{"id":2392,"date":"2023-11-24T08:30:48","date_gmt":"2023-11-24T06:30:48","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2392"},"modified":"2023-12-11T08:32:17","modified_gmt":"2023-12-11T06:32:17","slug":"navigating-the-cybersecurity-landscape-key-facts-on-nis2-and-dora","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/navigating-the-cybersecurity-landscape-key-facts-on-nis2-and-dora\/","title":{"rendered":"Navigating the Cybersecurity Landscape: Key facts on NIS2 and DORA"},"content":{"rendered":"\n<p>In our recent webinar, Certitude Consulting, in collaboration with our partners Core to Cloud Ltd., delved into the intricacies of two pivotal regulations shaping the future of cybersecurity: the Digital Operational Resilience Act (DORA) and the NIS2 Directive. Led by our Information Security expert, Thomas Fischer, the session aimed to provide a an understanding of these regulations and shed light on their relevance for UK companies. A recording of the webinar can be accessed <a href=\"https:\/\/coretocloudvideo.hubs.vidyard.com\/watch\/T4bwAHweWcwcDCY5KzjDWa\" data-type=\"link\" data-id=\"https:\/\/coretocloudvideo.hubs.vidyard.com\/watch\/T4bwAHweWcwcDCY5KzjDWa\">here<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"462\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1024x462.png\" alt=\"\" class=\"wp-image-2393\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1024x462.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-300x135.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-768x346.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik.png 1315w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Adam Woolhead (Core to Cloud) and Thomas Fischer (Certitude Consulting)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"484\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1-1024x484.png\" alt=\"\" class=\"wp-image-2394\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1-1024x484.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1-300x142.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1-768x363.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1.png 1334w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Thomas Fischer (Certitude Consulting)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our recent webinar, Certitude Consulting, in collaboration with our partners Core to Cloud Ltd., delved into the intricacies of two pivotal regulations shaping the future of cybersecurity: the Digital Operational Resilience Act (DORA) and the NIS2 Directive. Led by our Information Security expert, Thomas Fischer, the session aimed to provide a an understanding of [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":2393,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[196,128],"tags":[421,454,457],"class_list":["post-2392","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-conferences","category-press","tag-dora-en","tag-nis-en","tag-uk-en"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2392"}],"version-history":[{"count":4,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2392\/revisions"}],"predecessor-version":[{"id":2404,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2392\/revisions\/2404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/2393"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}