{"id":253528,"date":"2025-06-20T13:18:57","date_gmt":"2025-06-20T11:18:57","guid":{"rendered":"https:\/\/cyberforces.com\/?p=253528"},"modified":"2025-06-20T13:18:57","modified_gmt":"2025-06-20T11:18:57","slug":"nis2-obligations-how-to-prepare-your-company","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company","title":{"rendered":"NIS2: Key responsibilities for essential and important entities in the EU"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The NIS2 Directive, which came into force in Poland in October 2024, introduces a range of cybersecurity obligations for entities classified as essential or important. If your organization is listed among them, now is the time to act.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article outlines what the directive means in practice and what your company should do to stay compliant and reduce cybersecurity risks.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What Obligations Does NIS2 Impose?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">NIS2 focuses on two key areas:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cybersecurity risk management<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident notification obligations<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Below, we break down how these obligations translate into real actions for affected organizations.<\/p>\n<p><\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybersecurity Risk Management \u2013 What Needs to Be Implemented?<\/p>\n<p><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Organizations subject to NIS2 must implement comprehensive risk management measures in their IT environment. These include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Policies for risk assessment and information system security<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident response procedures and crisis management plans<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Business continuity strategies and regular readiness testing<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Supply chain security controls, including third-party oversight<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure procurement, development, and maintenance processes for IT systems<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mechanisms for detecting and reporting vulnerabilities<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular testing of implemented security measures<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Employee training on cybersecurity awareness and digital hygiene<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cryptographic controls and encryption, where applicable<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access control policies and secure communication channels, especially in crises<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Additionally, the European Commission is expected to issue implementing acts specifying technical requirements for certain sectors, such as cloud service providers, DNS providers, and domain registrars.<\/p>\n<p><\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybersecurity Incident Reporting \u2013 What Are the Rules?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Organizations must report any cybersecurity incident that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Disrupts service delivery<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Causes significant financial losses<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Poses a threat to individuals or other organizations<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Incident Reporting Timeline:<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Within 24 hours \u2013 early warning with preliminary causes and possible cross-border impact<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Within 72 hours \u2013 main report with updated details and initial impact assessment<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Within 30 days \u2013 final report summarizing the incident and mitigation actions<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Additional Requirements:<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If users or clients are affected, they must be notified without undue delay<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The organization must provide clear mitigation guidelines to those affected<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If the incident has cross-border relevance, it must be reported to EU-level authorities<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Trusted service providers (e.g., e-signature providers) are required to notify within 24 hours<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Organizations may also voluntarily report lower-impact incidents. While these are handled with lower priority, they still follow a formal process and reflect a mature cybersecurity posture.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What Should You Do Now? [Checklist]<\/span><\/h2>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check whether your organization falls under the scope of NIS2<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assess your current compliance with risk management and incident reporting requirements<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prepare or update your internal cybersecurity policies and response plans<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Train your team \u2013 both technically and operationally<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">Need Support?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">At Cyberforces, we help companies across Europe comply with NIS2:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">We conduct readiness audits<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">We develop and update policies and procedures<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">We train technical and operational teams<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">We support secure incident response and reporting processes<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Contact us to assess your organization&#8217;s readiness and get expert guidance on becoming fully NIS2-compliant.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NIS2 Directive, which came into force in Poland in October 2024, introduces a range of cybersecurity obligations for entities classified as essential or important. If your organization is listed among them, now is the time to act. This article outlines what the directive means in practice and what your company should do to stay [&hellip;]<\/p>\n","protected":false},"author":25,"featured_media":253529,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[29],"tags":[],"class_list":["post-253528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2: Key responsibilities for essential and important entities in the EU - CyberForces<\/title>\n<meta name=\"description\" content=\"What obligations does NIS2 introduce? Learn how companies in Poland should manage risks and report cybersecurity incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2: Key responsibilities for essential and important entities in the EU - CyberForces\" \/>\n<meta property=\"og:description\" content=\"What obligations does NIS2 introduce? Learn how companies in Poland should manage risks and report cybersecurity incidents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-20T11:18:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Diana Ma\u0142yszko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana Ma\u0142yszko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company\"},\"author\":{\"name\":\"Diana Ma\u0142yszko\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb\"},\"headline\":\"NIS2: Key responsibilities for essential and important entities in the EU\",\"datePublished\":\"2025-06-20T11:18:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company\"},\"wordCount\":465,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company\",\"url\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company\",\"name\":\"NIS2: Key responsibilities for essential and important entities in the EU - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr\",\"datePublished\":\"2025-06-20T11:18:57+00:00\",\"description\":\"What obligations does NIS2 introduce? Learn how companies in Poland should manage risks and report cybersecurity incidents.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2: Key responsibilities for essential and important entities in the EU\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb\",\"name\":\"Diana Ma\u0142yszko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"caption\":\"Diana Ma\u0142yszko\"},\"url\":\"https:\/\/cyberforces.com\/en\/author\/diana-malyszko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2: Key responsibilities for essential and important entities in the EU - CyberForces","description":"What obligations does NIS2 introduce? Learn how companies in Poland should manage risks and report cybersecurity incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company","og_locale":"en_US","og_type":"article","og_title":"NIS2: Key responsibilities for essential and important entities in the EU - CyberForces","og_description":"What obligations does NIS2 introduce? Learn how companies in Poland should manage risks and report cybersecurity incidents.","og_url":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2025-06-20T11:18:57+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr","type":"image\/webp"}],"author":"Diana Ma\u0142yszko","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Diana Ma\u0142yszko","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company"},"author":{"name":"Diana Ma\u0142yszko","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb"},"headline":"NIS2: Key responsibilities for essential and important entities in the EU","datePublished":"2025-06-20T11:18:57+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company"},"wordCount":465,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company","url":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company","name":"NIS2: Key responsibilities for essential and important entities in the EU - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr","datePublished":"2025-06-20T11:18:57+00:00","description":"What obligations does NIS2 introduce? Learn how companies in Poland should manage risks and report cybersecurity incidents.","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CF-Blog-NIS2-Key-Responsibilities_1200x675-en-1.webp?wsr","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/nis2-obligations-how-to-prepare-your-company#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"NIS2: Key responsibilities for essential and important entities in the EU"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb","name":"Diana Ma\u0142yszko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","caption":"Diana Ma\u0142yszko"},"url":"https:\/\/cyberforces.com\/en\/author\/diana-malyszko"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=253528"}],"version-history":[{"count":2,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253528\/revisions"}],"predecessor-version":[{"id":253533,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253528\/revisions\/253533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media\/253529"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=253528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=253528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=253528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}