permalink to The 5 Fundamental Pillars of the Digital Operational Resilience Act (DORA)\" target=\"_blank\">The 5 Fundamental Pillars of the Digital Operational Resilience Act (DORA) <\/a>\n\t\t\t<\/h3>\t\t\t\n\t\t\t<div class=\"post-excerpt mt-auto pt-4\">Nowadays, financial organizations rely heavily on information and communication technology (ICT) to support remote operations. While ICT enhances operational efficiency and customer experience, it significantly<\/div>\t\t<!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-44549 -->\n\n\n<article id=\"post-36452\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/best-practices-for-nis2-compliance\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"800\" height=\"250\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-1024x320.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-1024x320.jpg 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-300x94.jpg 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-768x240.jpg 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-1536x480.jpg 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance.jpg 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<div class=\"d-flex justify-content-between align-items-center mb-3\"><span class=\"date\">March 05, 2025<\/span><a href=\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\" target=\"_blank\" class=\"category-label\">Industry Compliance<\/a><\/div>\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/best-practices-for-nis2-compliance\" class=\"d-block p-poppins hoverable\" title=\"Permalink to 5 Best Practices to Prepare for NIS2 Compliance\" target=\"_blank\">5 Best Practices to Prepare for NIS2 Compliance <\/a>\n\t\t\t<\/h3>\t\t\t\n\t\t\t<div class=\"post-excerpt mt-auto pt-4\">Organizations must always be aware of the constantly changing compliance landscape to protect their sensitive assets and avoid paying millions in fines. The rapid development<\/div>\t\t<!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-36452 -->\n\n\n<article id=\"post-14100\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/how-to-prepare-for-gdpr\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"638\" height=\"218\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article-gdpr-checklist_0.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article-gdpr-checklist_0.jpg 638w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article-gdpr-checklist_0-300x103.jpg 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<div class=\"d-flex justify-content-between align-items-center mb-3\"><span class=\"date\">April 14, 2023<\/span><a href=\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\" target=\"_blank\" class=\"category-label\">Industry Compliance<\/a><\/div>\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/how-to-prepare-for-gdpr\" class=\"d-block p-poppins hoverable\" title=\"Permalink to 10 Steps to Pain-Free GDPR Compliance\" target=\"_blank\">10 Steps to Pain-Free GDPR Compliance <\/a>\n\t\t\t<\/h3>\t\t\t\n\t\t\t<div class=\"post-excerpt mt-auto pt-4\">The General Data Protection Regulation (GDPR) is often considered the strictest regulation in the world for securing users\u2019 personal data, with fines for non-compliance reaching<\/div>\t\t<!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-14100 -->\n\n\n<article id=\"post-14101\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/data-protection-compliance-insurance-industry\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"800\" height=\"250\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/04\/17025807\/banner-Data-Protection-in-Insurance-1024x320.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/04\/17025807\/banner-Data-Protection-in-Insurance-1024x320.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/04\/17025807\/banner-Data-Protection-in-Insurance-300x94.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/04\/17025807\/banner-Data-Protection-in-Insurance-768x240.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/04\/17025807\/banner-Data-Protection-in-Insurance-1536x480.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/04\/17025807\/banner-Data-Protection-in-Insurance.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<div class=\"d-flex justify-content-between align-items-center mb-3\"><span class=\"date\">October 17, 2024<\/span><a href=\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\" target=\"_blank\" class=\"category-label\">Industry Compliance<\/a><\/div>\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/data-protection-compliance-insurance-industry\" class=\"d-block p-poppins hoverable\" title=\"Permalink to Data Protection and Regulatory Compliance in the Insurance Industry\" target=\"_blank\">Data Protection and Regulatory Compliance in the Insurance Industry <\/a>\n\t\t\t<\/h3>\t\t\t\n\t\t\t<div class=\"post-excerpt mt-auto pt-4\">When an insurance company faces a data breach, the fallout is immediate: customer trust erodes, regulatory scrutiny intensifies, and recovery costs skyrocket. Thus, protecting sensitive<\/div>\t\t<!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-14101 -->\n\t\t<\/div>\n\t<\/div>\n\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d23d2d4f-c1cb-4a85-aa13-f66dfb7c3216 areoi-element new-design\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(12, 27, 51,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center wp-embed-aspect-16-9 wp-has-aspect-ratio has-text-color has-link-color wp-elements-7e5ce5cc7c76b01a17a88caed5038ee5\" style=\"color:#ffffff\">FAQ<\/h2>\n\n\n\n\t\t<div  class=\"block-d63bceee-3997-43fa-86c3-0ed8627d9ccd areoi-element container wp-embed-aspect-16-9 wp-has-aspect-ratio overflow-hidden\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0a0c7aea-6017-4eac-bfe6-fc0b022b3cdc row areoi-element m-auto\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-2d3125f0-642c-43be-a557-73430f63a20c col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95 accordion accordion-faq\">\n\t\t\t\n\n\t\t<div  class=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-collapse\" \n\t\t\t\t\taria-expanded=\"true\" \n\t\t\t\t\taria-controls=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat are the penalties for non-compliance with NIS2?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse show\" \n\t\t\t\taria-labelledby=\"block-262956fe-9ad2-4f1a-9f7e-ed1fb9d67a7f-header\"\n\t\t\t\tdata-bs-parent=\".block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-4a560eb5-0a15-4da1-9399-536bee83f024 areoi-element\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"pb-1\">Failure to comply with NIS2 standards can result in severe penalties for your organization, including fines of up to \u20ac10 million (~$10.34 million) or 2% of the organization\u2019s total worldwide annual turnover, whichever is higher. Consequences may include sanctions against top managers and suspension of certifications and authorizations for services your organization provides.<\/p>\n\n\n\n<p class=\"mb-0\">Potential indirect consequences include reputational damage, loss of business opportunities, and increased scrutiny from regulatory authorities.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-2862f280-6eeb-4cde-8fbd-f333fde536c6-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat\u2019s the difference between NIS2 and NIS Directives?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-2862f280-6eeb-4cde-8fbd-f333fde536c6-header\"\n\t\t\t\tdata-bs-parent=\".block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-99a80d9c-e3cc-48e0-9db4-5ab237f8d466 areoi-element\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"pb-1\">NIS2 is an evolution of the original NIS Directive and introduces more comprehensive and stringent cybersecurity requirements. NIS2 came into force in January 2023 as a response to the increased frequency and impact of cyberattacks on critical EU infrastructure. Compared to the NIS Directive, it encompasses a broader scope and introduces additional cybersecurity requirements, reporting obligations, and sanctions.<\/p>\n\n\n\n<p class=\"mb-0\">In particular, NIS2 broadened its scope to include additional industries, such as manufacturing, food supply, and digital infrastructure. NIS2 emphasizes the importance of supply chain security, risk management, and incident preparedness, ensuring a more robust and proactive cybersecurity approach for organizations.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat are the first steps to NIS2 compliance?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-fd3ccfa7-6499-43d1-b540-eb30f419aa12-header\"\n\t\t\t\tdata-bs-parent=\".block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-bbca7152-2500-4b10-ad99-f3880ad7a1e9 areoi-element\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"pb-1\">If your organization is subject to NIS2, you should start by figuring out which of your IT systems fall under its scope. Once you\u2019ve learned the security requirements of NIS2, conduct a gap analysis to compare them to the existing security measures implemented in your organization.<\/p>\n\n\n\n<p class=\"mb-0 with-link\">Next, you should allocate the necessary resources and implement any NIS2 Directive compliance requirements your organization does not meet. NIS2 compliance software like <a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca<\/a> can significantly streamline this process by automating key aspects such as user activity monitoring, privileged access management, and secure credential handling. Creating a NIS2 compliance checklist to track your progress will ensure that all aspects of compliance are covered.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7123e3dd-2b9d-4a0a-a137-e6df18c32a99 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-7123e3dd-2b9d-4a0a-a137-e6df18c32a99-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-7123e3dd-2b9d-4a0a-a137-e6df18c32a99-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-7123e3dd-2b9d-4a0a-a137-e6df18c32a99-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat is the difference between &#8220;essential&#8221; and &#8220;important&#8221; entities?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-7123e3dd-2b9d-4a0a-a137-e6df18c32a99-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-7123e3dd-2b9d-4a0a-a137-e6df18c32a99-header\"\n\t\t\t\tdata-bs-parent=\".block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-4d279c1e-7c69-4fd7-a855-47c2e3ccedc2 areoi-element\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"pb-1\">NIS2 classifies an organization in one of two ways, depending on its impact on society and the EU economy. According to the Directive, your organization must assess your role within these sectors to determine your compliance obligations. To determine which group your organization belongs to, consider referring to Annexes I and II of the Directive.<\/p>\n\n\n\n<ul class=\"wp-block-list mb-0\">\n<li class=\"with-link\">\u201cEssential\u201d entities, or those \u201coperating in sectors of high criticality\u201d, are outlined in <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv%3AOJ.L_.2022.333.01.0080.01.ENG&amp;toc=OJ%3AL%3A2022%3A333%3ATOC#d1e32-143-1\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2 Annex I<\/a> and include critical sectors such as energy, healthcare, and transport.<\/li>\n\n\n\n<li class=\"with-link\">\u201cImportant\u201d entities, or those \u201coperating in other critical sectors\u201d, are described in <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv:OJ.L_.2022.333.01.0080.01.ENG&amp;toc=OJ:L:2022:333:TOC#d1e32-148-1\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2 Annex II<\/a> and include industries like manufacturing, food supply, and digital services.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f680f3ca-64bc-4425-b6a3-7e38be4550c6 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f680f3ca-64bc-4425-b6a3-7e38be4550c6-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f680f3ca-64bc-4425-b6a3-7e38be4550c6-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f680f3ca-64bc-4425-b6a3-7e38be4550c6-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat are the reporting requirements of the NIS2 Directive?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f680f3ca-64bc-4425-b6a3-7e38be4550c6-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f680f3ca-64bc-4425-b6a3-7e38be4550c6-header\"\n\t\t\t\tdata-bs-parent=\".block-fcd1c217-2fb2-4a18-8c1e-d7fc48e8dc95\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-58bb9e9d-6288-4e55-bdd3-92337e0ebc12 areoi-element\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"pb-1\">According to NIS2, organizations subject to the Directive must notify specific parties when a cybersecurity incident occurs. These parties include the National Computer Security Incident Response Teams (CSIRTs), other competent authorities within the Member States, and, where appropriate, the recipients of the entities\u2019 services.<\/p>\n\n\n\n<p class=\"mb-0 with-link\">Incident reporting under NIS2 must follow a structured timeline to ensure thorough communication and accountability. Within 24 hours, an early warning must outline potential causes and any cross-border impacts. Within 72 hours, an updated report should expand on the initial information, providing more context about the incident. Refer to <a href=\"https:\/\/www.nis-2-directive.com\/NIS_2_Directive_Article_23.html\" target=\"_blank\" rel=\"noreferrer noopener\">Article 23<\/a> of the Directive to read more about NIS2 reporting requirements.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":16,"featured_media":54502,"parent":12284,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-27653","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2 Directive Compliance Solutions | Syteca<\/title>\n<meta name=\"description\" content=\"Looking for NIS2 compliance solutions? Syteca helps you cover most of the directive\u2019s cybersecurity requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 Directive Compliance Solutions | Syteca\" \/>\n<meta property=\"og:description\" content=\"Looking for NIS2 compliance solutions? Syteca helps you cover most of the directive\u2019s cybersecurity requirements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-24T09:48:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072448\/OG-NIS2-Compliance-Solutions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\",\"url\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\",\"name\":\"NIS2 Directive Compliance Solutions | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072448\/OG-NIS2-Compliance-Solutions.jpg\",\"datePublished\":\"2023-07-11T12:04:00+00:00\",\"dateModified\":\"2025-04-24T09:48:47+00:00\",\"description\":\"Looking for NIS2 compliance solutions? Syteca helps you cover most of the directive\u2019s cybersecurity requirements.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072448\/OG-NIS2-Compliance-Solutions.jpg\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072448\/OG-NIS2-Compliance-Solutions.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Solutions\",\"item\":\"https:\/\/www.syteca.com\/en\/solutions\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Compliance Solution\",\"item\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NIS2 Directive Compliance Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 Directive Compliance Solutions | Syteca","description":"Looking for NIS2 compliance solutions? Syteca helps you cover most of the directive\u2019s cybersecurity requirements.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance","og_locale":"en_US","og_type":"article","og_title":"NIS2 Directive Compliance Solutions | Syteca","og_description":"Looking for NIS2 compliance solutions? Syteca helps you cover most of the directive\u2019s cybersecurity requirements.","og_url":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance","og_site_name":"Syteca","article_modified_time":"2025-04-24T09:48:47+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072448\/OG-NIS2-Compliance-Solutions.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance","url":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance","name":"NIS2 Directive Compliance Solutions | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072448\/OG-NIS2-Compliance-Solutions.jpg","datePublished":"2023-07-11T12:04:00+00:00","dateModified":"2025-04-24T09:48:47+00:00","description":"Looking for NIS2 compliance solutions? Syteca helps you cover most of the directive\u2019s cybersecurity requirements.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072448\/OG-NIS2-Compliance-Solutions.jpg","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/24072448\/OG-NIS2-Compliance-Solutions.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Solutions","item":"https:\/\/www.syteca.com\/en\/solutions"},{"@type":"ListItem","position":2,"name":"IT Compliance Solution","item":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements"},{"@type":"ListItem","position":3,"name":"NIS2 Directive Compliance Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/27653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=27653"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/27653\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/12284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/54502"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=27653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}