{"id":489652,"date":"2024-10-10T11:00:00","date_gmt":"2024-10-10T09:00:00","guid":{"rendered":"https:\/\/innovationorigins.com\/?p=489652"},"modified":"2024-10-10T11:00:00","modified_gmt":"2024-10-10T09:00:00","slug":"eus-cybersecurity-deadline-looms-as-member-states-lag-behind","status":"publish","type":"post","link":"https:\/\/ioplus.nl\/archive\/en\/eus-cybersecurity-deadline-looms-as-member-states-lag-behind\/","title":{"rendered":"EU&#8217;s cybersecurity deadline looms as member states lag behind"},"content":{"rendered":"\n<p>With just a week left until the EU&#8217;s new cybersecurity rules take effect, only Belgium and Croatia have fully or partially adopted the Network and Information Security Directive 2 (NIS2). This crucial legislation aims to protect critical sectors like energy, transport, and banking from cyber threats. The remaining 25 EU countries face a race against time to implement these measures, which include strict reporting requirements and potential fines of up to \u20ac10 million for non-compliance. Industry experts warn of widespread unawareness among affected entities, highlighting the urgent need for action to bolster the EU&#8217;s cyber resilience in an increasingly digital landscape.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A pressing deadline<\/h2>\n\n\n\n<p>As the 17 October deadline approaches, the EU faces a significant challenge. The <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\">NIS2 Directive<\/a>, which updates cybersecurity rules established in 2016, requires member states to enhance their cybersecurity frameworks. This directive demands a high level of preparedness from member states, necessitating the establishment of Computer Security Incident Response Teams (CSIRTs) and national network and information systems (NIS) authorities Yet, only Belgium and Croatia have made significant strides towards compliance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The stakes of non-compliance<\/h2>\n\n\n\n<p>Non-compliance with the NIS2 Directive carries severe consequences. Companies failing to meet the directive&#8217;s requirements may face fines of up to \u20ac10 million or 2% of their worldwide revenue, whichever is higher. These stringent penalties underscore the EU&#8217;s commitment to bolstering cyber resilience. However, the challenge lies in the widespread lack of awareness among entities now under the directive&#8217;s scope. A French parliamentary report indicates that many of the nearly 15,000 entities affected by NIS2 are unaware of the compliance measures <a href=\"https:\/\/csnp.fr\/wp-content\/uploads\/2024\/10\/Rapport-NIS-2-V12-Couverture-originale-1.pdf\">required<\/a>.<\/p>\n\n\n<div class=\"vlp-link-container vlp-layout-basic wp-block-visual-link-preview-link\"><a href=\"https:\/\/ioplus.nl\/archive\/en\/eu-cybersecurity-report-unveils-critical-vulnerabilities-in-telecom-and-energy-sectors\/\" class=\"vlp-link\" title=\"EU cybersecurity report unveils critical vulnerabilities in telecom and energy sectors\"><\/a><div class=\"vlp-layout-zone-side\"><div class=\"vlp-block-2 vlp-link-image\"><\/div><\/div><div class=\"vlp-layout-zone-main\"><div class=\"vlp-block-0 vlp-link-title\">EU cybersecurity report unveils critical vulnerabilities in telecom and energy sectors<\/div><div class=\"vlp-block-1 vlp-link-summary\">The European Union has released a comprehensive cybersecurity report highlighting significant risks in the telecommunications and electricity sectors. <\/div><\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\">Increased vulnerability in key sectors<\/h2>\n\n\n\n<p>The urgency to adopt the NIS2 Directive is amplified by recent findings on cybersecurity <a href=\"https:\/\/innovationorigins.com\/en\/eu-cybersecurity-report-unveils-critical-vulnerabilities-in-telecom-and-energy-sectors\/\">vulnerabilities<\/a> within the EU. A report released on 10 October 2024 highlights critical vulnerabilities in telecommunications and energy sectors, with supply chain weaknesses in 5G networks and renewable energy infrastructures being particularly concerning. These vulnerabilities, coupled with a shortage of cybersecurity professionals, pose significant risks to the EU&#8217;s cyber infrastructure.<\/p>\n\n\n\n<p>To address these vulnerabilities, the EU has proposed comprehensive measures, including continuous risk assessments and resilience-enhancing strategies. Member states are urged to conduct self-assessments in line with the NIS2 and CER cybersecurity directives, aiming to improve collective cyber situational awareness and supply chain security. The impending implementation of the Digital Operational Resilience Act (DORA) by January 2025 further underscores the EU&#8217;s commitment to enhancing cybersecurity across critical sectors.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With just a week left until the EU&#8217;s new cybersecurity rules take effect, only Belgium and Croatia have fully or partially adopted the Network and Information Security Directive 2 (NIS2). This crucial legislation aims to protect critical sectors like energy, transport, and banking from cyber threats. The remaining 25 EU countries face a race against [&hellip;]<\/p>\n","protected":false},"author":2580,"featured_media":506914,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[84026],"tags":[28925,5244,67287,28934],"location":[70256],"article_type":[36684],"serie":[],"archives":[],"internal_archives":[],"reboot-archive":[82795],"class_list":["post-489652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data","tag-cybersecurity-en","tag-eu-en","tag-hacking","tag-security-en","location-eu","article_type-news","reboot-archive-data"],"blocksy_meta":[],"acf":{"subtitle":"Only Belgium and Croatia have fully or partially adopted the Network and Information Security Directive 2 one week from the deadline. ","text_display_homepage":false},"author_meta":{"display_name":"Laio","author_link":"https:\/\/ioplus.nl\/archive\/author\/laio\/"},"featured_img":"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2024\/07\/innovationorigins_a_hacker_working_on_his_desk_to_crack_some_of_f0765140-2b71-4f8b-a7f6-26597ba1f40c.png","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/data\/\" class=\"advgb-post-tax-term\">DATA+<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">DATA+<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/data\/\" class=\"advgb-post-tax-term\">cybersecurity<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/data\/\" class=\"advgb-post-tax-term\">EU<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/data\/\" class=\"advgb-post-tax-term\">hacking<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/data\/\" class=\"advgb-post-tax-term\">security<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">cybersecurity<\/span>","<span class=\"advgb-post-tax-term\">EU<\/span>","<span class=\"advgb-post-tax-term\">hacking<\/span>","<span class=\"advgb-post-tax-term\">security<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 1 year ago","modified":"Updated 1 year ago"},"absolute_dates":{"created":"Posted on October 10, 2024","modified":"Updated on October 10, 2024"},"absolute_dates_time":{"created":"Posted on October 10, 2024 11:00 am","modified":"Updated on October 10, 2024 11:00 am"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/489652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/users\/2580"}],"replies":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/comments?post=489652"}],"version-history":[{"count":0,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/489652\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media\/506914"}],"wp:attachment":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media?parent=489652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/categories?post=489652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/tags?post=489652"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/location?post=489652"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/article_type?post=489652"},{"taxonomy":"serie","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/serie?post=489652"},{"taxonomy":"archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/archives?post=489652"},{"taxonomy":"internal_archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/internal_archives?post=489652"},{"taxonomy":"reboot-archive","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/reboot-archive?post=489652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}