{"id":5976,"date":"2024-03-13T16:17:22","date_gmt":"2024-03-13T16:17:22","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=5976"},"modified":"2026-05-07T12:11:47","modified_gmt":"2026-05-07T11:11:47","slug":"myth-busting-nis2-and-the-road-to-compliance","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/","title":{"rendered":"Myth Busting NIS2 and the Road to Compliance"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-7387b849 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\" id=\"h-understand-nis2-requirements-without-getting-lost-in-the-noise\">Understand NIS2 requirements without getting lost in the noise.<\/h2>\n\n\n\n<div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">With the NIS2 compliance deadline approaching, many organisations are facing growing pressure to understand what the directive means in practice and what steps need to happen next. Between evolving guidance, technical requirements and conflicting information, it can quickly become difficult to separate what matters from what does not.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this on-demand webinar, CWSI and Microsoft take a practical look at NIS2, how it builds on the original NIS1 directive, which organisations are affected, and the first steps businesses should consider when working towards compliance.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">CWSI Secure Data Practice Lead Paul Conaty is joined by Microsoft Data Security &amp; Compliance Technical Specialist James Leo to explore the realities organisations are facing, clarify common misconceptions and outline a more manageable approach to preparing for NIS2 requirements.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How NIS2 expands on the original NIS1 directive<\/li>\n\n\n\n<li>Which organisations are impacted by NIS2Common challenges businesses face when preparing for compliance<\/li>\n\n\n\n<li>The first practical steps towards NIS2 readiness<\/li>\n\n\n\n<li>Ways to strengthen governance, security and resilience<\/li>\n\n\n\n<li>How to approach compliance in a more structured and manageable way<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Watch now to gain a clearer understanding of NIS2 requirements and discover practical steps that can help your organisation move towards compliance with greater confidence and less unnecessary complexity.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2026-05-06\/2vfqb1\" width=\"100%\" height=\"700\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understand NIS2 requirements without getting lost in the noise. With the NIS2 compliance deadline approaching, many organisations are facing growing pressure to understand what the directive means in practice and what steps need to happen next. Between evolving guidance, technical requirements and conflicting information, it can quickly become difficult to separate what matters from what [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8585,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[7,320],"tags":[],"sector":[],"solution":[305],"class_list":["post-5976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-event","category-on-demand-webinar","solution-secure-data"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Myth Busting NIS2 and the Road to Compliance - CWSI<\/title>\n<meta name=\"description\" content=\"Watch our webinar on demand to get a clearer understanding of NIS2 requirements and discover practical steps that can help your organisation move towards compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Myth Busting NIS2 and the Road to Compliance\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-13T16:17:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T11:11:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/04\/iStock-626637134-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Kemble\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/\"},\"headline\":\"Myth Busting NIS2 and the Road to Compliance\",\"datePublished\":\"2024-03-13T16:17:22+00:00\",\"dateModified\":\"2026-05-07T11:11:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/\"},\"wordCount\":217,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/iStock-626637134-scaled.jpg\",\"articleSection\":[\"Events\",\"On-demand (Webinar)\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/\",\"name\":\"Myth Busting NIS2 and the Road to Compliance - CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/iStock-626637134-scaled.jpg\",\"datePublished\":\"2024-03-13T16:17:22+00:00\",\"dateModified\":\"2026-05-07T11:11:47+00:00\",\"description\":\"Watch our webinar on demand to get a clearer understanding of NIS2 requirements and discover practical steps that can help your organisation move towards compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/iStock-626637134-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/iStock-626637134-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Office friends enjoying their work together\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/myth-busting-nis2-and-the-road-to-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Myth Busting NIS2 and the Road to Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/6f6d1173b2fa23703fc409fb3bf6fbc9\",\"name\":\"Emma Kemble\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2531bcbfccdb644c7b72602bae4122673dc7fec3662867fe7cf2f4120930ede?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2531bcbfccdb644c7b72602bae4122673dc7fec3662867fe7cf2f4120930ede?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2531bcbfccdb644c7b72602bae4122673dc7fec3662867fe7cf2f4120930ede?s=96&d=mm&r=g\",\"caption\":\"Emma Kemble\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Myth Busting NIS2 and the Road to Compliance - CWSI","description":"Watch our webinar on demand to get a clearer understanding of NIS2 requirements and discover practical steps that can help your organisation move towards compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/","og_locale":"nl_NL","og_type":"article","og_title":"Myth Busting NIS2 and the Road to Compliance","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/","og_site_name":"CWSI","article_published_time":"2024-03-13T16:17:22+00:00","article_modified_time":"2026-05-07T11:11:47+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/04\/iStock-626637134-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"Emma Kemble","Geschatte leestijd":"2 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/"},"headline":"Myth Busting NIS2 and the Road to Compliance","datePublished":"2024-03-13T16:17:22+00:00","dateModified":"2026-05-07T11:11:47+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/"},"wordCount":217,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/04\/iStock-626637134-scaled.jpg","articleSection":["Events","On-demand (Webinar)"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/","url":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/","name":"Myth Busting NIS2 and the Road to Compliance - CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/04\/iStock-626637134-scaled.jpg","datePublished":"2024-03-13T16:17:22+00:00","dateModified":"2026-05-07T11:11:47+00:00","description":"Watch our webinar on demand to get a clearer understanding of NIS2 requirements and discover practical steps that can help your organisation move towards compliance.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/#primaryimage","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/04\/iStock-626637134-scaled.jpg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/04\/iStock-626637134-scaled.jpg","width":2560,"height":1707,"caption":"Office friends enjoying their work together"},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/myth-busting-nis2-and-the-road-to-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Myth Busting NIS2 and the Road to Compliance"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/6f6d1173b2fa23703fc409fb3bf6fbc9","name":"Emma Kemble","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/f2531bcbfccdb644c7b72602bae4122673dc7fec3662867fe7cf2f4120930ede?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f2531bcbfccdb644c7b72602bae4122673dc7fec3662867fe7cf2f4120930ede?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2531bcbfccdb644c7b72602bae4122673dc7fec3662867fe7cf2f4120930ede?s=96&d=mm&r=g","caption":"Emma Kemble"}}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/5976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=5976"}],"version-history":[{"count":3,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/5976\/revisions"}],"predecessor-version":[{"id":8926,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/5976\/revisions\/8926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media\/8585"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=5976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=5976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=5976"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/sector?post=5976"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/solution?post=5976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}