{"id":97586,"date":"2024-06-19T08:30:00","date_gmt":"2024-06-19T06:30:00","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=97586"},"modified":"2024-06-20T12:03:40","modified_gmt":"2024-06-20T10:03:40","slug":"security-strategy-9","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/organos-de-direccion-nis2\/","title":{"rendered":"The predominant role of management bodies according to NIS2"},"content":{"rendered":"<h2 class=\"gb-headline gb-headline-6781afa2 gb-headline-text\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p>The ever-expanding digital footprint of organizations and the imperative need for a robust and resilient technological infrastructure has positioned information security as a strategic priority for organizations across all sectors. In this context, the European Union has adopted the NIS2 Directive, which updates and expands the regulatory framework established by the 2016 NIS Directive. One of the most significant changes introduced by NIS2 is the increased involvement of management bodies in cybersecurity strategies. This article analyzes how NIS2 raises the bar for corporate leaders and the practical implications for affected organizations.<\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-12d6dc37 gb-headline-text\"><strong>The NIS2 Directive: Context and Objectives<\/strong><\/h2>\n\n\n\n<p>This type of directive arises in response to emerging and increasingly sophisticated challenges in the field of cybersecurity. Its objective is to strengthen the EU&#039;s resilience and response capacity to cybersecurity incidents that may affect critical infrastructure, essential operators, and society in general. To achieve this, the Directive expands its scope to more sectors and strengthens obligations regarding risk management and incident reporting.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-1024x1024.jpg\" alt=\"NIS2\" class=\"wp-image-97588\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-1024x1024.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-300x300.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-768x768.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-326x326.jpg 326w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-150x150.jpg 150w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-80x80.jpg 80w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-165x165.jpg 165w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-123x123.jpg 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-70x70.jpg 70w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-12x12.jpg 12w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-500x500.jpg 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-800x800.jpg 800w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-1280x1280.jpg 1280w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1-200x200.jpg 200w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-infraestructura-tecnologica-una-imagen-de-servidores-o-centros-de-datos-que-simbolizan-la-i-1.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"gb-headline gb-headline-5670fae7 gb-headline-text\"><strong>Greater Involvement of the Governing Bodies<\/strong><\/h2>\n\n\n\n<p>NIS2 introduces explicit requirements for organizations&#039; governing bodies to assume greater responsibility for managing cybersecurity in their environments. This managerial responsibility entails:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Risk Assessment and Management: Managers must ensure that cybersecurity risks are adequately identified and effective mitigation measures are implemented. This includes allocating sufficient resources to protect systems and data.<\/li>\n\n\n\n<li>Cybersecurity Policies: Senior management should establish clear cybersecurity policies that are aligned with the organization&#039;s overall objectives and strategy. These policies should be reviewed and updated regularly to adapt to the changing threat landscape.<\/li>\n\n\n\n<li>Cybersecurity Training and Awareness: It is essential for managers to promote a cybersecurity culture throughout the organization. This includes ongoing employee training in cybersecurity best practices and raising awareness about potential risks.<\/li>\n\n\n\n<li>Reporting and Communication: Leaders must ensure that effective processes are in place for the rapid detection of security incidents and appropriate communication both within the organization and to the appropriate authorities.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-1024x1024.jpg\" alt=\"governing bodies\" class=\"wp-image-97587\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-1024x1024.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-300x300.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-768x768.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-326x326.jpg 326w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-150x150.jpg 150w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-80x80.jpg 80w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-165x165.jpg 165w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-123x123.jpg 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-70x70.jpg 70w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-12x12.jpg 12w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-500x500.jpg 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-800x800.jpg 800w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-1280x1280.jpg 1280w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1-200x200.jpg 200w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-reunion-de-directivos-una-imagen-de-un-grupo-de-ejecutivos-en-una-sala-de-reuniones-discuti-1.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"gb-headline gb-headline-6cf7bc02 gb-headline-text\"><strong>Implications for Organizations<\/strong><\/h2>\n\n\n\n<p>Implementing the NIS2 Directive poses several challenges for organizations. First, it will require a comprehensive review of existing cybersecurity policies and procedures. Furthermore, senior management will need to be more involved in cybersecurity operations, which may require updating their training and understanding of this topic.<br>In turn, this increased involvement can be seen as an opportunity to strengthen corporate governance and improve organizational resilience to cyberattacks. Furthermore, NIS2 compliance can enhance an organization&#039;s reputation, offering a competitive advantage in a market increasingly aware of the importance of information security.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-1024x1024.jpg\" alt=\"\" class=\"wp-image-97589\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-1024x1024.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-300x300.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-768x768.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-326x326.jpg 326w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-150x150.jpg 150w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-80x80.jpg 80w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-165x165.jpg 165w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-123x123.jpg 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-70x70.jpg 70w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-12x12.jpg 12w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-500x500.jpg 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-800x800.jpg 800w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-1280x1280.jpg 1280w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de-200x200.jpg 200w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2024\/06\/firefly-grafico-de-riesgo-y-seguridad-un-grafico-o-diagrama-que-muestre-la-evaluacion-y-gestion-de.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>The NIS2 Directive represents a fundamental shift in how organizations approach cybersecurity, particularly highlighting the responsibility of senior management. This adjustment not only strengthens the protection of critical infrastructure and essential services but also fosters a stronger corporate culture around cybersecurity. Adapting to this new legislative framework will require considerable effort, but it is a fundamental step in securing organizations&#039; assets and reputation in the face of the ever-increasing cyberthreat landscape.<\/p>\n\n\n\n<p>Learn much more in our&nbsp;<a href=\"https:\/\/eiposgrados.com\/eng\/programs\/master-in-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Professional Master in Cybersecurity, Ethical Hacking and Offensive Security<\/strong><\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>The current regulatory landscape regarding cybersecurity is constantly changing in response to its attempt to address the growing risks and threats, as well as technological challenges that society faces.<\/p>","protected":false},"author":1147,"featured_media":97670,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-97586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/97586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/1147"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=97586"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/97586\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/97670"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=97586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=97586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=97586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}