{"id":2403,"date":"2023-11-24T12:39:26","date_gmt":"2023-11-24T10:39:26","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2403"},"modified":"2023-12-11T15:58:26","modified_gmt":"2023-12-11T13:58:26","slug":"navigation-durch-die-cybersicherheitslandschaft-wichtige-fakten-zu-nis2-und-dora","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/navigation-durch-die-cybersicherheitslandschaft-wichtige-fakten-zu-nis2-und-dora\/","title":{"rendered":"Navigation durch die Cybersicherheitslandschaft: Wichtige Fakten zu NIS2 und DORA"},"content":{"rendered":"\n<p>In unserem Webinar hat Certitude Consulting in Zusammenarbeit mit unserem Partner Core to Cloud Ltd. die Fakten von zwei entscheidenden Vorschriften beleuchtet, die die Zukunft der Cybersicherheit in Europa pr\u00e4gen: das Digital Operational Resilience Act (DORA) und die NIS2-Richtlinie. Unter der Leitung unseres Informationssicherheitsexperten, Thomas Fischer, hatte das Webinar das Ziel, ein Verst\u00e4ndnis f\u00fcr diese Vorschriften zu vermitteln und ihre Relevanz f\u00fcr britische Unternehmen zu beleuchten. Eine Aufzeichnung des Webinars steht <a href=\"https:\/\/coretocloudvideo.hubs.vidyard.com\/watch\/T4bwAHweWcwcDCY5KzjDWa\" data-type=\"link\" data-id=\"https:\/\/coretocloudvideo.hubs.vidyard.com\/watch\/T4bwAHweWcwcDCY5KzjDWa\">hier<\/a> zur Verf\u00fcgung.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"462\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1024x462.png\" alt=\"\" class=\"wp-image-2393\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1024x462.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-300x135.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-768x346.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik.png 1315w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Adam Woolhead (Core to Cloud) und Thomas Fischer (Certitude Consulting)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"484\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1-1024x484.png\" alt=\"\" class=\"wp-image-2394\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1-1024x484.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1-300x142.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1-768x363.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/12\/grafik-1.png 1334w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Thomas Fischer (Certitude Consulting)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In unserem Webinar hat Certitude Consulting in Zusammenarbeit mit unserem Partner Core to Cloud Ltd. die Fakten von zwei entscheidenden Vorschriften beleuchtet, die die Zukunft der Cybersicherheit in Europa pr\u00e4gen: das Digital Operational Resilience Act (DORA) und die NIS2-Richtlinie. Unter der Leitung unseres Informationssicherheitsexperten, Thomas Fischer, hatte das Webinar das Ziel, ein Verst\u00e4ndnis f\u00fcr diese [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":2393,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199,126],"tags":[414,356,444],"class_list":["post-2403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-konferenzen","category-presse","tag-dora","tag-nis","tag-uk"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2403"}],"version-history":[{"count":2,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2403\/revisions"}],"predecessor-version":[{"id":2407,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2403\/revisions\/2407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/2393"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}