<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Nicolas Lefebvre, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/nicolas-lefebvre/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 04 Oct 2021 09:25:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Nicolas Lefebvre, Auteur</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>While preparing the NIS 2, update of the European overview of NIS transposition by the Member States&#8230;toward convergence ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/09/en-pleine-preparation-de-la-nis-v2-mise-a-jour-du-tour-dhorizon-europeen-de-transposition-de-la-directive-nis-par-les-etats-membres-vers-une-convergence/</link>
		
		<dc:creator><![CDATA[Nicolas Lefebvre]]></dc:creator>
		<pubDate>Tue, 21 Sep 2021 17:30:00 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[European directive]]></category>
		<category><![CDATA[NIS]]></category>
		<category><![CDATA[regulation]]></category>
		<guid isPermaLink="false">http://riskinsight-prepro.s189758.zephyr32.atester.fr/?p=16638</guid>

					<description><![CDATA[<p>The Network and Information System Security &#8211; (UE) 2016/1148 directive, commonly referred to as NIS,  was a European directive adopted by the European parliament on July, 6th , 2016. It has been transposed by member states into their national legislations...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/en-pleine-preparation-de-la-nis-v2-mise-a-jour-du-tour-dhorizon-europeen-de-transposition-de-la-directive-nis-par-les-etats-membres-vers-une-convergence/">While preparing the NIS 2, update of the European overview of NIS transposition by the Member States&#8230;toward convergence ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The <a href="https://eur-lex.europa.eu/legal-content/FR/TXT/HTML/?uri=CELEX:32016L1148"><em>Network and Information System Security &#8211; (UE) 2016/1148</em></a> directive, commonly referred to as <strong>NIS</strong>,  was a European directive adopted by the European parliament on July, 6<sup>th</sup> , 2016. It has been transposed by member states into their national legislations until May 9<sup>th</sup>, 2018. In the United Kingdom, the NIS requirements have been included in <a href="https://www.legislation.gov.uk/uksi/2018/506/pdfs/uksi_20180506_en.pdf">The Network and Information Systems Regulation</a>  which came  into force on May 10<sup>th</sup>, 2018 and  the <a href="https://www.legislation.gov.uk/uksi/2020/1245/pdfs/uksi_20201245_en.pdf">The Network and Information Systems (Amendment and Transitional Provision etc.) Regulations</a>  came into force on December 31<sup>st</sup>, 2020.</p>
<p style="text-align: justify;">The NIS directive is the <strong>first initiative of EU-wide legislation on cybersecurity</strong>. Its goal is to <strong>ensure a high and common level of security for European information systems and networks</strong>. To achieve this objective the directive focuses on four key points:</p>
<ul style="text-align: justify;">
<li>Consolidating the member states’ <strong>national cybersecurity capabilities</strong></li>
<li>Creating a <strong>political and organizational cooperation framework</strong> on cybersecurity across the EU,</li>
<li>Ensuring the cybersecurity of <strong>operators of essential services</strong> (OES). OES are private or public entities <strong>providing essential services for the maintenance of economic and societal activities</strong>. The provision of these services <strong>depends on network and information systems</strong>.</li>
<li>Ensuring the cybersecurity of <strong>digital service providers</strong> (DSP). DSPs are defined as “<em>any service normally provided for remuneration, at a distance by electronic means and at the individual request of a recipient of services</em>”<a href="#_ftn1" name="_ftnref1">[1]</a>. Three types of services are mentioned in the NIS Directive: <strong>Cloud computing services</strong>, <strong>online marketplace</strong> and <strong>online search engines</strong>.</li>
</ul>
<p style="text-align: justify;">On the one hand, the security of operators of essential services is a <strong>sovereign prerogative of states while on</strong>n the other hand, the role of the EU is to ensure the <strong>proper functioning of the European market</strong>. In order to reconcile these two objectives, the NIS directive clearly states that: “<em>This Directive should be without prejudice to the possibility for each Member State to take the necessary measures to ensure the protection of the <strong>essential interests of its security</strong>, to <strong>safeguard public policy</strong> and <strong>public security</strong>, and to allow for the investigation, detection and prosecution of criminal offences.”</em><a href="#_ftn2" name="_ftnref2"><em><strong>[2]</strong></em></a><em>.</em> Each country can <strong>therefore adapt the legislative text to fit its priorities and strategic objectives</strong> as well as to guarantee its security and that of its networks and information systems. The NIS directive, however, sets <strong>common requirements</strong> in terms of; <strong>transposition of the directive into national legislation</strong>, of <strong>sectors concerned</strong>, of <strong>risk identification</strong>, of <strong>supervision</strong>, of <strong>implementation of technical and organisational measures</strong>, of <strong>cyber incident notification</strong>, and of <strong>sanctions in case of non-compliance</strong>.</p>
<p style="text-align: justify;">This analysis brings together elements on the transposition of the NIS directive in each of the <strong>27 member states</strong> of the European Union, as well as in the <strong>United-Kingdom</strong> and <strong>Switzerland</strong>. It highlights the various approaches and underlines the similarities and differences between countries, especially in the context of the upcoming evolution of the legislative text. Indeed, a <strong>proposal to revise the NIS directive</strong> has been adopted by the European Commission in December 2020 and <strong>aims at replacing the original text</strong>.</p>
<h1 style="text-align: justify;">An achieved transposition for certain themes…</h1>
<p><strong>Different types and numbers of legislative texts to transpose the NIS</strong></p>
<p><img decoding="async" class="size-medium wp-image-16866 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3-437x82.png" alt="" width="437" height="82" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3-437x82.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3-768x144.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image1-3.png 1526w" sizes="(max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;"><strong>The transposition of the NIS occurred in all the national legislations of EU member states. </strong>However, there is <strong>heterogeneity in the type of legislative text adopted</strong>. In most countries, the transposition takes the form of a <strong>law</strong> (<strong>twenty-two countries</strong>), to which <strong>thirteen countries</strong> have added <strong>at least on other legislative text</strong> (ordinance, decree, regulation, amendment or ministerial decision). In <strong>two countries,</strong> the transposition took place in <strong>each sectoral law</strong> which increases the number of legislative texts (<strong>four texts or more</strong>).</p>
<p><img fetchpriority="high" decoding="async" class=" wp-image-16878 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-418x191.png" alt="" width="499" height="228" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-418x191.png 418w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-768x351.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3-1536x701.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image7-3.png 1818w" sizes="(max-width: 499px) 100vw, 499px" /></p>
<p><strong>A general implementation of cyber incident notification processes</strong></p>
<p><img decoding="async" class="size-medium wp-image-16868 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3-437x105.png" alt="" width="437" height="105" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3-437x105.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3-768x185.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image2-3.png 1152w" sizes="(max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;"><strong>All countries </strong>managed to implement cyber incident notification processes. Once again, there are various approaches depending on the country.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-16880 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-400x191.png" alt="" width="457" height="218" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-400x191.png 400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-768x367.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3-1536x734.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image8-3.png 1934w" sizes="auto, (max-width: 457px) 100vw, 457px" /></p>
<p style="text-align: justify;">There are six different procedures for transmitting alerts during a cyber incident:</p>
<ul style="text-align: justify;">
<li>In the first case (<strong>nine countries</strong>), the operator of essential services must first notify the <strong>competent national authority</strong> of the occurrence of a cyber incident,</li>
<li>A second process (<strong>ten countries</strong>) exists in which the first point of contact is the <strong>CSIRT</strong>, the <strong>Computer Security Incident Response Team</strong>, also called <strong>CERT</strong> (Computer Emergency Response Team),</li>
<li>In a lower number of cases (<strong>three countries</strong>), the OES must notify the <strong>competent sectoral authority</strong>,</li>
<li>The notification of cyber incident is carried out via a <strong>secure platform</strong> in <strong>four countries</strong>.</li>
<li>Even less frequently (<strong>two countries</strong>), the <strong>single point of contact</strong> (SPOC) has to be alerted.</li>
<li>Finally, for one country (Hungary), the OES alerts an <strong>event management centre</strong>.</li>
</ul>
<p style="text-align: justify;">In addition,<strong> all member states</strong> must notify the <strong>point of contact of a member state,</strong> if it is also affected by the cyber incident, and must inform the <strong>public</strong> when necessary.</p>
<p><strong>To comply with the constraints imposed by the NIS, certain states have even gone further</strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-16870 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3-437x103.png" alt="" width="437" height="103" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3-437x103.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3-768x181.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image3-3.png 1340w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;">The NIS directive initially applies to the following sectors: <strong>transport, energy, health, drinking water, banking, finance, </strong>and<strong> digital</strong>. In the transposition, more <strong>than half of the analysed countries</strong> added other essential <strong>sectors and sub-sectors</strong> in addition to the seven previously mentioned. They are listed below, sorted by frequency of occurrence :</p>
<ul style="text-align: justify;">
<li>Austria, Croatia, Cyprus, Lithuania, Malta, Slovakia, Spain and Switzerland also mention<strong> public administration</strong>,</li>
<li>Cyprus, Estonia, Germany, Lithuania, the Netherlands, Slovakia, Spain and Switzerland add <strong>information and communication technologies</strong> and <strong>IT</strong>.</li>
<li>Estonia, France, Germany, Hungary, Lithuania, Slovenia, Spain, Switzerland add</li>
<li>The Czech Republic, Lithuania, the Netherlands, Spain complete the list with <strong>industry</strong>.</li>
<li>Estonia, Germany and Switzerland also mention <strong>heating and housing</strong>.</li>
<li>Lithuania and Slovakia subjoin <strong>defence</strong>, Switzerland <strong>national security</strong>.</li>
<li>Lithuania and Slovenia add the <strong>protection of the environment</strong>.</li>
<li>France is the only one to add <strong>education</strong>.</li>
<li>Spain is the only one to mention <strong>space</strong> and <strong>research centres</strong>.</li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-16882 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-392x191.png" alt="" width="443" height="216" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-392x191.png 392w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-768x374.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3-1536x749.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image9-3.png 1908w" sizes="auto, (max-width: 443px) 100vw, 443px" /></p>
<h1 style="text-align: left;">… However, the variation needs to be finalized on other themes.</h1>
<p><strong>Strong disparities on state supervision</strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-16876 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3-437x103.png" alt="" width="437" height="103" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3-437x103.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3-768x181.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image6-3.png 1238w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;">Several categories and different levels of control are exercised by authorities to certify compliance with the NIS. The strong disparities concern in particular the <strong>authorities ensuring the control</strong> (national or sectoral authority) as well as the <strong>expected level of control</strong> (supervision, inspection, audit, evaluation…): there is <strong>no consensus</strong> around the process to adopt. Moreover, <strong>six countries</strong> <strong>do not provide any information </strong>on the type of supervision implemented.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-16884 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-433x191.png" alt="" width="526" height="232" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-433x191.png 433w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-768x338.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3-1536x677.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image10-3.png 1906w" sizes="auto, (max-width: 526px) 100vw, 526px" /></p>
<p><strong>Heterogeneous level and diffusion of security measures</strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-16872 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3-437x100.png" alt="" width="437" height="100" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3-437x100.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3-768x176.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image4-3.png 1381w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;">Except for <strong>six countries</strong> for which no information has been given on the type of security measures implemented, there are two main approaches:</p>
<ul style="text-align: justify;">
<li>The security measures are directly mentioned in the <strong>body of the legislative text(s)</strong> transposing the NIS (<strong>eleven countries</strong>),</li>
<li>They are enumerated in; a <strong>guide</strong>, a <strong>list of recommendations</strong>, an <strong>online publication</strong> and established by <strong>different entities</strong> (government, regulation, decree…) in <strong>twelve countries</strong>.</li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-16886 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-386x191.png" alt="" width="453" height="224" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-386x191.png 386w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-768x380.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3-1536x759.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image11-3.png 1726w" sizes="auto, (max-width: 453px) 100vw, 453px" /></p>
<p style="text-align: justify;">For the measures included in the body of the legislative text(s), there are <strong>similarities</strong> on their organisation:</p>
<ul style="text-align: justify;">
<li>The <strong>international norm ISO27001</strong> and the <strong>cybersecurity framework NIST</strong> are used as models to establish the security measures in respectively <strong>four and two countries</strong>.</li>
<li>The same <strong>six categories</strong> (security of systems and installations, handling of incidents, business continuity management…) are used in <strong>four countries</strong>.</li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-16888 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-395x191.png" alt="" width="437" height="211" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3-1536x743.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image12-3.png 1772w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p><strong>Different amount and format of penalties</strong></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-16874 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3-437x101.png" alt="" width="437" height="101" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3-437x101.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3-768x178.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image5-3.png 1211w" sizes="auto, (max-width: 437px) 100vw, 437px" /></p>
<p style="text-align: justify;">The financial penalty for not complying with the directive varies in the different countries and can range from <strong>less than a 100k</strong><strong>€ to 20M</strong><strong>€ maximum</strong> (except for Finland which has not implemented any sanctions). Most countries have chosen to apply a fine of <strong>less than 200k</strong><strong>€</strong> (<strong>eighteen countries</strong>) whereas <strong>four countries</strong> have decided that the maximum should be <strong>beyond 1M</strong><strong>€</strong>. It should also be noted that the sanctions are likely to <strong>accumulate in the event of</strong> <strong>multiple non-conformities</strong>, which does not make the <strong>overall maximum amount of a sanction</strong> a certainty.</p>
<p style="text-align: justify;"><strong>Imprisonment sentences</strong> have been implemented in <strong>two countries</strong> (Belgium and Cyprus).</p>
<p style="text-align: justify;">Finally, <strong>four countries</strong> have not yet communicated the penalties in case of non-compliance.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-16890 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-372x191.png" alt="" width="448" height="230" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-372x191.png 372w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-768x394.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3-1536x788.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/09/Image13-3.png 1770w" sizes="auto, (max-width: 448px) 100vw, 448px" /></p>
<h1 style="text-align: justify;"><strong>Conclusion</strong></h1>
<p style="text-align: justify;">The goal of the NIS directive was to <strong>address the unequal levels of security of networks and information systems</strong> within the European Union. To achieve it, it has now been transposed in <strong>all the member states</strong>. This has led to the <strong>creation of a common security framework</strong> while also leaving the possibility for states to ensure <strong>their security and the protection of their essential and strategic interests</strong>. Indeed, <strong>each country designates its operators of essential services</strong> and <strong>chooses the sectors it deems the most strategic to protect</strong>. In addition, the transposition of the directive as well as the supervision and cyber incident notification processes are carried out by the <strong>authority deemed competent. This is non dependant</strong>whether <strong>national</strong> or <strong>sectoral</strong>, whether it is the <strong>CSIRT</strong> or the <strong>single point of contact</strong>. This flexibility makes it possible for the NIS to adapt to the organisation of all member states. There are <strong>visible similarities</strong> creating groupings between the countries, as well as <strong>major dissimilarities.</strong> These leave room for many variations and make the comparison relevant and rich.</p>
<p style="text-align: justify;">A <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52020PC0823">proposal to revise the NIS directive</a>  was adopted in December 2020, but its provisional calendar has not yet been communicated. However, its main objectives has  been listed and includes <strong>reaching a higher level of cybersecurity and more homogeneous processes</strong> within the EU, while further <strong>increasing the cooperation between member states</strong>. The revision of the NIS directive revolves around;</p>
<ul style="text-align: justify;">
<li>the <strong>abandonment of the distinction between OES and DSPs</strong></li>
<li>the <strong>designation of OES by the Directive and not the states</strong></li>
<li>the <strong>creation of a new European network for major cyber incidents</strong></li>
<li><strong>imposition of CSIRTs supportive of entities</strong>,</li>
<li>the <strong>control by the states of the technical and organisational measures implemented</strong> (for risk analysis and crisis management).</li>
</ul>
<p style="text-align: justify;">These changes will be detailed further in a new article.</p>
<p> </p>
<h3 style="text-align: justify;">Sources :</h3>
<p style="text-align: justify;">Directive Network and Information System &#8211; Article ANSSI Link: <a style="font-size: revert;" href="https://www.ssi.gouv.fr/entreprise/reglementation/directive-nis/">Link to the article on NIS Directive</a></p>
<p style="text-align: justify;">Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union Link : <a style="font-size: revert;" href="https://eur-lex.europa.eu/legal-content/FR/TXT/HTML/?uri=CELEX:32016L1148">Link to the NIS Directive</a></p>
<p style="text-align: justify;">On Digital Service Providers (DSPs) – ANSSI Article – May 23rd 2018 Link : <a style="font-size: revert;" href="https://www.ssi.gouv.fr/entreprise/reglementation/directive-nis/faq-des-fournisseurs-de-service-numerique-fsn/#:~:text=La%20directive%20NIS%20d%C3%A9finit%20le,'un%20destinataire%20de%20services%20%C2%BB">Link to the article on DSPs</a></p>
<p style="text-align: justify;">On Operators of Essential Services (OES) – ANSSI Article Link : <a style="font-size: revert;" href="https://www.ssi.gouv.fr/entreprise/reglementation/directive-nis/faq-operateurs-de-services-essentiels-ose/#:~:text=Qu'est%2Dce%20qu',%C3%A9conomie%20ou%20de%20la%20soci%C3%A9t%C3%A9">Link to the article on OES</a></p>
<p style="text-align: justify;">Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148 Link: <a style="font-size: revert;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52020PC0823">Link to the proposal of the revised NIS Directive</a></p>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a> Directive (EU) 2015/1535 of the European Parliament and of the Council of 9 September 2015.</p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a> Directive (UE) 2016/1148 of the European Parliament and of the Council of 6 July 2016.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/09/en-pleine-preparation-de-la-nis-v2-mise-a-jour-du-tour-dhorizon-europeen-de-transposition-de-la-directive-nis-par-les-etats-membres-vers-une-convergence/">While preparing the NIS 2, update of the European overview of NIS transposition by the Member States&#8230;toward convergence ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
