8. Conclusion
The intensive introduction of new, increasingly complex technologies, often interconnected with an untrusted network - the Internet - is creating new vulnerabilities that can easily be exploited by malicious individuals or belligerent states.
In this context, the NIS2 directive, ISO standards and best practices are real assets, as they aim to harmonize cybersecurity requirements between EU member states. Ultimately, all these "tools" for the overall cyber-resilience of all our information assets should enable effective protection of our most strategic assets.
As far as the NIS2 directive is concerned, it should be borne in mind that it is intended as a guideline for cyber resilience in :
increasing the scope of application: the NIS2 directive includes 18 sectors that will be subject to security...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
""
(
81 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!