{"id":2904,"date":"2024-03-22T14:24:17","date_gmt":"2024-03-22T14:24:17","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=2904"},"modified":"2026-04-08T10:35:38","modified_gmt":"2026-04-08T09:35:38","slug":"nis2-changes-to-data-compliance","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/","title":{"rendered":"NIS2: Changes to Data Compliance"},"content":{"rendered":"\n<p>Uncertain whether your data security strategy aligns with the European Union\u2019s new Network and Information Security Directive (<a href=\"https:\/\/cwsisecurity.com\/nis2-and-microsoft\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a>)? Given the rise in remote work across a multitude of devices and our growing interconnected world,&nbsp;meeting the heightened expectations for <a href=\"https:\/\/cwsisecurity.com\/data-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">data security<\/a> by the October 2024 deadline may pose a challenge. The reassuring news is that we can assist and support you on your path to achieving <a href=\"https:\/\/cwsisecurity.com\/nis2-implications-for-europe-and-beyond\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a> compliance.<\/p>\n\n\n\n<div style=\"height:42px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-data-security-is-an-everchanging-challenge\">Data Security is an Everchanging Challenge<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>According to findings from Microsoft, 74 percent of organisations they surveyed encountered incidents involving business data, including the exposure of intellectual property in the past year.<\/strong><sup data-fn=\"b0f61468-b33d-44b0-9f4e-33678f92da0e\" class=\"fn\"><a href=\"\/#b0f61468-b33d-44b0-9f4e-33678f92da0e\" id=\"b0f61468-b33d-44b0-9f4e-33678f92da0e-link\">1<\/a><\/sup><\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Data breaches can inflict severe financial consequences on organisations and the situation becomes even more critical when non-compliance is taken into account. Ensuring data security requires layers of protection to help safeguard data across its various locations and importantly, those layers of security are aligned with the measures <a href=\"https:\/\/cwsisecurity.com\/5-key-requirements-for-nis2-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a> will require.<\/p>\n\n\n\n<p><strong>NIS2 Data Security Requirements:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/cwsisecurity.com\/should-businesses-worry-about-the-encryption-and-security-of-whatsapp\/\" target=\"_blank\" rel=\"noreferrer noopener\">Encryption<\/a><\/li>\n\n\n\n<li>Risk Management and Analysis<\/li>\n\n\n\n<li>Asset Management and Risk Analysis<\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:42px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Encryption Requirement<\/mark><\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Implementing proactive measures, such as robust encryption, is crucial for safeguarding systems against cyber threats. Utilising end-to-end encryption ensures that data remains unreadable to external entities and remains secure from the moment it is transmitted from one device to another.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Risk Management and Analysis Requirement<\/mark><\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Organisations will encounter fresh reporting obligations aimed at businesses to better equip them in handling cyber-attacks. Additionally, they must establish a crisis management plan to effectively respond quickly and effectively to cyber incidents, with the goal of minimising the impact and prevent further attacks in the future.<\/p>\n\n\n\n<p>IT teams needed to possess an understanding of what is normal activity within their organisation enabling them to assess risk levels and take the appropriate action.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Asset Management and Risk Analysis<\/mark><\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Businesses will be required to have a complete visibility and handle of their data so that they can apply effective access management to reduce the risk of a data leak. As we look to the future businesses who are beginning to adopt AI tools, it is essential they map their data to make sure AI is adopted securely, mediating the risk of oversharing of sensitive data or a devastating data leak.<\/p>\n\n\n\n<div style=\"height:67px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Whitepaper: Are You Ready for NIS2?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">Kick Start Your Journey Towards NIS2 Compliance<\/mark><\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To take your first step towards NIS2 compliance, we have composed a whitepaper to help you gain a greater understanding of the NIS2 regulations. Dive into why the upcoming directive is relevant to your organisation and what are the first steps you should be taking.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/02\/Website-landscape-images-1.png\" alt=\"lady working on laptop in an office\" class=\"wp-image-2785\"\/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 gap-1 mb-3\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"btn btn-outline-primary has-text-align-center wp-element-button\" href=\"https:\/\/cwsiinsights.cwsi.ie\/are_you_ready_for_nis2\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">Download Here<\/mark><\/strong><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:67px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">How Can CWSI and Microsoft Help You on Your NIS2 Journey?<\/mark><\/h2>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">When it comes to NIS2 you need an experienced partner.<\/mark><\/strong><\/p>\n\n\n\n<p>For more than a decade, CWSI has been instrumental in enabling our customers to thrive within the continually evolving threat landscape. Our team of security experts have extensive experience and apply strict security policies and processes from our deep knowledge and understanding of the forthcoming NIS2 Directive.<\/p>\n\n\n\n<p>CWSI can assist you in assessing if your organisation falls within the scope of the NIS2 Directive. For each key requirement of the directive, CWSI can help discover and document your current state of preparedness and provide you with an individual roadmap to achieving NIS2 compliance.<\/p>\n\n\n\n<p>Holding three Microsoft Security Specialisations in Identity and Access Management, Information Protection and&nbsp;<a href=\"https:\/\/cwsisecurity.com\/governance-risk-compliance-advisory-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">Governance<\/a>&nbsp;and Threat Protection, CWSI serves as an expert in these crucial NIS2 areas \u2013 Identity, Data Governance, Security Threat Protection and Response, Education and Awareness and Security Policy.<\/p>\n\n\n\n<p>It\u2019s our people and their expertise that ensure that your business can close the gap between its current security state and compliance.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"b0f61468-b33d-44b0-9f4e-33678f92da0e\"><a href=\"https:\/\/aka.ms\/datasecurityindex\" target=\"_blank\" rel=\"noreferrer noopener\">Data Security Index: Trends, insights, and strategies to secure data<\/a> <a href=\"#b0f61468-b33d-44b0-9f4e-33678f92da0e-link\" aria-label=\"Ga naar voetnoot referentie 1\">\u21a9\ufe0e<\/a><\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>Uncertain whether your data security strategy aligns with the European Union\u2019s new Network and Information Security Directive (NIS2)? Given the rise in remote work across a multitude of devices and our growing interconnected world,&nbsp;meeting the heightened expectations for data security by the October 2024 deadline may pose a challenge. The reassuring news is that we [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":491,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"[{\"content\":\"<a href=\\\"https:\/\/aka.ms\/datasecurityindex\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener\\\">Data Security Index: Trends, insights, and strategies to secure data<\/a>\",\"id\":\"b0f61468-b33d-44b0-9f4e-33678f92da0e\"}]"},"categories":[93,4,1],"tags":[],"class_list":["post-2904","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","category-uncategorised"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIS2: Changes to Data Compliance - CWSI<\/title>\n<meta name=\"description\" content=\"Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2: Changes to Data Compliance\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-22T14:24:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T09:35:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/\"},\"headline\":\"NIS2: Changes to Data Compliance\",\"datePublished\":\"2024-03-22T14:24:17+00:00\",\"dateModified\":\"2026-04-08T09:35:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/\"},\"wordCount\":606,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\",\"Uncategorised\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/\",\"name\":\"NIS2: Changes to Data Compliance - CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2024-03-22T14:24:17+00:00\",\"dateModified\":\"2026-04-08T09:35:38+00:00\",\"description\":\"Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/nis2-changes-to-data-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2: Changes to Data Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIS2: Changes to Data Compliance - CWSI","description":"Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/","og_locale":"nl_NL","og_type":"article","og_title":"NIS2: Changes to Data Compliance","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/","og_site_name":"CWSI","article_published_time":"2024-03-22T14:24:17+00:00","article_modified_time":"2026-04-08T09:35:38+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/"},"headline":"NIS2: Changes to Data Compliance","datePublished":"2024-03-22T14:24:17+00:00","dateModified":"2026-04-08T09:35:38+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/"},"wordCount":606,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice","Uncategorised"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/","url":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/","name":"NIS2: Changes to Data Compliance - CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/#primaryimage"},"thumbnailUrl":"","datePublished":"2024-03-22T14:24:17+00:00","dateModified":"2026-04-08T09:35:38+00:00","description":"Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/nis2-changes-to-data-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"NIS2: Changes to Data Compliance"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=2904"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2904\/revisions"}],"predecessor-version":[{"id":8355,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2904\/revisions\/8355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=2904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=2904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=2904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}