{"id":4855,"date":"2024-12-16T09:01:40","date_gmt":"2024-12-16T08:01:40","guid":{"rendered":"https:\/\/www.ecta.sk\/?p=4855"},"modified":"2024-12-16T10:20:16","modified_gmt":"2024-12-16T09:20:16","slug":"smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy","status":"publish","type":"post","link":"https:\/\/www.ecta.sk\/en\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/","title":{"rendered":"NIS Directive 2: New cybersecurity obligations for companies"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4855\" class=\"elementor elementor-4855\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d06c5f6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d06c5f6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ad856ea sc_inner_width_none sc_layouts_column_icons_position_left\" data-id=\"5ad856ea\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d6b714c elementor-widget elementor-widget-text-editor\" data-id=\"4d6b714c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p>In today's digital age, cybersecurity is a key priority for businesses of all sizes. With the increasing number of cyberattacks and growing dependence on technology, it is becoming essential to implement measures to protect systems and data.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p class=\"translation-block\">The European Union is responding to this challenge by adopting Directive <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/SK\/TXT\/PDF\/? uri=CELEX:32022L2555\" target=\"_blank\" rel=\"noreferrer noopener\">NIS 2 (Network and Information Systems Directive)<\/a>, which sets out new rules to enhance cybersecurity. This legislation is designed to strengthen the resilience and security of networks and information systems in EU Member States. The Slovak Republic is transposing the NIS 2 Directive by amending Act No. 69\/2018 Coll. on cybersecurity, which will come into effect on January 1, 2025. In this article, you will learn what changes the directive brings, who it applies to, and how to prepare for it.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<h2><strong>What is the NIS 2 Directive?<\/strong><\/h2>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>The NIS 2 Directive is a legislative act of the European Union that follows on from the original NIS 1 Directive adopted in 2016. Its main objectives are:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li class=\"translation-block\"><strong>Increasing cyber resilience:<\/strong> Introducing mandatory measures to protect against cyber threats.<\/li>\n<li class=\"translation-block\"><strong>Improving cooperation:<\/strong> Promoting the exchange of information between states and companies.<\/li>\n<li class=\"translation-block\"><strong>Awareness raising:<\/strong> Spreading knowledge about cyber risks and solutions.<\/li>\n<li class=\"translation-block\"><strong>Scope extension:<\/strong> Involvement of a wider range of sectors and organizations, including critical infrastructure and digital services.<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<h3><strong>Differences from the previous directive:<\/strong><\/h3>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li class=\"translation-block\"><strong>Extended scope:<\/strong> The Directive covers a wider range of sectors, including digital services and critical infrastructure.<\/li>\n<li class=\"translation-block\"><strong>Stricter requirements:<\/strong> Companies must manage risks in greater detail and report incidents.<\/li>\n<li class=\"translation-block\"><strong>Higher penalties:<\/strong> Failure to comply with the rules can result in significant fines.<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<h3><strong>What new obligations does the NIS 2 Directive bring?<\/strong><\/h3>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>The directive sets out a number of key obligations for companies:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li class=\"translation-block\"><strong>Risk management:<\/strong> Implementation of systems to identify, assess, and mitigate cyber risks.<\/li>\n<li class=\"translation-block\"><strong>Incident reporting:<\/strong> Obligation to report cyber incidents to national authorities within 24 hours of discovery and 72 hours of discovery.<\/li>\n<li class=\"translation-block\"><strong>Security measures:<\/strong> Implementation of technical and organizational solutions such as encryption, firewalls, recovery plans and testing, data backup, incident monitoring, and others.<\/li>\n<li class=\"translation-block\"><strong>Education:<\/strong> Regular training of employees on the latest cyber threats and procedures.<\/li>\n<li class=\"translation-block\"><strong>Cooperation:<\/strong> Companies should actively communicate with authorities and other organizations in the field of cybersecurity.<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p class=\"translation-block\">The NIS 2 Directive applies to a wide range of entities, which are divided into two main categories: <strong>key entities <\/strong>\u2013 those operating a critical basic service, and <strong>important entities <\/strong>\u2013 other basic service operators. These categories cover organizations whose activities are of vital importance to the economy, security, and society within the European Union.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<h4><strong>Key subjects<\/strong><\/h4>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>They are considered strategically most important, and their failure can have a significant impact on the functioning of the company. These include:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li class=\"translation-block\"><strong>Energy<\/strong>: Electricity, oil, gas, district heating, and hydrogen.<\/li>\n<li class=\"translation-block\"><strong>Transportation<\/strong>: Air, rail, water, and road transportation.<\/li>\n<li class=\"translation-block\"><strong>Banking<\/strong> and <strong>financial market infrastructure<\/strong>.<\/li>\n<li class=\"translation-block\"><strong>Healthcare<\/strong>: Including the manufacture of pharmaceutical products.<\/li>\n<li class=\"translation-block\"><strong>Drinking water supply<\/strong> and water treatment and distribution.<\/li>\n<li class=\"translation-block\"><strong>Digital infrastructure<\/strong>: DNS providers, cloud service providers, data centers, content delivery networks.<\/li>\n<li class=\"translation-block\"><strong>ICT service management<\/strong>: Managed services and security services.<\/li>\n<li><strong>Public administration<\/strong><\/li>\n<li><strong>Outer space<\/strong><\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<h4><strong>Important subjects<\/strong><\/h4>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>They have a significant impact on the security and resilience of society, but their failure is not as critical as that of key entities. These include:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li><strong>Postal and courier services<\/strong>.<\/li>\n<li><strong>Manufacturing (medical devices, electrical equipment, machinery and equipment, motor vehicles, etc.)<\/strong><\/li>\n<li><strong>Manufacture and distribution of chemicals<\/strong>.<\/li>\n<li><strong>Food businesses<\/strong>.<\/li>\n<li><strong>Waste management<\/strong><\/li>\n<li><strong>Digital service providers.<\/strong><\/li>\n<li><strong>Research<\/strong><\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<h4><strong>Additional criteria for determining obligated entities<\/strong><\/h4>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>The NIS 2 Directive applies not only to sectors, but also to specific companies based on:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li class=\"translation-block\"><strong>Organization size<\/strong>: if they are at least a medium-sized enterprise (min. 50 employees and turnover or balance sheet of EUR 10 million or more).<\/li>\n<li class=\"translation-block\"><strong>Criticality of their services<\/strong>: Entities providing services essential to the functioning of society and the economy.<\/li>\n<li class=\"translation-block\"><strong>Risk profile<\/strong>: Organizations whose activities pose a higher cyber risk.<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<h4><strong>How to ensure compliance with requirements?<\/strong><\/h4>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p class=\"translation-block\">To ensure compliance with the NIS 2 Directive, an audit of the current security status must be performed to identify security vulnerabilities. Subsequently, a risk management plan must be developed that includes a strategy for mitigating risks. Companies should implement technical measures such as firewalls, encryption, and network monitoring, as well as regularly educate employees through training and other means. Cooperation with national authorities (National Security Authority \u2013 NSA) and <a href=\"https:\/\/www.ecta.sk\/en\/services\/cyber-security-manager\/\" target=\"_self\">external experts<\/a> is also an important part of this.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Failure to comply with the directive can have serious consequences for companies. These include the risk of heavy fines, the amount of which depends on the severity of the violation. Companies may also face legal disputes that can negatively affect their reputation. In addition, inadequate security can lead to a loss of trust among customers and business partners, which can weaken business relationships.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>The directive represents an opportunity for companies to improve their security measures and increase their resilience to cyber threats. Although implementation can be challenging, investing in cybersecurity brings long-term benefits. If you want to ensure that your company complies with the requirements of the NIS 2 Directive and the amendment to the Slovak Republic law, contact ECTA, s.r.o.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50bfa43 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"50bfa43\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ed2670b sc_inner_width_none sc_layouts_column_icons_position_left\" data-id=\"ed2670b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bbdff0f elementor-widget elementor-widget-spacer\" data-id=\"bbdff0f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5ef70c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5ef70c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e1f1173 sc_inner_width_none sc_layouts_column_icons_position_left\" data-id=\"e1f1173\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98dffc5 elementor-widget elementor-widget-trx_sc_services\" data-id=\"98dffc5\" data-element_type=\"widget\" data-widget_type=\"trx_sc_services.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div id=\"trx_sc_services_204433417\" class=\"sc_services sc_services_hover sc_services_featured_top\"><div class=\"sc_services_columns_wrap sc_item_columns sc_item_posts_container sc_item_columns_3 trx_addons_columns_wrap columns_padding_bottom\"><div class=\"trx_addons_column-1_3\">\n<div class=\"sc_services_item no_links with_content with_image sc_services_item_featured_none post-3649 cpt_services type-cpt_services status-publish has-post-thumbnail hentry cpt_services_group-produkty-a-sluzby\">\n\t<div class=\"sc_services_item_header\" style=\"background-image: url(https:\/\/www.ecta.sk\/wp-content\/uploads\/2024\/09\/Externy-dmanazer-kybernetickej-bezpecnosti-osoba-v-pozadi-ktora-pozera-do-pocitaca-kyberneticke-prostredie-pocitace-800x1065.jpg);\">\n\t\t<div class=\"sc_services_item_header_inner\">\n\t\t\t\n\t\t\t<h6 class=\"sc_services_item_title\"><a href=\"https:\/\/www.ecta.sk\/en\/services\/manazer-kybernetickej-bezpecnosti\/\">Cybersecurity Manager<br><\/a><\/h6><\/div><a class=\"sc_services_item_link\" href=\"https:\/\/www.ecta.sk\/en\/services\/manazer-kybernetickej-bezpecnosti\/\"><\/a><\/div><\/div><\/div><\/div><\/div><!-- \/.sc_services -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>V dne\u0161nej digit\u00e1lnej \u00e9re je kybernetick\u00e1 bezpe\u010dnos\u0165 k\u013e\u00fa\u010dovou prioritou pre firmy v\u0161etk\u00fdch ve\u013ekost\u00ed. S narastaj\u00facim po\u010dtom kybernetick\u00fdch \u00fatokov a rast\u00facou&hellip;<\/p>","protected":false},"author":5,"featured_media":2515,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[],"class_list":["post-4855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti<\/title>\n<meta name=\"description\" content=\"Zistite, ak\u00e9 povinnosti prin\u00e1\u0161a smernica NIS 2 pre firmy v kybernetickej bezpe\u010dnosti. Preh\u013ead opatren\u00ed na ochranu d\u00e1t a IT infra\u0161trukt\u00fary.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecta.sk\/en\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti\" \/>\n<meta property=\"og:description\" content=\"Zistite, ak\u00e9 povinnosti prin\u00e1\u0161a smernica NIS 2 pre firmy v kybernetickej bezpe\u010dnosti. Preh\u013ead opatren\u00ed na ochranu d\u00e1t a IT infra\u0161trukt\u00fary.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecta.sk\/en\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/\" \/>\n<meta property=\"og:site_name\" content=\"ECTA, s.r.o.\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-16T08:01:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-16T09:20:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecta.sk\/wp-content\/uploads\/2019\/08\/entrepreneur-working-on-his-macbook-picjumbo-com.png\" \/>\n\t<meta property=\"og:image:width\" content=\"602\" \/>\n\t<meta property=\"og:image:height\" content=\"488\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ECTA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ECTA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/\"},\"author\":{\"name\":\"ECTA\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#\\\/schema\\\/person\\\/4656f063376bd9ae12917c9cb452da22\"},\"headline\":\"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti pre firmy\",\"datePublished\":\"2024-12-16T08:01:40+00:00\",\"dateModified\":\"2024-12-16T09:20:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/\"},\"wordCount\":1042,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ecta.sk\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/entrepreneur-working-on-his-macbook-picjumbo-com.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/\",\"url\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/\",\"name\":\"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ecta.sk\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/entrepreneur-working-on-his-macbook-picjumbo-com.png\",\"datePublished\":\"2024-12-16T08:01:40+00:00\",\"dateModified\":\"2024-12-16T09:20:16+00:00\",\"description\":\"Zistite, ak\u00e9 povinnosti prin\u00e1\u0161a smernica NIS 2 pre firmy v kybernetickej bezpe\u010dnosti. Preh\u013ead opatren\u00ed na ochranu d\u00e1t a IT infra\u0161trukt\u00fary.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ecta.sk\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/entrepreneur-working-on-his-macbook-picjumbo-com.png\",\"contentUrl\":\"https:\\\/\\\/www.ecta.sk\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/entrepreneur-working-on-his-macbook-picjumbo-com.png\",\"width\":602,\"height\":488},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/blog\\\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ecta.sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti pre firmy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#website\",\"url\":\"https:\\\/\\\/www.ecta.sk\\\/\",\"name\":\"ECTA, s.r.o.\",\"description\":\"ISO normy. \u0160tandardy. GDPR. Mana\u017e\u00e9rstvo kvality. Implement\u00e1cia syst\u00e9mov. Intern\u00fd audit. Pr\u00edprava na certifik\u00e1ciu.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ecta.sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#organization\",\"name\":\"ECTA, s.r.o.\",\"url\":\"https:\\\/\\\/www.ecta.sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ecta.sk\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ecta_consulting_white.svg\",\"contentUrl\":\"https:\\\/\\\/www.ecta.sk\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ecta_consulting_white.svg\",\"width\":1706,\"height\":872,\"caption\":\"ECTA, s.r.o.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ecta.sk\\\/#\\\/schema\\\/person\\\/4656f063376bd9ae12917c9cb452da22\",\"name\":\"ECTA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9668c0d4fc7bdd301aad295850908785aaf1d0ecd8b24b664dcb5271f1d2dd2a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9668c0d4fc7bdd301aad295850908785aaf1d0ecd8b24b664dcb5271f1d2dd2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9668c0d4fc7bdd301aad295850908785aaf1d0ecd8b24b664dcb5271f1d2dd2a?s=96&d=mm&r=g\",\"caption\":\"ECTA\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti","description":"Zistite, ak\u00e9 povinnosti prin\u00e1\u0161a smernica NIS 2 pre firmy v kybernetickej bezpe\u010dnosti. Preh\u013ead opatren\u00ed na ochranu d\u00e1t a IT infra\u0161trukt\u00fary.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecta.sk\/en\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/","og_locale":"en_US","og_type":"article","og_title":"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti","og_description":"Zistite, ak\u00e9 povinnosti prin\u00e1\u0161a smernica NIS 2 pre firmy v kybernetickej bezpe\u010dnosti. Preh\u013ead opatren\u00ed na ochranu d\u00e1t a IT infra\u0161trukt\u00fary.","og_url":"https:\/\/www.ecta.sk\/en\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/","og_site_name":"ECTA, s.r.o.","article_published_time":"2024-12-16T08:01:40+00:00","article_modified_time":"2024-12-16T09:20:16+00:00","og_image":[{"width":602,"height":488,"url":"https:\/\/www.ecta.sk\/wp-content\/uploads\/2019\/08\/entrepreneur-working-on-his-macbook-picjumbo-com.png","type":"image\/png"}],"author":"ECTA","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ECTA","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/#article","isPartOf":{"@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/"},"author":{"name":"ECTA","@id":"https:\/\/www.ecta.sk\/#\/schema\/person\/4656f063376bd9ae12917c9cb452da22"},"headline":"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti pre firmy","datePublished":"2024-12-16T08:01:40+00:00","dateModified":"2024-12-16T09:20:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/"},"wordCount":1042,"publisher":{"@id":"https:\/\/www.ecta.sk\/#organization"},"image":{"@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ecta.sk\/wp-content\/uploads\/2019\/08\/entrepreneur-working-on-his-macbook-picjumbo-com.png","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/","url":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/","name":"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti","isPartOf":{"@id":"https:\/\/www.ecta.sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/#primaryimage"},"image":{"@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ecta.sk\/wp-content\/uploads\/2019\/08\/entrepreneur-working-on-his-macbook-picjumbo-com.png","datePublished":"2024-12-16T08:01:40+00:00","dateModified":"2024-12-16T09:20:16+00:00","description":"Zistite, ak\u00e9 povinnosti prin\u00e1\u0161a smernica NIS 2 pre firmy v kybernetickej bezpe\u010dnosti. Preh\u013ead opatren\u00ed na ochranu d\u00e1t a IT infra\u0161trukt\u00fary.","breadcrumb":{"@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/#primaryimage","url":"https:\/\/www.ecta.sk\/wp-content\/uploads\/2019\/08\/entrepreneur-working-on-his-macbook-picjumbo-com.png","contentUrl":"https:\/\/www.ecta.sk\/wp-content\/uploads\/2019\/08\/entrepreneur-working-on-his-macbook-picjumbo-com.png","width":602,"height":488},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecta.sk\/blog\/smernica-nis-2-nove-povinnosti-v-oblasti-kybernetickej-bezpecnosti-pre-firmy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecta.sk\/"},{"@type":"ListItem","position":2,"name":"Smernica NIS 2: Nov\u00e9 povinnosti v oblasti kybernetickej bezpe\u010dnosti pre firmy"}]},{"@type":"WebSite","@id":"https:\/\/www.ecta.sk\/#website","url":"https:\/\/www.ecta.sk\/","name":"ECTA, s.r.o.","description":"ISO standards. Standards. GDPR. Quality management. Implementation of systems. Internal audit. Preparation for certification.","publisher":{"@id":"https:\/\/www.ecta.sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ecta.sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ecta.sk\/#organization","name":"ECTA, s.r.o.","url":"https:\/\/www.ecta.sk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ecta.sk\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecta.sk\/wp-content\/uploads\/2025\/09\/ecta_consulting_white.svg","contentUrl":"https:\/\/www.ecta.sk\/wp-content\/uploads\/2025\/09\/ecta_consulting_white.svg","width":1706,"height":872,"caption":"ECTA, s.r.o."},"image":{"@id":"https:\/\/www.ecta.sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ecta.sk\/#\/schema\/person\/4656f063376bd9ae12917c9cb452da22","name":"ECTA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9668c0d4fc7bdd301aad295850908785aaf1d0ecd8b24b664dcb5271f1d2dd2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9668c0d4fc7bdd301aad295850908785aaf1d0ecd8b24b664dcb5271f1d2dd2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9668c0d4fc7bdd301aad295850908785aaf1d0ecd8b24b664dcb5271f1d2dd2a?s=96&d=mm&r=g","caption":"ECTA"}}]}},"_links":{"self":[{"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/posts\/4855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/comments?post=4855"}],"version-history":[{"count":19,"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/posts\/4855\/revisions"}],"predecessor-version":[{"id":4904,"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/posts\/4855\/revisions\/4904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/media\/2515"}],"wp:attachment":[{"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/media?parent=4855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/categories?post=4855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecta.sk\/en\/wp-json\/wp\/v2\/tags?post=4855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}