{"id":1564,"date":"2025-05-01T08:39:32","date_gmt":"2025-05-01T06:39:32","guid":{"rendered":"https:\/\/thiim.com\/?page_id=1564"},"modified":"2026-01-29T13:13:59","modified_gmt":"2026-01-29T12:13:59","slug":"cyber-security-and-nis2","status":"publish","type":"page","link":"https:\/\/thiim.com\/en\/industriel-it-iiot\/cybersikkerhed-og-nis2\/","title":{"rendered":"Cybersecurity and NIS2"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1564\" class=\"elementor elementor-1564\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2caaffc e-flex e-con-boxed e-con e-parent\" data-id=\"2caaffc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd156f8 e-con-full e-flex e-con e-child\" data-id=\"cd156f8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3965d5b e-con-full e-flex e-con e-child\" data-id=\"3965d5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1c1880 elementor-widget elementor-widget-breadcrumbs\" data-id=\"a1c1880\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5337789 e-flex e-con-boxed e-con e-parent\" data-id=\"5337789\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4f0b75 e-con-full e-flex e-con e-child\" data-id=\"c4f0b75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-eba936f e-con-full e-flex e-con e-child\" data-id=\"eba936f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c0a495d e-con-full e-flex e-con e-child\" data-id=\"c0a495d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8122f15 elementor-widget elementor-widget-text-editor\" data-id=\"8122f15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Act is the Danish implementation of the EU NIS2 Directive and aims to <strong>Strengthen cybersecurity<\/strong> in companies that fulfil critical or important functions for society.<\/p><p>The law places increased demands on how companies handle IT security, including risk management, incident management and the implementation of appropriate technical and organisational security measures.<\/p><p>The NIS2 Act covers sectors such as energy, transport, healthcare, water supply and digital infrastructure, but also applies to certain IT and service providers. Covered organisations must be prepared to document their security efforts and may face audits and sanctions, including fines, for non-compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ac6c45 e-con-full e-flex e-con e-child\" data-id=\"6ac6c45\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f80650 elementor-widget elementor-widget-text-editor\" data-id=\"6f80650\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>The Danish Chamber of Commerce notes that an alarming <\/em><strong><em>60 % of small and medium-sized enterprises (SMEs) affected by a data breach or cyberattack end up in bankruptcy<\/em><\/strong><em>.<\/em><em> The grim statistics emphasise how fatal digital attacks can be for SMEs - not just technically, but as a real threat to business existence.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26878bb e-flex e-con-boxed e-con e-parent\" data-id=\"26878bb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8ea8ac7 e-con-full e-flex e-con e-child\" data-id=\"8ea8ac7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0e5363 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b0e5363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">For your organisation, this means that cybersecurity is no longer just a technical task - it's a management responsibility and a business-critical priority<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac5e7b2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ac5e7b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For the organisation, the NIS2 Act has several concrete consequences:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac762f6 e-con-full e-grid e-con e-child\" data-id=\"ac762f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab24dd5 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"ab24dd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-layer-plus\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tExtended scope of application\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tMore business types and public authorities are now covered - especially those with critical societal importance or a certain level of size\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4c039 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"1b4c039\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-user-tie\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIncreased responsibility for management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTop management will have a clear legal responsibility to ensure robust security regulations and continuous follow-up on cybersecurity - also in OT environments\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cff3df5 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"cff3df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-exclamation-triangle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tStricter risk management requirements\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSystematic risk assessments, network segmentation, incident management, supply chain security, etc. must be implemented, also in OT networks\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b812bad elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"b812bad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-newspaper\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIncident reporting requirements\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSecurity incidents must be reported to the relevant authorities as soon as possible - with stricter time and content requirements \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a10defa elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"a10defa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-search\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tStronger supervision and sanctions\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAuthorities will have increased powers to supervise, issue orders, sanctions or even suspend executives for non-compliance \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a3b86d7 e-con-full e-flex e-con e-child\" data-id=\"a3b86d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9bbe1f elementor-widget elementor-widget-text-editor\" data-id=\"f9bbe1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In short, NIS2 means that the organisation must now work in a structured way with cybersecurity - both <strong>strategic, operational and technical<\/strong>. This is also true in industrial OT networks, where delayed updates or lack of monitoring can cause serious risks to operations and public safety.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03c070f e-flex e-con-boxed e-con e-parent\" data-id=\"03c070f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3f338ca e-flex e-con-boxed e-con e-child\" data-id=\"3f338ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-708a729 elementor-widget elementor-widget-heading\" data-id=\"708a729\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why are OT networks and NIS2 inseparable?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bd2a08 elementor-widget elementor-widget-text-editor\" data-id=\"0bd2a08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>As industrial systems and OT environments increasingly integrate with IT networks<\/strong>, they have become an attractive target for cyber attacks.<\/p><p>The NIS2 law therefore has a special focus on OT security!<\/p><p>You can see the increased requirements on the right:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e161bd e-con-full e-flex e-con e-child\" data-id=\"7e161bd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a0c5728 elementor-widget elementor-widget-heading\" data-id=\"a0c5728\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Are you covered by NIS2?\nTake the official test<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60f0457 elementor-widget elementor-widget-text-editor\" data-id=\"60f0457\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The first step towards compliance is to determine if your organisation is covered by the directive. Take the NIS2 test and get answers in under two minutes:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-775b876 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-left elementor-widget elementor-widget-button\" data-id=\"775b876\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/www.nis2tjek.sikkerdigital.dk\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Take the NIS2 test here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23d2dc6 e-grid e-con-boxed e-con e-child\" data-id=\"23d2dc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ed61bd7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ed61bd7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df9af62 elementor-widget elementor-widget-icon-box\" data-id=\"df9af62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tNetwork segmentation and access control \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-158d364 e-con-full e-flex e-con e-child\" data-id=\"158d364\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59618f2 elementor-widget elementor-widget-text-editor\" data-id=\"59618f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For example. Using switches and firewalls to isolate OT networks<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-308762f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"308762f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-221d2a9 elementor-widget elementor-widget-icon-box\" data-id=\"221d2a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tICS-specific controls and continuous monitoring \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d7e609 e-con-full e-flex e-con e-child\" data-id=\"5d7e609\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b48800 elementor-widget elementor-widget-text-editor\" data-id=\"7b48800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Like intrusion detection, secure updating of IoT and ICS control systems<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a0c0d30 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a0c0d30\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-31ab4bd elementor-widget elementor-widget-icon-box\" data-id=\"31ab4bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tZero Trust principles \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c837b4b e-con-full e-flex e-con e-child\" data-id=\"c837b4b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de0f024 elementor-widget elementor-widget-text-editor\" data-id=\"de0f024\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Continuous verification and segmented access from OT providers and remote users<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92354d0 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"92354d0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76beae7 elementor-widget elementor-widget-icon-box\" data-id=\"76beae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSupplier and supply chain management \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d521ba6 e-con-full e-flex e-con e-child\" data-id=\"d521ba6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43cf65c elementor-widget elementor-widget-text-editor\" data-id=\"43cf65c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Documentation and control that external providers follow equivalent security standards<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2c8eec e-flex e-con-boxed e-con e-parent\" data-id=\"b2c8eec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2034fa0 elementor-widget elementor-widget-text-editor\" data-id=\"2034fa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In practice, this means upgrading your OT setup with equipment and procedures that support these requirements - and that's where our solutions come in.<\/p><p><strong>We provide switches, firewalls and monitoring solutions that ensure your OT network meets the requirements of the NIS2 Act - but perhaps more importantly, that you protect your organisation from cyber attacks and the consequences that come with an attack.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73a9c9c elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-center elementor-widget elementor-widget-button\" data-id=\"73a9c9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/thiim.com\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact our experts and learn more about cyber security<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb32b84 e-flex e-con-boxed e-con e-parent\" data-id=\"cb32b84\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c9fc1f3 e-con-full e-flex e-con e-child\" data-id=\"c9fc1f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85e8e70 elementor-widget elementor-widget-image\" data-id=\"85e8e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg\" class=\"attachment-large size-large wp-image-8282\" alt=\"\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg.webp 1024w, https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-300x200.jpg.webp 300w, https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-768x512.jpg.webp 768w, https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1536x1024.jpg.webp 1536w, https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-scaled.jpg.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fe8bca e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"1fe8bca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInRight&quot;,&quot;animation_tablet&quot;:&quot;slideInUp&quot;,&quot;animation_mobile&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00eb493 elementor-widget elementor-widget-heading\" data-id=\"00eb493\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get an overview with our NIS2 checklist<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6da3eae elementor-widget elementor-widget-text-editor\" data-id=\"6da3eae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Use our detailed checklist to determine if your OT network is NIS2 compliant. It guides you through all the important points:<\/p><ul><li>Governance and management responsibilities<\/li><li>Network segmentation and access control<\/li><li>Monitoring, logging and incident response<\/li><li>Ongoing risk assessment and documentation<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34c1bcb elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-left elementor-widget elementor-widget-button\" data-id=\"34c1bcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/indd.adobe.com\/view\/389b26db-0871-4ddf-8cde-0e61fbead982\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the NIS2 checklist here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9dcb152 e-flex e-con-boxed e-con e-parent\" data-id=\"9dcb152\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8db84d elementor-widget elementor-widget-heading\" data-id=\"c8db84d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to get started with cybersecurity in the production environment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9167f78 e-con-full e-flex e-con e-child\" data-id=\"9167f78\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7b00ca4 e-con-full e-grid elementor-invisible e-con e-child\" data-id=\"7b00ca4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInLeft&quot;,&quot;animation_tablet&quot;:&quot;slideInUp&quot;,&quot;animation_mobile&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b219f0b elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"b219f0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-laptop-house\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMap your systems\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIdentify all OT devices and networks that control production and operational environments\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8210989 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"8210989\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-file-exclamation\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPrioritise vulnerabilities\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tFocus on the components with the highest risk of cyberattacks\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab825d3 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"ab825d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-shield-check\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tImplement security measures\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tUse segmentation, strong passwords and network monitoring\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f12461b elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"f12461b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-clock\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPractise incident response\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTrain your team to detect, report and respond to attacks\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71657a5 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"71657a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-file-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMaintain documentation\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDocument your work and update the checklist regularly\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d78595 e-con-full e-flex e-con e-child\" data-id=\"2d78595\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d74cad1 elementor-widget elementor-widget-heading\" data-id=\"d74cad1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why choose our solution?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd57268 elementor-widget elementor-widget-text-editor\" data-id=\"bd57268\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Quick overview:<\/strong> Test if your business is covered<\/li><li><strong>Practical guidance:<\/strong> Use our NIS2 checklist to get an overview and close security gaps<\/li><li><strong>Continuously updated<\/strong>: We follow NIS2 legislation and audit the solutions<\/li><\/ul><p><strong><br \/>Start today - protect your operations, avoid fines and stand strong in the face of cyber attacks!<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbd6bb2 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-center elementor-widget elementor-widget-button\" data-id=\"fbd6bb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"mailto:%20thiim@thiim.com\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb26a06 e-flex e-con-boxed e-con e-parent\" data-id=\"cb26a06\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4049da31 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4049da31\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInLeft&quot;,&quot;animation_tablet&quot;:&quot;slideInUp&quot;,&quot;animation_mobile&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1965e071 elementor-widget elementor-widget-heading\" data-id=\"1965e071\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">See a selection of our IEC 62443 certified switches here<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6896f850 elementor-widget elementor-widget-text-editor\" data-id=\"6896f850\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Switches that strengthen cybersecurity!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25405c84 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-left elementor-widget elementor-widget-button\" data-id=\"25405c84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/thiim.com\/en\/industriel-it-iiot\/industriel-netvaerksinfrastruktur\/ethernet-switche\/iec62443-certificerede-switche\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See a selection here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-594e7101 e-con-full e-flex e-con e-child\" data-id=\"594e7101\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8a084 elementor-widget elementor-widget-image\" data-id=\"e8a084\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"197\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-1024x252.jpg\" class=\"attachment-large size-large wp-image-9183\" alt=\"\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-1024x252.jpg.webp 1024w, https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-300x74.jpg.webp 300w, https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-768x189.jpg.webp 768w, https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-18x4.jpg.webp 18w, https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low.jpg.webp 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>NIS2-loven er den danske implementering af EU\u2019s NIS2-direktiv og har til form\u00e5l at styrke cybersikkerheden i virksomheder, der varetager samfundskritiske eller vigtige funktioner. Loven stiller \u00f8gede krav til, hvordan virksomheder h\u00e5ndterer IT-sikkerhed, herunder risikostyring, h\u00e6ndelsesh\u00e5ndtering og implementering af passende tekniske og organisatoriske sikkerhedsforanstaltninger. NIS2-loven omfatter blandt andet sektorer som energi, transport, sundhed, vandforsyning og digital [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1563,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1564","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersikkerhed og NIS2\u200b | Industriel IT | Thiim A\/S<\/title>\n<meta name=\"description\" content=\"L\u00e6r om cybersikkerhed og NIS2\u2011direktivets krav for industriel IT &amp; OT \u2013 styrk netv\u00e6rkssikkerhed, risikostyring og compliance i dine digitale industrielle systemer\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thiim.com\/en\/industrial-it-iiot\/cyber-security-and-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersikkerhed og NIS2\u200b | Industriel IT | Thiim A\/S\" \/>\n<meta property=\"og:description\" content=\"L\u00e6r om cybersikkerhed og NIS2\u2011direktivets krav for industriel IT &amp; OT \u2013 styrk netv\u00e6rkssikkerhed, risikostyring og compliance i dine digitale industrielle systemer\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thiim.com\/en\/industrial-it-iiot\/cyber-security-and-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"Thiim\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T12:13:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/\",\"url\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/\",\"name\":\"Cybersikkerhed og NIS2\u200b | Industriel IT | Thiim A\/S\",\"isPartOf\":{\"@id\":\"https:\/\/thiim.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg\",\"datePublished\":\"2025-05-01T06:39:32+00:00\",\"dateModified\":\"2026-01-29T12:13:59+00:00\",\"description\":\"L\u00e6r om cybersikkerhed og NIS2\u2011direktivets krav for industriel IT & OT \u2013 styrk netv\u00e6rkssikkerhed, risikostyring og compliance i dine digitale industrielle systemer\",\"breadcrumb\":{\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage\",\"url\":\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg\",\"contentUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Industriel IT &#038; IIoT\u200b\",\"item\":\"https:\/\/thiim.com\/industriel-it-iiot\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersikkerhed og NIS2\u200b\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thiim.com\/#website\",\"url\":\"https:\/\/thiim.com\/\",\"name\":\"Thiim\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/thiim.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thiim.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thiim.com\/#organization\",\"name\":\"Thiim\",\"url\":\"https:\/\/thiim.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/thiim.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg\",\"contentUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg\",\"width\":653.94,\"height\":121.95,\"caption\":\"Thiim\"},\"image\":{\"@id\":\"https:\/\/thiim.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security and NIS2 | Industrial IT | Thiim A\/S","description":"Learn about cybersecurity and NIS2 directive requirements for industrial IT &amp; OT - strengthen network security, risk management and compliance in your digital industrial systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thiim.com\/en\/industrial-it-iiot\/cyber-security-and-nis2\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersikkerhed og NIS2\u200b | Industriel IT | Thiim A\/S","og_description":"L\u00e6r om cybersikkerhed og NIS2\u2011direktivets krav for industriel IT & OT \u2013 styrk netv\u00e6rkssikkerhed, risikostyring og compliance i dine digitale industrielle systemer","og_url":"https:\/\/thiim.com\/en\/industrial-it-iiot\/cyber-security-and-nis2\/","og_site_name":"Thiim","article_modified_time":"2026-01-29T12:13:59+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/","url":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/","name":"Cyber security and NIS2 | Industrial IT | Thiim A\/S","isPartOf":{"@id":"https:\/\/thiim.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage"},"image":{"@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg","datePublished":"2025-05-01T06:39:32+00:00","dateModified":"2026-01-29T12:13:59+00:00","description":"Learn about cybersecurity and NIS2 directive requirements for industrial IT &amp; OT - strengthen network security, risk management and compliance in your digital industrial systems","breadcrumb":{"@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage","url":"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg","contentUrl":"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Industriel IT &#038; IIoT\u200b","item":"https:\/\/thiim.com\/industriel-it-iiot\/"},{"@type":"ListItem","position":2,"name":"Cybersikkerhed og NIS2\u200b"}]},{"@type":"WebSite","@id":"https:\/\/thiim.com\/#website","url":"https:\/\/thiim.com\/","name":"Thiim","description":"","publisher":{"@id":"https:\/\/thiim.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thiim.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/thiim.com\/#organization","name":"Thiim","url":"https:\/\/thiim.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/thiim.com\/#\/schema\/logo\/image\/","url":"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg","contentUrl":"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg","width":653.94,"height":121.95,"caption":"Thiim"},"image":{"@id":"https:\/\/thiim.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/pages\/1564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/comments?post=1564"}],"version-history":[{"count":21,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/pages\/1564\/revisions"}],"predecessor-version":[{"id":9939,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/pages\/1564\/revisions\/9939"}],"up":[{"embeddable":true,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/pages\/1563"}],"wp:attachment":[{"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/media?parent=1564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}