{"id":1822,"date":"2024-12-05T12:05:51","date_gmt":"2024-12-05T11:05:51","guid":{"rendered":"https:\/\/cyberoperations.hu\/?p=1822"},"modified":"2025-05-05T14:57:24","modified_gmt":"2025-05-05T12:57:24","slug":"51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted","status":"publish","type":"post","link":"https:\/\/cyberoperations.hu\/de\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/","title":{"rendered":"NIS2 \u2013 Was jeder Unternehmensleiter \u00fcber die neuen Cybersicherheitsvorschriften der EU wissen muss"},"content":{"rendered":"<p class=\"\" data-start=\"278\" data-end=\"654\">Die neue Cybersicherheitsverordnung der Europ\u00e4ischen Union, die <strong data-start=\"329\" data-end=\"346\">NIS2-Richtlinie<\/strong> (Richtlinie 2 zur Netzwerk- und Informationssicherheit), die am 18. Oktober 2024 in Kraft trat, und alle Mitgliedstaaten \u2013 einschlie\u00dflich Ungarn \u2013 sind verpflichtet, sie bis zum 17. Oktober 2025 in ihre nationale Rechtsordnung umzusetzen. Das Ziel ist klar: <strong data-start=\"557\" data-end=\"653\">einen besseren Schutz der europ\u00e4ischen Wirtschaft vor digitalen Bedrohungen bieten<\/strong>.<\/p>\n<h3 class=\"\" data-start=\"656\" data-end=\"684\"><strong data-start=\"660\" data-end=\"684\">Warum ist NIS2 wichtig?<\/strong><\/h3>\n<p class=\"\" data-start=\"686\" data-end=\"999\">Die vorherige NIS-Richtlinie legte bereits den Grundstein f\u00fcr die Cybersicherheit kritischer Infrastrukturen, doch seitdem sind die Bedrohungen deutlich komplexer geworden. NIS2 erweitert nicht nur den Kreis der betroffenen Organisationen, sondern auch <strong data-start=\"889\" data-end=\"987\">strengere Sicherheitsanforderungen, st\u00e4rkere beh\u00f6rdliche Kontrollen und h\u00f6here Bu\u00dfgelder<\/strong> stellt auch vor.<\/p>\n<h3 class=\"\" data-start=\"1006\" data-end=\"1033\"><strong data-start=\"1010\" data-end=\"1033\">Wer ist von NIS2 betroffen?<\/strong><\/h3>\n<p class=\"\" data-start=\"1035\" data-end=\"1199\">Die NIS2-Richtlinie ist <strong data-start=\"1054\" data-end=\"1066\">Basic<\/strong> Und <strong data-start=\"1070\" data-end=\"1080\">wichtig<\/strong> Es richtet sich an Organisationen aller Branchen, unabh\u00e4ngig von Gr\u00f6\u00dfe und Rechtsform, sofern sie bestimmte Kriterien erf\u00fcllen.<\/p>\n<h4 class=\"\" data-start=\"1201\" data-end=\"1228\"><strong data-start=\"1206\" data-end=\"1228\">Grundlegende Sektoren:<\/strong><\/h4>\n<ul data-start=\"1229\" data-end=\"1496\">\n<li class=\"\" data-start=\"1229\" data-end=\"1271\">\n<p class=\"\" data-start=\"1231\" data-end=\"1271\">Energie (Strom, \u00d6l, Erdgas)<\/p>\n<\/li>\n<li class=\"\" data-start=\"1272\" data-end=\"1313\">\n<p class=\"\" data-start=\"1274\" data-end=\"1313\">Transport (Luft, Schiene, Stra\u00dfe, Wasser)<\/p>\n<\/li>\n<li class=\"\" data-start=\"1314\" data-end=\"1348\">\n<p class=\"\" data-start=\"1316\" data-end=\"1348\">Bank- und Finanzdienstleistungen<\/p>\n<\/li>\n<li class=\"\" data-start=\"1349\" data-end=\"1362\">\n<p class=\"\" data-start=\"1351\" data-end=\"1362\">Gesundheitspflege<\/p>\n<\/li>\n<li class=\"\" data-start=\"1363\" data-end=\"1392\">\n<p class=\"\" data-start=\"1365\" data-end=\"1392\">Trinkwasser- und Abwasseraufbereitung<\/p>\n<\/li>\n<li class=\"\" data-start=\"1393\" data-end=\"1462\">\n<p class=\"\" data-start=\"1395\" data-end=\"1462\">Digitale Infrastrukturen (z. B. Cloud-Anbieter, DNS-Anbieter)<\/p>\n<\/li>\n<li class=\"\" data-start=\"1463\" data-end=\"1484\">\n<p class=\"\" data-start=\"1465\" data-end=\"1484\">Regierungsbeh\u00f6rden<\/p>\n<\/li>\n<li class=\"\" data-start=\"1485\" data-end=\"1496\">\n<p class=\"\" data-start=\"1487\" data-end=\"1496\">Weltraumforschung<\/p>\n<\/li>\n<\/ul>\n<h4 class=\"\" data-start=\"1498\" data-end=\"1523\"><strong data-start=\"1503\" data-end=\"1523\">Wichtige Branchen:<\/strong><\/h4>\n<ul data-start=\"1524\" data-end=\"1701\">\n<li class=\"\" data-start=\"1524\" data-end=\"1574\">\n<p class=\"\" data-start=\"1526\" data-end=\"1574\">Produzierende Industrie (z. B. Pharma, Maschinenbau, chemische Industrie)<\/p>\n<\/li>\n<li class=\"\" data-start=\"1575\" data-end=\"1591\">\n<p class=\"\" data-start=\"1577\" data-end=\"1591\">Lebensmittelindustrie<\/p>\n<\/li>\n<li class=\"\" data-start=\"1592\" data-end=\"1620\">\n<p class=\"\" data-start=\"1594\" data-end=\"1620\">Post- und Kurierdienste<\/p>\n<\/li>\n<li class=\"\" data-start=\"1621\" data-end=\"1683\">\n<p class=\"\" data-start=\"1623\" data-end=\"1683\">Anbieter digitaler Dienste (z. B. Online-Marktpl\u00e4tze, Suchmaschinen)<\/p>\n<\/li>\n<li class=\"\" data-start=\"1684\" data-end=\"1701\">\n<p class=\"\" data-start=\"1686\" data-end=\"1701\">Abfallmanagement<\/p>\n<\/li>\n<\/ul>\n<h3 class=\"\" data-start=\"1708\" data-end=\"1738\"><strong data-start=\"1712\" data-end=\"1738\">Welche Verpflichtungen bestehen?<\/strong><\/h3>\n<p class=\"\" data-start=\"1740\" data-end=\"1867\">Basierend auf NIS2, die betroffenen Organisationen <strong data-start=\"1782\" data-end=\"1851\">Sie m\u00fcssen geeignete technische und organisatorische Ma\u00dfnahmen ergreifen<\/strong>, einschlie\u00dflich:<\/p>\n<p class=\"\" data-start=\"1869\" data-end=\"2214\">\u2705 Risikobewertung und -management<br data-start=\"1900\" data-end=\"1903\" \/>\u2705 Vorfallmanagement und Meldepflicht<br data-start=\"1949\" data-end=\"1952\" \/>\u2705 Netzwerk- und Informationssicherheitsrichtlinien<br data-start=\"1999\" data-end=\"2002\" \/>\u2705 Zugriffsverwaltung und Berechtigungskontrolle<br data-start=\"2047\" data-end=\"2050\" \/>\u2705 Cybersicherheitsschulung f\u00fcr Mitarbeiter<br data-start=\"2098\" data-end=\"2101\" \/>\u2705 Risikomanagement in der Lieferkette<br data-start=\"2139\" data-end=\"2142\" \/>\u2705 Managerhaftung \u2013 Gesch\u00e4ftsf\u00fchrer k\u00f6nnen pers\u00f6nlich haftbar gemacht werden<\/p>\n<h3 class=\"\" data-start=\"2221\" data-end=\"2278\"><strong data-start=\"2225\" data-end=\"2278\">Was passiert, wenn Sie die Voraussetzungen nicht erf\u00fcllen?<\/strong><\/h3>\n<p class=\"\" data-start=\"2280\" data-end=\"2362\">Die Verordnung <strong data-start=\"2294\" data-end=\"2317\">strenge Sanktionen<\/strong> Die betroffenen Unternehmen:<\/p>\n<ul data-start=\"2364\" data-end=\"2631\">\n<li class=\"\" data-start=\"2364\" data-end=\"2440\">\n<p class=\"\" data-start=\"2366\" data-end=\"2440\">Ernst <strong data-start=\"2373\" data-end=\"2391\">f\u00fcr Geldstrafen<\/strong> zu erwarten sind (bis zu mehreren Millionen Euro),<\/p>\n<\/li>\n<li class=\"\" data-start=\"2441\" data-end=\"2514\">\n<p class=\"\" data-start=\"2443\" data-end=\"2514\">Sie k\u00f6nnten ihre Vertr\u00e4ge (insbesondere mit staatlichen und internationalen Partnern) verlieren,<\/p>\n<\/li>\n<li class=\"\" data-start=\"2515\" data-end=\"2565\">\n<p class=\"\" data-start=\"2517\" data-end=\"2565\">Ihr Ruf k\u00f6nnte irreparabel gesch\u00e4digt werden,<\/p>\n<\/li>\n<li class=\"\" data-start=\"2566\" data-end=\"2631\">\n<p class=\"\" data-start=\"2568\" data-end=\"2631\">Sie unterliegen m\u00f6glicherweise beh\u00f6rdlichen Ma\u00dfnahmen und obligatorischen Korrekturma\u00dfnahmen.<\/p>\n<\/li>\n<\/ul>\n<h3 class=\"\" data-start=\"2638\" data-end=\"2691\"><strong data-start=\"2642\" data-end=\"2691\">Was k\u00f6nnen Sie jetzt tun? \u2013 Schritte zur Compliance<\/strong><\/h3>\n<ol data-start=\"2693\" data-end=\"3026\">\n<li class=\"\" data-start=\"2693\" data-end=\"2783\">\n<p class=\"\" data-start=\"2696\" data-end=\"2783\"><strong data-start=\"2696\" data-end=\"2710\">Identifizieren<\/strong>ob Ihr Unternehmen von den von NIS2 abgedeckten Sektoren betroffen ist.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2784\" data-end=\"2882\">\n<p class=\"\" data-start=\"2787\" data-end=\"2882\"><strong data-start=\"2787\" data-end=\"2811\">Beginnen Sie mit den Vorbereitungen.<\/strong>: F\u00fchren Sie ein internes Audit durch und bewerten Sie vorhandene Sicherheitsma\u00dfnahmen.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2883\" data-end=\"2945\">\n<p class=\"\" data-start=\"2886\" data-end=\"2945\"><strong data-start=\"2886\" data-end=\"2919\">Entwickeln Sie einen Aktionsplan<\/strong> zur Einhaltung.<\/p>\n<\/li>\n<li class=\"\" data-start=\"2946\" data-end=\"3026\">\n<p class=\"\" data-start=\"2949\" data-end=\"3026\"><strong data-start=\"2949\" data-end=\"2988\">W\u00e4hlen Sie einen zuverl\u00e4ssigen professionellen Partner<\/strong>der Sie w\u00e4hrend des gesamten Prozesses unterst\u00fctzt.<\/p>\n<\/li>\n<\/ol>\n<h3 class=\"\" data-start=\"3033\" data-end=\"3075\"><strong data-start=\"3037\" data-end=\"3075\">Wie hilft CyberOperations.hu?<\/strong><\/h3>\n<p class=\"\" data-start=\"3077\" data-end=\"3385\">\u2705 <strong data-start=\"3079\" data-end=\"3096\">NIS2 Voraudit<\/strong> \u2013 Einsch\u00e4tzung des aktuellen Status<br data-start=\"3128\" data-end=\"3131\" \/>\u2705 <strong data-start=\"3133\" data-end=\"3165\">Erstellen eines Compliance-Plans<\/strong> \u2013 ma\u00dfgeschneiderte Ma\u00dfnahmen<br data-start=\"3195\" data-end=\"3198\" \/>\u2705 <strong data-start=\"3200\" data-end=\"3235\">Professionelle Beratung und Schulung<\/strong><br data-start=\"3235\" data-end=\"3238\" \/>\u2705 <strong data-start=\"3240\" data-end=\"3273\">Risikomanagementdokumentation<\/strong><br data-start=\"3273\" data-end=\"3276\" \/>\u2705 <strong data-start=\"3278\" data-end=\"3338\">Entwicklung eines Protokolls zur Meldung und Reaktion auf Vorf\u00e4lle<\/strong><br data-start=\"3338\" data-end=\"3341\" \/>\u2705 <strong data-start=\"3343\" data-end=\"3385\">Laufende \u00dcberwachung und Unterst\u00fctzung<\/strong><\/p>\n<h3 class=\"\" data-start=\"3392\" data-end=\"3427\"><strong data-start=\"3396\" data-end=\"3427\">Z\u00f6gern Sie nicht mit Ihren Vorbereitungen!<\/strong><\/h3>\n<ol start=\"2025\" data-start=\"3428\" data-end=\"3591\">\n<li class=\"\" data-start=\"3428\" data-end=\"3591\">\n<p class=\"\" data-start=\"3434\" data-end=\"3591\">Der 17. Oktober r\u00fcckt gef\u00e4hrlich n\u00e4her. Wer rechtzeitig schreitet, <strong data-start=\"3480\" data-end=\"3500\">nicht nur geeignet<\/strong>, sondern verschaffen sich auch einen Wettbewerbsvorteil im immer strengeren europ\u00e4ischen Regulierungsumfeld.<\/p>\n<\/li>\n<\/ol>\n<p class=\"\" data-start=\"3593\" data-end=\"3741\">\ud83d\udce9 <strong data-start=\"3596\" data-end=\"3636\">Kontaktieren Sie uns noch heute<\/strong>damit wir gemeinsam das IT-System Ihres Unternehmens sicher und konform machen k\u00f6nnen.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"EE8AXFsXp0\"><p><a href=\"https:\/\/cyberoperations.hu\/de\/product\/nis2-felkeszites\/\">NIS2-Vorbereitung<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"\u201eNIS2-Vorbereitung\u201c \u2013 Cyber Operations Group Ltd.\" src=\"https:\/\/cyberoperations.hu\/product\/nis2-felkeszites\/embed\/#?secret=5ubmE58cnl#?secret=EE8AXFsXp0\" data-secret=\"EE8AXFsXp0\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>","protected":false},"excerpt":{"rendered":"<p>Az Eur\u00f3pai Uni\u00f3 \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1sa, a NIS2 ir\u00e1nyelv (Network and Information Security Directive 2), 2024. okt\u00f3ber 18-\u00e1n l\u00e9pett hat\u00e1lyba, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-egyeb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIS2 \u2013 Amit minden v\u00e1llalatvezet\u0151nek tudnia kell az EU \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s\u00e1r\u00f3l - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/de\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 \u2013 Amit minden v\u00e1llalatvezet\u0151nek tudnia kell az EU \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s\u00e1r\u00f3l\" \/>\n<meta property=\"og:description\" content=\"Az Eur\u00f3pai Uni\u00f3 \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1sa, a NIS2 ir\u00e1nyelv (Network and Information Security Directive 2), 2024. okt\u00f3ber 18-\u00e1n l\u00e9pett hat\u00e1lyba, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/de\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-05T11:05:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-05T12:57:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/01\/NIS2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"497\" \/>\n\t<meta property=\"og:image:height\" content=\"496\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cyborg_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyborg_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/\"},\"author\":{\"name\":\"Cyborg_admin\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/7ce1406cf74ae0c6c219937d57fe6786\"},\"headline\":\"NIS2 \u2013 Amit minden v\u00e1llalatvezet\u0151nek tudnia kell az EU \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s\u00e1r\u00f3l\",\"datePublished\":\"2024-12-05T11:05:51+00:00\",\"dateModified\":\"2025-05-05T12:57:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/\"},\"wordCount\":657,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/NIS2.jpg\",\"articleSection\":[\"Egy\u00e9b\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/\",\"name\":\"NIS2 \u2013 Amit minden v\u00e1llalatvezet\u0151nek tudnia kell az EU \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s\u00e1r\u00f3l - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/NIS2.jpg\",\"datePublished\":\"2024-12-05T11:05:51+00:00\",\"dateModified\":\"2025-05-05T12:57:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/NIS2.jpg\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/NIS2.jpg\",\"width\":497,\"height\":496},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 \u2013 Amit minden v\u00e1llalatvezet\u0151nek tudnia kell az EU \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s\u00e1r\u00f3l\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/7ce1406cf74ae0c6c219937d57fe6786\",\"name\":\"Cyborg_admin\",\"sameAs\":[\"https:\\\/\\\/cyberoperations.hu\\\/product\\\/menedzselt-kibervedelem\\\/\"],\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/de\\\/author\\\/cyborg_admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIS2 \u2013 Was jeder Unternehmensleiter \u00fcber die neue Cybersicherheitsverordnung der EU wissen muss \u2013 Cyber Operations Group Kft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/de\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/","og_locale":"de_DE","og_type":"article","og_title":"NIS2 \u2013 Amit minden v\u00e1llalatvezet\u0151nek tudnia kell az EU \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s\u00e1r\u00f3l","og_description":"Az Eur\u00f3pai Uni\u00f3 \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1sa, a NIS2 ir\u00e1nyelv (Network and Information Security Directive 2), 2024. okt\u00f3ber 18-\u00e1n l\u00e9pett hat\u00e1lyba, [&hellip;]","og_url":"https:\/\/cyberoperations.hu\/de\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/","og_site_name":"Cyber Operations Group Kft.","article_published_time":"2024-12-05T11:05:51+00:00","article_modified_time":"2025-05-05T12:57:24+00:00","og_image":[{"width":497,"height":496,"url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/01\/NIS2.jpg","type":"image\/jpeg"}],"author":"Cyborg_admin","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Cyborg_admin","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/#article","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/"},"author":{"name":"Cyborg_admin","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/7ce1406cf74ae0c6c219937d57fe6786"},"headline":"NIS2 \u2013 Amit minden v\u00e1llalatvezet\u0151nek tudnia kell az EU \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s\u00e1r\u00f3l","datePublished":"2024-12-05T11:05:51+00:00","dateModified":"2025-05-05T12:57:24+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/"},"wordCount":657,"commentCount":0,"publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"image":{"@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/01\/NIS2.jpg","articleSection":["Egy\u00e9b"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/","url":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/","name":"NIS2 \u2013 Was jeder Unternehmensleiter \u00fcber die neue Cybersicherheitsverordnung der EU wissen muss \u2013 Cyber Operations Group Kft.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/#primaryimage"},"image":{"@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/01\/NIS2.jpg","datePublished":"2024-12-05T11:05:51+00:00","dateModified":"2025-05-05T12:57:24+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/#primaryimage","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/01\/NIS2.jpg","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/01\/NIS2.jpg","width":497,"height":496},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/51-tipp-amivel-biztonsagossa-teheted-az-online-jelenleted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"NIS2 \u2013 Amit minden v\u00e1llalatvezet\u0151nek tudnia kell az EU \u00faj kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s\u00e1r\u00f3l"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Cyber Operations Group Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Cyber Operations Group Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/7ce1406cf74ae0c6c219937d57fe6786","name":"Cyborg_admin","sameAs":["https:\/\/cyberoperations.hu\/product\/menedzselt-kibervedelem\/"],"url":"https:\/\/cyberoperations.hu\/de\/author\/cyborg_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/posts\/1822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/comments?post=1822"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/posts\/1822\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/media\/2236"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/media?parent=1822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/categories?post=1822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/tags?post=1822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}