{"id":8303,"date":"2026-02-24T18:07:16","date_gmt":"2026-02-24T18:07:16","guid":{"rendered":"https:\/\/eprodat.wpenginepowered.com\/read-our-latest-insights-on-digital-governance-and-cybersecurity\/"},"modified":"2026-03-12T17:14:02","modified_gmt":"2026-03-12T17:14:02","slug":"read-our-latest-insights-on-digital-governance-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/eprodat.com\/en\/read-our-latest-insights-on-digital-governance-and-cybersecurity\/","title":{"rendered":"Read our latest insights on digital governance and cybersecurity."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8303\" class=\"elementor elementor-8303 elementor-8190\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1ce55e e-flex e-con-boxed e-con e-parent\" data-id=\"a1ce55e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a8a6c8 elementor-widget elementor-widget-heading\" data-id=\"3a8a6c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Read our latest insights on digital governance and cybersecurity. <\/h1>\t\t\t\t<\/div>\n\t\t\r\n\t\t<div class=\"elementor-element elementor-element-8555408 elementor-widget elementor-widget-text-editor\" data-id=\"8555408\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Cybersecurity is no longer merely a technical issue. In the new European regulatory environment, it has become a pillar that structures regulatory compliance itself. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">Directive (EU) 2022\/2555, known as NIS2, represents the most significant European reform in the field of network and information systems security since Directive (EU) 2016\/1148 (NIS1). It marks a turning point for all organisations that depend\u2014directly or indirectly\u2014on digital services, technological infrastructures, or data-driven critical processes. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">Although NIS2 is not a legal instrument specifically aimed at the protection of personal data, as is the case with the General Data Protection Regulation (GDPR), its impact on privacy is undeniable. The reason is simple: where cybersecurity obligations increase, so do guarantees for data protection, because security incidents almost always become privacy incidents. Moreover, the Directive emphasises in its recitals that its application does not affect the competences of data protection and privacy supervisory authorities, meaning that both frameworks must coexist and reinforce one another.  <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">In Spain, transposition is still pending. The Draft Law on the Coordination and Governance of Cybersecurity, approved by the Council of Ministers in January 2025, lays the foundations of the future national cybersecurity system and will be the key instrument for implementing NIS2. Although the text must still go through several legislative stages, the European standard already sets the direction: risk management, active supervision, cyber resilience, and strengthened oversight of suppliers.  <\/span><span data-ccp-props=\"{}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-765c0a0 elementor-widget elementor-widget-heading\" data-id=\"765c0a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security: the regulatory bridge between NIS2 and the GDPR <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39c1d9e elementor-widget elementor-widget-text-editor\" data-id=\"39c1d9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Both the GDPR and NIS2 are based on the same core principle: security is not an optional requirement or a technical add-on, but an essential legal obligation that must be adapted to the level of risk.<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">Under the GDPR, Article 32 requires organisations to implement \u201cappropriate technical and organisational measures,\u201d taking into account factors such as the state of the art, the costs of implementation, the nature of the processing, and the risks to individuals\u2019 rights and freedoms. <\/span><span data-contrast=\"auto\">This accountability-based approach requires organisations to anticipate threats, prevent failures, and demonstrate compliance.<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">NIS2 reinforces and specifies this approach. Article 21 requires essential and important entities to adopt technical, operational, and organisational measures proportionate to risk and lists a minimum set of elements that must be addressed: risk analysis and information security policies, incident management, business continuity and disaster recovery, supply chain security, vulnerability management, encryption policies, cyber hygiene measures and training, multi-factor authentication, access controls, among others. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">As a result, any cybersecurity incident that compromises the confidentiality, integrity, or availability of personal data will, in principle, constitute a \u201cpersonal data breach\u201d within the meaning of the GDPR, even if it is not always subject to notification. For example, if a ransomware attack paralyses a hospital\u2019s systems, the incident will be relevant under NIS2 due to its impact on continuity of care, but it may also constitute a GDPR breach if medical records are encrypted or rendered inaccessible. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">In such cases, the data protection authority will assess whether the security measures were appropriate under Article 32 GDPR. It is reasonable to anticipate that NIS2 standards will serve as a relevant benchmark, even where the Directive does not directly apply to the affected entity, as they establish the expected level of diligence at the European level. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ddaca7 elementor-widget elementor-widget-heading\" data-id=\"3ddaca7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">More regulated sectors: more security\u2026 and more data at stake <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-902e1cd elementor-widget elementor-widget-text-editor\" data-id=\"902e1cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>One of the most significant changes introduced by NIS2 is the expansion of its scope compared to the framework established by NIS1. Annexes I and II add new essential and important sectors, including, among others: digital infrastructure, energy, transport, banking and financial market infrastructures, healthcare, drinking water and wastewater, public administration, postal and courier services, waste management, critical food sector activities, certain industrial sectors, and digital service providers (such as cloud services, hosting, and certain online platforms).<span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">This expansion has a direct impact on privacy. Many of these sectors process massive volumes of personal data\u2014often highly sensitive\u2014rely on critical systems, or provide services whose unavailability can lead to data breaches and serious harm to users. For example, a public transport company that digitalises its fleet processes geolocation data relating to employees and users; if a cyberattack disrupts the service, the incident affects both operational continuity (NIS2) and personal data protection (GDPR).  <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">Consequently, the larger the regulated digital surface, the greater the obligation to strengthen security, and therefore the greater the protection against incidents that compromise privacy. GDPR compliance will increasingly depend on alignment with the cybersecurity standards set by NIS2, especially for organisations providing essential or important services within the meaning of the Directive. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81f05bc elementor-widget elementor-widget-heading\" data-id=\"81f05bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident notification: two frameworks, a single response system <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-941b8cd elementor-widget elementor-widget-text-editor\" data-id=\"941b8cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">NIS2 establishes a strict, phased, and demanding incident notification regime. Article 23 introduces a three-stage reporting obligation for significant incidents: <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"39\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">an early warning within a maximum of 24 hours from when the entity becomes aware of the incident;<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"39\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">a more complete notification within a maximum of 72 hours, including an initial assessment of severity, impact, and possible indicators of compromise.<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"39\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">a final report within one month of the initial notification, providing a detailed analysis of causes, impact, and remedial measures, with interim reports where necessary.<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><p><span data-contrast=\"auto\">This system is designed to ensure early detection of significant incidents affecting service continuity or the security of networks and information systems.<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">The interaction between this notification regime and the GDPR\u2019s breach notification obligations is direct. When personal data are affected, the organisation must assess whether the requirements of Articles 33 and 34 GDPR are met, including notification to the supervisory authority within 72 hours and, where applicable, communication to affected individuals when there is a high risk to their rights and freedoms. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">For example, if a school\u2019s cloud service provider suffers a breach that temporarily disables services and exposes student records, the incident may fall under NIS2 for the provider itself, while for the school it will have GDPR implications only. <\/span><span data-contrast=\"auto\">The educational institution must assess the breach under Articles 33 and 34 GDPR, while the provider\u2014if within NIS2 scope\u2014will have its own notification obligations to the competent authority.<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">This means that cybersecurity, data protection, and business continuity teams must operate under an integrated procedure capable of:<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">assessing the nature and scope of the incident;<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">determining whether it is a NIS2 incident, a GDPR incident, or both;<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">documenting incident management and decisions taken;<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">activating the relevant notifications within the required timeframes;<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"40\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">ensuring consistency between communications to the CSIRT or competent NIS2 authority and to the Spanish Data Protection Authority.<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><p><span data-contrast=\"auto\">Notification thus becomes a core element of compliance. An organisation that cannot demonstrate its ability to detect, report, and respond to incidents will be failing both the spirit of NIS2 and the GDPR\u2019s security and notification obligations. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d5ebe9 elementor-widget elementor-widget-heading\" data-id=\"0d5ebe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The supply chain: beyond the GDPR <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c493c5e elementor-widget elementor-widget-text-editor\" data-id=\"c493c5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">If there is one area where NIS2 represents a qualitative leap, it is in the regulation of suppliers and the supply chain. The Directive requires essential and important entities to integrate supply chain security into their risk management measures, including relationships with direct ICT product and service providers, and reinforces this approach through coordinated assessments of critical supply chains at EU level. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">The GDPR regulates the role of the processor in Article 28 and requires contracts that ensure an adequate level of security and processing in accordance with instructions.<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">However, NIS2 goes further. It does not limit itself to personal data protection but requires a broader assessment of cybersecurity risks associated with critical products, services, and suppliers, including aspects such as service continuity, technical resilience, and exposure to geopolitical threats. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">In practice, organisations will need to:<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"41\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">demand enhanced cybersecurity guarantees from suppliers;<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"41\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">incorporate NIS2-aligned requirements into procurement and third-party approval processes;<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"41\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">periodically verify compliance through audits, reviews, or certifications;<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"41\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">be prepared to limit or suspend the use of services that fail to meet minimum security standards.<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><p><span data-contrast=\"auto\">For example, if an ICT service provider suffers a breach that compromises service availability and the organisation has not adequately assessed the provider\u2019s security level or does not have an up-to-date contract, the authority may conclude that the organisation has failed to exercise the diligence required under the GDPR. <\/span><span data-contrast=\"auto\">In addition, if the provider falls within the scope of NIS2, it must comply with the Directive\u2019s security and notification obligations.<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">Security therefore ceases to be an exclusively internal matter and becomes a shared responsibility throughout the entire supply chain. Where third-party risk has not been properly managed, the organisation remains responsible for the consequences\u2014including from a GDPR perspective. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78df366 elementor-widget elementor-widget-heading\" data-id=\"78df366\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What does all this mean for organisations? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97768b0 elementor-widget elementor-widget-text-editor\" data-id=\"97768b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The convergence between NIS2 and the GDPR has immediate effects on organisations, even those not yet formally within the scope of the Directive:<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"42\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Security becomes a structural element.<\/span><\/b><span data-contrast=\"auto\"> It is no longer just about reacting to incidents, but about adopting preventive measures embedded in corporate policies, risk analyses, system design, and business continuity planning.<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"42\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Documentation gains evidentiary value.<\/span><\/b><span data-contrast=\"auto\"> While the GDPR already required evidence of compliance, NIS2 adds obligations to maintain risk management policies, continuity plans, supplier management procedures, vulnerability management programmes, and records that demonstrate the effectiveness of measures.<\/span><span data-ccp-props=\"{}\"> <\/span><\/li><\/ul><ul><li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"42\" data-list-defn-props=\"{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769226\":\"Symbol\",\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\uf0b7\",\"469777815\":\"multilevel\"}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b>Teams must coordinate. <\/b>Incident response can no longer be divided into \u201cIT incidents\u201d and \u201cprivacy incidents.\u201d In practice, most incidents are technical and have privacy implications. This requires close coordination between IT, cybersecurity, legal, compliance, and the Data Protection Officer (DPO), with clear protocols and communication channels.<span data-ccp-props=\"{}\"> <\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f80056b elementor-widget elementor-widget-heading\" data-id=\"f80056b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion: cybersecurity and data protection move forward together <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd43710 elementor-widget elementor-widget-text-editor\" data-id=\"dd43710\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The entry into force of NIS2 marks a profound shift in how security and privacy are understood in Europe. The Directive establishes reinforced obligations that, while not directly regulating the processing of personal data, decisively shape the application of the GDPR\u2014particularly with regard to technical security measures, incident management, and the supply chain. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">Security, resilience, and data protection are no longer parallel domains, but part of an integrated compliance system based on risk management and proactive accountability.<\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">Pending Spanish transposition, organisations should prepare now: review their risk assessments, strengthen security measures, align supplier contracts, and adapt incident response procedures. The European model is moving towards a more demanding standard in which security is inseparable from the fundamental right to data protection. <\/span><span data-ccp-props=\"{}\"> <\/span><\/p><p><span data-contrast=\"auto\">The NIS2 era is not only transforming cybersecurity; it is redefining the very scope of regulatory compliance and the way organisations must demonstrate that they protect the data and services on which our digital lives depend.<\/span><span data-ccp-props=\"{}\"> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>At vero eos et accusamus et iustoodio digni goikussimos ducimus qui blanp ditiis praesum voluum. <\/p>\n","protected":false},"author":2,"featured_media":8298,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-8303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-construction"],"featured_image_src":"https:\/\/eprodat.com\/wp-content\/uploads\/2026\/02\/eprodat-blog-600x400.jpg","featured_image_src_square":"https:\/\/eprodat.com\/wp-content\/uploads\/2026\/02\/eprodat-blog-600x600.jpg","author_info":{"display_name":"Jaime S\u00e1nchez","author_link":"https:\/\/eprodat.com\/en\/author\/jaimepsfgmail-com\/"},"_links":{"self":[{"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/posts\/8303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/comments?post=8303"}],"version-history":[{"count":0,"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/posts\/8303\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/media\/8298"}],"wp:attachment":[{"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/media?parent=8303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/categories?post=8303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eprodat.com\/en\/wp-json\/wp\/v2\/tags?post=8303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}