{"id":147204,"date":"2024-10-02T10:35:56","date_gmt":"2024-10-02T08:35:56","guid":{"rendered":"https:\/\/symmedia.de\/?p=147204"},"modified":"2025-11-05T17:25:30","modified_gmt":"2025-11-05T16:25:30","slug":"navigating-nis2-compliance-using-iec-62443-standards-to-strengthen-cybersecurity","status":"publish","type":"post","link":"https:\/\/symmedia.de\/de\/navigating-nis2-compliance-using-iec-62443-standards-to-strengthen-cybersecurity\/","title":{"rendered":"NIS2-Konformit\u00e4t: Verwendung der IEC 62443-Standards zur Erh\u00f6hung der Cybersicherheit."},"content":{"rendered":"<div>\n<\/div>\n<div>\n<\/div>\n<div>\n<p class=\"p2\"><span class=\"s1\"> <\/span>In light of the evolving digital threat landscape, the <strong>NIS2 Directive<\/strong> will be a crucial step towards strengthening cybersecurity in the EU. The directive is seen as a means to address and mitigate the challenges and threats faced by businesses and critical infrastructures in the digital age, marking a significant expansion and strengthening of the original Network and Information Systems (NIS) Directive. Key highlights include the broader definition of entities covered under NIS2. For Germany alone, <strong>30.000 additional companies<\/strong> fall within the scope. In addition, stricter security, and incident reporting requirements are addressed, along with a focus on supply chain security.<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/10\/sym_nis2_biggerscope2.jpg\" alt=\"\"><\/p>\n<div>\n<p class=\"p2\"><span class=\"s1\"> <\/span>For the machine manufacturing and operating industry, NIS2 can be an enormous <strong>driver for gaining a competitive advantage<\/strong>, provided that companies see it not as a burden but as an opportunity and actively engage with it. Why? Besides raising cybersecurity standards, the <strong>directive emphasizes resilience against disruptions<\/strong> and the importance of <strong>securing the supply chain<\/strong> which harbors enormous complexity, especially in the manufacturing sector. The directive outlines what must be accomplished, but it does not specify how to accomplish those objectives.<\/p>\n<p class=\"p2\">For critical infrastructure operators and important resp. essential entities according to the NIS2 scope, the <strong>IEC 62443 standard assists asset owners,<\/strong> product suppliers and service providers in implementing the appropriate set of controls to secure their operations for the OT (operation technology) layer. This article will help you <strong>connect NIS2 requirements to IEC 62443<\/strong> security standards.<\/p>\n<\/div>\n<h1>\n<h4>What is NIS2 about?<\/h4>\n<\/h1>\n<div>\n<p class=\"p2\"><span class=\"s1\"> <\/span>The development of the geopolitical situation has taught us that it can escalate at any time and very quickly. There is no guarantee of geopolitical stability and the <strong>\u201cprinciple of hope\u201d is not suitable for protecting<\/strong> the EU from such challenges. The NIS2 is one approach, among many others, to overcome these challenges. Building upon the foundation laid by its predecessor, the original Network and Information Systems (NIS) Directive, NIS2 introduces several key changes and expansions to address the evolving cybersecurity landscape and to close the gaps identified in the implementation of the first directive.<\/p>\n<p class=\"p2\">A summary of the NIS2 Directive, including the <strong>major changes from the former NIS<\/strong> and the impact on relevant companies follows:<\/p>\n<ul>\n<li class=\"p3\">Broader definition of relevant entities<\/li>\n<li class=\"p3\">Enhanced security and incident reporting requirements<\/li>\n<li class=\"p3\">Stricter accountability requirements for senior management<\/li>\n<li class=\"p3\">Increased regulatory powers and harmonization<\/li>\n<li class=\"p4\">Focus on supply chain security and third-party risk management<\/li>\n<\/ul>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/10\/sym_nis2_whatsnew.jpg\" alt=\"\"><\/p>\n<div>\n<p class=\"p1\">The European regulation does not directly enforce NIS2 compliance; rather, national legislation that are based on the directive are used to do so. This means that until national authorities develop national laws and requirements, companies must rely on the directive\u2018s guidelines. The directive is prepared for all 27 member states, hence the language is kept high-level so that it may be applied to any case.<\/p>\n<\/div>\n<h1>\n<h4 class=\"p1\"><span class=\"s1\"><b>What are the major benefits for the machine manufacturers and operators? <\/b><\/span><\/h4>\n<\/h1>\n<div>\n<p class=\"p1\">The NIS2 Directive is crucial for the machine manufacturing and operating industry for several compelling reasons:<\/p>\n<\/div>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/10\/symmedia_icon__lock.png\" alt=\"\"><\/p>\n<div>\n<p><strong>Enhanced Cybersecurity Standards<br \/><\/strong>The NIS2 Directive raises the bar for cybersecurity standards across the board. For machine manufacturers and operators, this means adopting more rigorous cybersecurity practices to protect against increasingly sophisticated cyber threats. Given the industry\u2019s reliance on digital technologies and networked systems for operations, enhanced standards are vital for safeguarding sensitive data and operational continuity.<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/10\/symmedia_icon__resilience.png\" alt=\"\"><\/p>\n<div>\n<p class=\"p1\"><span class=\"s1\"><b>Resilience Against Disruptions<br \/><\/b><\/span><span class=\"s1\">Machine manufacturing and operating sectors are critical to the economy and infrast-ructure. A cyber-attack in these areas could lead to significant disruptions, not just for the affected company but for entire supply chains and the economy at large. NIS2 aims to minimize this risk by ensuring these industries have robust mechanisms in place to prevent, detect, and rapidly recover from cyber incidents.<\/p>\n<p><\/span><\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/10\/symmedia_icon__supply-chain.png\" alt=\"\"><\/p>\n<div>\n<p class=\"p1\"><span class=\"s1\"><b>Supply Chain Security<br \/><\/b><\/span>NIS2 places a strong emphasis on securing the supply chain, which is particularly relevant for machine manufacturing and operating industries. These sectors often involve complex supply chains with numerous vendors and service providers. Ensuring cybersecurity throughout this chain is essential to prevent vulnerabilities that could be exploited by attackers.<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/10\/symmedia_icon__compliance.png\" alt=\"\"><\/p>\n<div>\n<p class=\"p1\"><span class=\"s1\"><b>Compliance and Competitive Advantage<br \/><\/b><\/span><span class=\"s1\">By adhering to NIS2, companies in the machine manufacturing and operating industry not only ensure compliance with European regulations but also gain a competitive advantage. Demonstrating strong cybersecurity practices can be a significant factor in building trust with clients and partners, potentially leading to more business opportunities.<\/p>\n<p><\/span><\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/10\/symmedia_icon__innovation.png\" alt=\"\"><\/p>\n<div>\n<p class=\"p1\"><span class=\"s1\"><b>Innovation and Digital Transformation Support<br \/><\/b><\/span>The directive supports innovation and digital transformation efforts by establishing a secure environment for deploying new technologies. As machine manufacturing and operations increasingly incorporate IoT, AI, and other advanced technologies, having a framework like NIS2 ensures these innovations enhance productivity without compromising security.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p class=\"p1\">In essence, NIS2 will play an important role for the machine manufacturing and operating industry as it ensures that companies in this sector are <strong>prepared to face current and future cybersecurity challenges<\/strong>. By promoting a culture of continuous improvement in cybersecurity practices, NIS2 helps safeguard the industry\u2019s vital role in the economy, enhances its resilience, and supports its digital transformation journey.<\/p>\n<\/div>\n<h1>\n<h4 class=\"p1\"><span class=\"s1\"><b>NIS2 compliance through IEC 62443 certification <\/b><\/span><\/h4>\n<\/h1>\n<div>\n<p class=\"p1\">The importance of regulation such as NIS2 cannot be overstated. As cyber<strong> threats become increasingly sophisticated<\/strong>, the need for <strong>robust, comprehensive cybersecurity measures<\/strong> becomes paramount. This is where standards such as IEC 62443 come into play. Specifically designed to secure industrial communication networks, IEC 62443 provides a structured approach to cybersecurity, covering aspects from risk assessment to system development, and maintenance. It\u2019s a framework that not only supports but enhances compliance with NIS2 by offering a clear, actionable path towards implementing the necessary cybersecurity controls and practices.<\/p>\n<p class=\"p1\">IEC 62443 provides a lot of assistance for implementing cyber security risk-management measures that NIS2 demands. A high level mapping of IEC 62443\u2019s measures with the corresponding basic cybersecurity risk management requirements, as defined in the NIS Article 21 is described here:<\/p>\n<\/div>\n<div>\n<h4 class=\"p1\" style=\"text-align: center;\">NIS2 requirements<\/h4>\n<\/div>\n<div>\n<h4 class=\"p1\" style=\"text-align: center;\">IEC 62443 Ma\u00dfnahmen<\/h4>\n<\/div>\n<div>\n<h5 style=\"text-align: center;\"><span class=\"s1\"><b>Risk analysis and Security Policies<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Conduct risk analyses and develop information system security policies<\/p>\n<\/div>\n<div>\n<p>Sections 2-1 and 3-3 ensure risk analysis and security policies including a cybersecurity threat modeling and assessment. These are also essential parts of the 4-1 ML3 certification.<\/p>\n<\/div>\n<div>\n<h5 style=\"text-align: center;\"><span class=\"s1\"><b>Incident Handling<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Aufbau und Aufrechterhaltung der F\u00e4higkeit zur Behandlung von Sicherheitsvorf\u00e4llen (Incidents).<\/p>\n<\/div>\n<div>\n<p>Sections 4-1 and 3-3 assess and assure comprehensive incident handling processes, including detection, response, and recovery mechanisms.<\/p>\n<\/div>\n<div>\n<h5 style=\"text-align: center;\"><span class=\"s1\"><b>Business Continuity and Crisis Management<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Develop business continuity and crisis management plans<\/p>\n<\/div>\n<div>\n<p>According to sections 4-1 and 3-3, resilience and recovery planning, ensuring operational continuity need to be implemented. Section 3-3 sets out system security requirements and levels.<\/p>\n<\/div>\n<div>\n<h5 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\"><b>Supply Chain Security<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Ensure the security of network and information systems within the supply chain<\/p>\n<\/div>\n<div>\n<p class=\"p1\">Supply chain security risk assessment is crucial part of section 4-1 \u2013 Section 3-3 demands technical security requirements for IACS components in the supply chain.<\/p>\n<\/div>\n<div>\n<h5 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\"><b>Security in Network and Information Systems<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Ensure secure acquisition, development, and maintenance of network and information systems.<\/p>\n<\/div>\n<div>\n<p class=\"p1\">This requirement describes exactly what the IEC standard is designed for and is therefore directly addressed by the corresponding sections.<\/p>\n<\/div>\n<div>\n<h5 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\"><b>Policies and Procedures to Access the Effectiveness<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Implement policies and procedures for assessing cybersecurity risk management measures\u2019 effectiveness<\/p>\n<\/div>\n<div>\n<p class=\"p1\">Continuous evaluation against the IEC 62443 standards, specifically sections 4-1 and 3-3, forces assessing and improving the effectiveness of cybersecurity measures.<\/p>\n<\/div>\n<div>\n<h5 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\"><b>Use of Cryptography and Encryption<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Utilize cryptography and encryption to protect data and information where appropriate<\/p>\n<\/div>\n<div>\n<p class=\"p1\">In section 3-3 Data Confidentiality and Integrity is specified including provisions for the use of cryptographic measures in and end-to-end approach.<\/p>\n<\/div>\n<div>\n<h5 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\"><b>Human Resources, Security Awareness, and Training<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Ensure human resources security through awareness and training.<\/p>\n<\/div>\n<div>\n<p class=\"p1\">Consistent with sections 4-2 and 3-3, comprehensive security training and awareness program is underpinning cybersecurity defenses with a knowledgeable and prepared workforce.<\/p>\n<\/div>\n<div>\n<h5 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\"><b>MFA and Continuous Authentication Solutions<\/b><\/span><\/h5>\n<\/div>\n<div>\n<p class=\"p1\">Use MFA, secured voice, video and text communications and secured emergency communication where appropriate<\/p>\n<\/div>\n<div>\n<p class=\"p1\">The IEC requires state-of-the-art access control and secure communications which in turn are appropriately implemented via MFA and continuous authentication solution.<\/p>\n<\/div>\n<h1>\n<h4 class=\"p1\"><span class=\"s1\"><b>Summary<\/b><\/span><\/h4>\n<\/h1>\n<div>\n<p class=\"p1\">The alignment of the IEC 62443 standards with the requirements of the NIS2 Directive establishes a comprehensive and <strong>robust framework for cybersecurity<\/strong> within the realm of Industrial Automation and Control Systems (IACS). While NIS2 sets forth the overarching objectives for cybersecurity resilience and the protection of critical network and information systems across the EU, it does not prescribe specific methods or technologies for achieving compliance. This ambiguity leaves organizations with the challenge of <strong>interpreting and implementing the Directive\u2019s requirements<\/strong> in a way that best suits their operational context and risk landscape.<\/p>\n<p class=\"p1\"><strong>IEC 62443 steps into this gap<\/strong> by providing a detailed, structured approach to cybersecurity that directly supports the achievement of NIS2 objectives for the operation technology. It\u2019s important to note though, that the IEC 62443 is aimed at the OT-Layer and therefore does not cover all aspects of the corporate IT-Layer, companies must implement suitable information security measures for this layer as well. Common basic standards such as ISO 27001 or BSI IT-Grundschutz are suitable approaches for implementing the appropriate measures in coexistence with the IEC 62443.<\/p>\n<p class=\"p2\">This ensures that organizations are not only compliant with current regulations but are also well-prepared to adapt to evolving cybersecurity threats and future legislative changes.<\/p>\n<\/div>\n<hr>\n<div>\n<p><strong>Curious to find out how symmedia Hub supports NIS2 compliance and brings your cybersecurity to the next level? Get in touch, we&#8217;re looking forward to hearing from you:<\/strong><\/p>\n<p><span><a href=\"mailto:sales@symmedia.de\"><strong>sales@symmedia.de<\/strong><\/a><\/span><strong><br \/>+49 (0)521 9665 50<\/strong><\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/10\/dsc00308_bb_marius-1.jpg\" alt=\"Marius, CTO of symmedia\"><\/p>\n<div>\n<h6>Author<\/h6>\n<\/div>\n<div>\n<h5>Marius Burger<\/h5>\n<p>Marius Burger is symmedia&#8217;s Chief Technical Officer. Driven by passion for cybersecurity, Marius is committed to developing cutting-edge security solutions for the industrial sector. In the symZone, Marius offers insight into how the symmedia Hub strengthens cybersecurity and helps companies become more resilient and competitive.<\/p>\n<\/div>\n<h3>You might also enjoy:<\/h3>\n<div>\n<\/div>\n<h3>Category<\/h3>\n<\/p>\n<h3>Latest Stories<\/h3>\n<div>\n<\/div>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"small\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"layout\":\"3-4,1-4\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"list\",\"props\":{\"column_breakpoint\":\"m\",\"css\":\".el-item{background:orange;color:#fff;padding:5px 30px;margin-right:20px;font-weight:600;font-size:14px;text-transform:uppercase;letter-spacing:1px}\",\"image_align\":\"left\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"list_element\":\"ul\",\"list_horizontal_separator\":\"\",\"list_type\":\"horizontal\",\"margin\":\"default\",\"show_image\":true,\"show_link\":true},\"children\":[{\"type\":\"list_item\",\"source\":{\"query\":{\"name\":\"posts.singlePost\",\"field\":{\"name\":\"tags\",\"directives\":[{\"name\":\"slice\",\"arguments\":{\"offset\":0}}]}},\"props\":{\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"name\"}}}}]},{\"type\":\"headline\",\"props\":{\"title_element\":\"h1\",\"title_style\":\"h3\"},\"source\":{\"query\":{\"name\":\"posts.singlePost\"},\"props\":{\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"},\"content_de_de\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"}}}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_style\":\"lead\"},\"source\":{\"query\":{\"name\":\"posts.singlePost\"},\"props\":{\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"excerpt\"}}},\"name\":\"Vorschautext\"},{\"type\":\"description_list\",\"props\":{\"column_breakpoint\":\"m\",\"css\":\".el-element{color:#999}\",\"layout\":\"grid-2\",\"list_element\":\"ul\",\"margin\":\"small\",\"margin_remove_top\":false,\"meta_align\":\"below-content\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_element\":\"div\",\"title_grid_column_gap\":\"small\",\"title_grid_row_gap\":\"small\",\"title_grid_width\":\"auto\"},\"children\":[{\"type\":\"description_list_item\",\"source\":{\"query\":{\"name\":\"posts.singlePost\"},\"props\":{\"title\":{\"filters\":{\"search\":\"\",\"date\":\"\"},\"name\":\"date\"},\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"author.name\"}}}}],\"name\":\"Author und Datum\"},{\"type\":\"image\",\"props\":{\"image_height\":\"450\",\"image_svg_color\":\"emphasis\",\"image_width\":\"900\",\"margin\":\"medium\"},\"source\":{\"query\":{\"name\":\"posts.singlePost\"},\"props\":{\"image\":{\"filters\":{\"search\":\"\"},\"name\":\"featuredImage.url\"},\"image_alt\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"}}},\"name\":\"Featured Image\"},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p2\\\"><span class=\\\"s1\\\"> <\\\/span>In light of the evolving digital threat landscape, the <strong>NIS2 Directive<\\\/strong> will be a crucial step towards strengthening cybersecurity in the EU. The directive is seen as a means to address and mitigate the challenges and threats faced by businesses and critical infrastructures in the digital age, marking a significant expansion and strengthening of the original Network and Information Systems (NIS) Directive. Key highlights include the broader definition of entities covered under NIS2. For Germany alone, <strong>30.000 additional companies<\\\/strong> fall within the scope. In addition, stricter security, and incident reporting requirements are addressed, along with a focus on supply chain security.<\\\/p>\",\"content_de_de\":\"\n\n<p>Die NIS2-Richtlinie wird angesichts der sich wandelnden digitalen Bedrohungslage einen wichtigen Beitrag zur F\\u00f6rderung der Cybersicherheit in der EU darstellen. Die Richtlinie gilt als Werkzeug zur Bew\\u00e4ltigung und Minderung von Herausforderungen und Bedrohungen, mit denen Unternehmen und Betreiber kritischer Infrastrukturen im digitalen Zeitalter konfrontiert sind. Sie stellt eine signifikante Erweiterung und Verbesserung der urspr\\u00fcnglichen Richtlinie \\u00fcber Netz- und Informationssysteme (NIS) dar. Zu den wichtigsten Neuerungen geh\\u00f6rt die umfassendere Definition der unter NIS2 fallenden Einrichtungen. Allein in Deutschland fallen 30.000 zus\\u00e4tzliche Unternehmen in diesen Geltungsbereich. Dar\\u00fcber hinaus werden strengere Sicherheits- und Meldepflichten f\\u00fcr Vorf\\u00e4lle sowie der Fokus auf die Sicherheit der Lieferkette behandelt.<\\\/p>\\n\n\n<p><span><\\\/span><\\\/p>\",\"margin\":\"default\"}},{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/sym_nis2_biggerscope2.jpg\",\"image_de_de\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/sym_nis2_biggerscopekorr_de.jpg\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p2\\\"><span class=\\\"s1\\\"> <\\\/span>For the machine manufacturing and operating industry, NIS2 can be an enormous <strong>driver for gaining a competitive advantage<\\\/strong>, provided that companies see it not as a burden but as an opportunity and actively engage with it. Why? Besides raising cybersecurity standards, the <strong>directive emphasizes resilience against disruptions<\\\/strong> and the importance of <strong>securing the supply chain<\\\/strong> which harbors enormous complexity, especially in the manufacturing sector. The directive outlines what must be accomplished, but it does not specify how to accomplish those objectives.<\\\/p>\\n\n\n<p class=\\\"p2\\\">For critical infrastructure operators and important resp. essential entities according to the NIS2 scope, the <strong>IEC 62443 standard assists asset owners,<\\\/strong> product suppliers and service providers in implementing the appropriate set of controls to secure their operations for the OT (operation technology) layer. This article will help you <strong>connect NIS2 requirements to IEC 62443<\\\/strong> security standards.<\\\/p>\",\"content_de_de\":\"\n\n<p>F\\u00fcr Maschinenhersteller und -Betreiber kann die NIS2 ein starker Treiber f\\u00fcr die Erreichung eines Wettbewerbsvorteils sein. Vorausgesetzt, diese Unternehmen sehen diese nicht als Belastung, sondern als Chance und setzen sich aktiv mit ihr auseinander. Warum? Neben der Erh\\u00f6hung der Cybersicherheitsstandards mahnt die Richtlinie zur Resilienz gegen St\\u00f6rungen und an die Bedeutung sicherer Lieferketten. Gerade in diesem Segment weisen die Lieferketten eine enorme Komplexit\\u00e4t auf. Die Richtlinie legt zwar fest, was erreicht werden muss, aber sie gibt nicht vor, wie diese Anforderungen erreicht werden m\\u00fcssen.<\\\/p>\\n\n\n<p>F\\u00fcr Betreiber kritischer Infrastrukturen und wichtige bzw. essenzielle Einrichtungen gem\\u00e4\\u00df dem NIS2-Geltungsbereich, unterst\\u00fctzt die Norm IEC 62443 Anlagenbesitzer, Produktlieferanten und (Service)Dienstleister bei der Umsetzung geeigneter Kontrollmechanismen zur Sicherung ihrer Betriebsabl\\u00e4ufe f\\u00fcr die Operation Technology (OT). Dieses Dokument hilft Ihnen dabei, die NIS2-Anforderungen mit den Sicherheitsstandards der IEC 62443 zu verkn\\u00fcpfen.<\\\/p>\",\"margin\":\"default\"}},{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h4>What is NIS2 about?<\\\/h4>\",\"content_de_de\":\"\n\n<h4>Worum geht es bei NIS2?<\\\/h4>\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p2\\\"><span class=\\\"s1\\\"> <\\\/span>The development of the geopolitical situation has taught us that it can escalate at any time and very quickly. There is no guarantee of geopolitical stability and the <strong>\\u201cprinciple of hope\\u201d is not suitable for protecting<\\\/strong> the EU from such challenges. The NIS2 is one approach, among many others, to overcome these challenges. Building upon the foundation laid by its predecessor, the original Network and Information Systems (NIS) Directive, NIS2 introduces several key changes and expansions to address the evolving cybersecurity landscape and to close the gaps identified in the implementation of the first directive.<\\\/p>\\n\n\n<p class=\\\"p2\\\">A summary of the NIS2 Directive, including the <strong>major changes from the former NIS<\\\/strong> and the impact on relevant companies follows:<\\\/p>\\n\n\n<ul>\\n\n\n<li class=\\\"p3\\\">Broader definition of relevant entities<\\\/li>\\n\n\n<li class=\\\"p3\\\">Enhanced security and incident reporting requirements<\\\/li>\\n\n\n<li class=\\\"p3\\\">Stricter accountability requirements for senior management<\\\/li>\\n\n\n<li class=\\\"p3\\\">Increased regulatory powers and harmonization<\\\/li>\\n\n\n<li class=\\\"p4\\\">Focus on supply chain security and third-party risk management<\\\/li>\\n<\\\/ul>\",\"content_de_de\":\"\n\n<p>Die Entwicklung der geopolitischen Lage hat uns gezeigt, dass diese jederzeit und sehr schnell eskalieren kann. Es gibt keine Garantie f\\u00fcr geopolitische Stabilit\\u00e4t und das \\\"Prinzip Hoffnung\\\" ist nicht geeignet, die EU vor solchen Herausforderungen zu sch\\u00fctzen. Aufbauend auf dem Fundament, das durch ihren Vorg\\u00e4nger, die urspr\\u00fcngliche Richtlinie \\u00fcber Netz- und Informationssysteme (NIS), gelegt wurde, f\\u00fchrt die NIS2 wichtige \\u00c4nderungen und Erweiterungen ein, um der entstehenden Cybersicherheitslandschaft gerecht zu werden und die bei der Umsetzung der ersten Richtlinie festgestellten L\\u00fccken zu schlie\\u00dfen.<\\\/p>\\n\n\n<p>Im Folgenden sind die ma\\u00dfgeblichen \\u00c4nderungen der NIS2 aufgef\\u00fchrt und deren Auswirkungen auf relevante Unternehmen:<\\\/p>\\n\n\n<ul>\\n\n\n<li>Erweiterte Definition relevanter Unternehmen<\\\/li>\\n\n\n<li>Verbesserte bzw. H\\u00f6here Anforderungen an die Sicherheits- und Vorfallberichterstattung<\\\/li>\\n\n\n<li>Strengere Anforderungen an die Rechenschaftspflicht der Gesch\\u00e4ftsleitung<\\\/li>\\n\n\n<li>Harmonisierung der Regelungen innerhalb der Mitgliedstaaten<\\\/li>\\n\n\n<li>St\\u00e4rkerer Fokus auf sichere Lieferketten inkl. Risikomanagement von Drittanbietern<\\\/li>\\n<\\\/ul>\",\"margin\":\"default\"}},{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/sym_nis2_whatsnew.jpg\",\"image_de_de\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/sym_nis2_moreenteties_de.jpg\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">The European regulation does not directly enforce NIS2 compliance; rather, national legislation that are based on the directive are used to do so. This means that until national authorities develop national laws and requirements, companies must rely on the directive\\u2018s guidelines. The directive is prepared for all 27 member states, hence the language is kept high-level so that it may be applied to any case.<\\\/p>\",\"content_de_de\":\"\n\n<p>Die europ\\u00e4ische Verordnung setzt die Einhaltung der NIS2 nicht direkt durch. Jeder EU-Mitgliedstaat muss die Richtlinie in nationale Gesetzgebung umsetzen, wobei dieses in Deutschland durch das BSI (Bundesamt f\\u00fcr Sicherheit in der Informationstechnik) geleitet wird. Die Richtlinie wurde f\\u00fcr alle 27 Mitgliedsstaaten ausgearbeitet, daher ist die Form sehr allgemein und teilweise unspezifisch gehalten, so dass sie universell angewendet werden kann.<\\\/p>\",\"margin\":\"default\"}},{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h4 class=\\\"p1\\\"><span class=\\\"s1\\\"><b>What are the major benefits for the machine manufacturers and operators? <\\\/b><\\\/span><\\\/h4>\",\"content_de_de\":\"\n\n<h4>Was sind die wichtigsten Vorteile f\\u00fcr Maschinenhersteller und -betreiber?<\\\/h4>\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">The NIS2 Directive is crucial for the machine manufacturing and operating industry for several compelling reasons:<\\\/p>\",\"content_de_de\":\"\n\n<p>Die NIS2-Richtlinie kann f\\u00fcr die Maschinenbau- und Betreiberindustrie aus mehreren Gr\\u00fcnden von entscheidender Bedeutung werden:<\\\/p>\",\"margin\":\"default\"}},{\"type\":\"list\",\"props\":{\"column_breakpoint\":\"m\",\"css\":\".el-element {background-color: #FFF8EB;\\n    padding: 20px;}\",\"image_align\":\"left\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":false,\"image_width\":\"100\",\"list_element\":\"ul\",\"list_horizontal_separator\":\", \",\"list_type\":\"vertical\",\"show_image\":true,\"show_link\":true},\"children\":[{\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p><strong>Enhanced Cybersecurity Standards<br \\\/><\\\/strong>The NIS2 Directive raises the bar for cybersecurity standards across the board. For machine manufacturers and operators, this means adopting more rigorous cybersecurity practices to protect against increasingly sophisticated cyber threats. Given the industry\\u2019s reliance on digital technologies and networked systems for operations, enhanced standards are vital for safeguarding sensitive data and operational continuity.<br \\\/><br \\\/><\\\/p>\",\"content_de_de\":\"\n\n<p><strong>Verbesserte Cybersicherheitsstandards<br \\\/><\\\/strong>Die NIS2-Richtlinie legt die Messlatte f\\u00fcr Cybersicherheits-Standards h\\u00f6her. F\\u00fcr Maschinenhersteller und -betreiber hei\\u00dft das, dass sie strengere Cybersicherheits-Praktiken einf\\u00fchren m\\u00fcssen, um sich vor immer raffinierteren Cyber-Bedrohungen zu sch\\u00fctzen. Angesichts der Abh\\u00e4ngigkeit der Branche von digitalen Technologien und vernetzten Systemen f\\u00fcr den Betrieb sind verbesserte Standards f\\u00fcr den Schutz sensibler Daten und die Betriebskontinuit\\u00e4t unerl\\u00e4sslich.<br \\\/><br \\\/><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/symmedia_icon__lock.png\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p class=\\\"p1\\\"><span class=\\\"s1\\\"><b>Resilience Against Disruptions<br \\\/><\\\/b><\\\/span><span class=\\\"s1\\\">Machine manufacturing and operating sectors are critical to the economy and infrast-ructure. A cyber-attack in these areas could lead to significant disruptions, not just for the affected company but for entire supply chains and the economy at large. NIS2 aims to minimize this risk by ensuring these industries have robust mechanisms in place to prevent, detect, and rapidly recover from cyber incidents.<br \\\/><br \\\/><\\\/span><\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\"><span class=\\\"s1\\\"><b>Widerstandsf\\u00e4higkeit gegen St\\u00f6rungen<br \\\/><\\\/b><\\\/span><span class=\\\"s1\\\">Die Bereiche Maschinenbau und produzierende Industrie sind f\\u00fcr die Wirtschaft und die Infrastruktur von essenzieller Bedeutung. Ein Cyberangriff in diesen Bereichen k\\u00f6nnte zu erheblichen St\\u00f6rungen f\\u00fchren, nicht nur f\\u00fcr das betroffene Unternehmen, sondern f\\u00fcr ganze Lieferketten und die Wirtschaft insgesamt. NIS2 zielt darauf ab, dieses Risiko zu minimieren, indem sichergestellt wird, dass diese Branchen \\u00fcber robuste Mechanismen verf\\u00fcgen, um Cyberangriffe zu verhindern, zu erkennen und sich schnell davon zu erholen.<br \\\/><br \\\/><\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/symmedia_icon__resilience.png\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p class=\\\"p1\\\"><span class=\\\"s1\\\"><b>Supply Chain Security<br \\\/><\\\/b><\\\/span>NIS2 places a strong emphasis on securing the supply chain, which is particularly relevant for machine manufacturing and operating industries. These sectors often involve complex supply chains with numerous vendors and service providers. Ensuring cybersecurity throughout this chain is essential to prevent vulnerabilities that could be exploited by attackers.<br \\\/><br \\\/><\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\"><span class=\\\"s1\\\"><b>Sicherheit der Lieferkette<br \\\/><\\\/b><\\\/span>Die NIS2 legt einen starken Schwerpunkt auf die Sicherheit der Lieferkette, was besonders relevant f\\u00fcr den Maschinenbau und dessen Betreiber ist. In diesen Branchen gibt es oft komplexe Lieferketten mit zahlreichen Anbietern und Dienstleistern. Die Gew\\u00e4hrleistung der Cybersicherheit \\u00fcber diese Kette hinweg ist substanziell, um Schwachstellen zu vermeiden, die von Angreifern ausgenutzt werden k\\u00f6nnten. <br \\\/><br \\\/><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/symmedia_icon__supply-chain.png\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p class=\\\"p1\\\"><span class=\\\"s1\\\"><b>Compliance and Competitive Advantage<br \\\/><\\\/b><\\\/span><span class=\\\"s1\\\">By adhering to NIS2, companies in the machine manufacturing and operating industry not only ensure compliance with European regulations but also gain a competitive advantage. Demonstrating strong cybersecurity practices can be a significant factor in building trust with clients and partners, potentially leading to more business opportunities.<br \\\/><br \\\/><\\\/span><\\\/p>\",\"content_de_de\":\"<span class=\\\"s1\\\"><b>Compliance und Wettbewerbsvorteil<br \\\/><\\\/b><\\\/span>Durch die Einf\\u00fchrung von NIS2 gew\\u00e4hrleisten Unternehmen in der Maschinenbau- und Betreiberindustrie nicht nur die Einhaltung der europ\\u00e4ischen Vorschriften, sondern verschaffen sich auch einen Wettbewerbsvorteil. Die Demonstration starker Cybersicherheits-Praktiken kann ein wichtiger Faktor f\\u00fcr den Aufbau von Vertrauen bei Kunden und Partnern sein, was potenziell zu mehr Gesch\\u00e4ftsabschl\\u00fcssen f\\u00fchrt.<span class=\\\"s1\\\"><br \\\/><\\\/span>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/symmedia_icon__compliance.png\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p class=\\\"p1\\\"><span class=\\\"s1\\\"><b>Innovation and Digital Transformation Support<br \\\/><\\\/b><\\\/span>The directive supports innovation and digital transformation efforts by establishing a secure environment for deploying new technologies. As machine manufacturing and operations increasingly incorporate IoT, AI, and other advanced technologies, having a framework like NIS2 ensures these innovations enhance productivity without compromising security.<\\\/p>\",\"content_de_de\":\"<span class=\\\"s1\\\"><b>Innovation und Digitales Unterst\\u00fctzung der Transformation <br \\\/><\\\/b><\\\/span>Die Richtlinie unterst\\u00fctzt Innovation und digitale Transformation, indem sie eine sichere Umgebung f\\u00fcr den Einsatz neuer Technologien schafft. Da im Maschinenbau und der Betreiberindustrie zunehmend IoT, KI und andere fortschrittliche Technologien zum Einsatz kommen, sorgt ein Rahmenwerk wie NIS2 daf\\u00fcr, dass solche Innovationen die Produktivit\\u00e4t steigern, ohne die Sicherheit zu beeintr\\u00e4chtigen.<span class=\\\"s1\\\"><b>\\u00a0<\\\/b><\\\/span>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/symmedia_icon__innovation.png\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">In essence, NIS2 will play an important role for the machine manufacturing and operating industry as it ensures that companies in this sector are <strong>prepared to face current and future cybersecurity challenges<\\\/strong>. By promoting a culture of continuous improvement in cybersecurity practices, NIS2 helps safeguard the industry\\u2019s vital role in the economy, enhances its resilience, and supports its digital transformation journey.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Im Wesentlichen wird NIS2 eine wichtige Rolle f\\u00fcr die Maschinenbau- und Betreiberindustrie spielen, da sie sicherstellt, dass die Unternehmen in diesem Sektor auch auf bestehende und k\\u00fcnftige Herausforderungen im Bereich der Cybersicherheit vorbereitet sind. Durch die F\\u00f6rderung einer Kultur der kontinuierlichen Verbesserung der Cybersicherheits-Standards tr\\u00e4gt NIS2 dazu bei, die Sch\\u00fcsselrolle der Industrie in der Wirtschaft zu sichern, ihre Widerstandsf\\u00e4higkeit zu erh\\u00f6hen und ihren Weg der digitalen Transformation zu unterst\\u00fctzen.<\\\/p>\",\"margin\":\"default\"}},{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h4 class=\\\"p1\\\"><span class=\\\"s1\\\"><b>NIS2 compliance through IEC 62443 certification <\\\/b><\\\/span><\\\/h4>\",\"content_de_de\":\"\n\n<h4 class=\\\"p1\\\"><span class=\\\"s1\\\"><b>\\nNIS2-Konformit\\u00e4t durch IEC 62443-Zertifizierung\\n<\\\/b><\\\/span><\\\/h4>\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">The importance of regulation such as NIS2 cannot be overstated. As cyber<strong> threats become increasingly sophisticated<\\\/strong>, the need for <strong>robust, comprehensive cybersecurity measures<\\\/strong> becomes paramount. This is where standards such as IEC 62443 come into play. Specifically designed to secure industrial communication networks, IEC 62443 provides a structured approach to cybersecurity, covering aspects from risk assessment to system development, and maintenance. It\\u2019s a framework that not only supports but enhances compliance with NIS2 by offering a clear, actionable path towards implementing the necessary cybersecurity controls and practices.<\\\/p>\\n\n\n<p class=\\\"p1\\\">IEC 62443 provides a lot of assistance for implementing cyber security risk-management measures that NIS2 demands. A high level mapping of IEC 62443\\u2019s measures with the corresponding basic cybersecurity risk management requirements, as defined in the NIS Article 21 is described here:<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Die Bedeutung von l\\u00e4nder\\u00fcbergreifenden Ma\\u00dfnahmen wie der NIS2 kann nicht genug betont werden. Die Bedrohung durch Cyberkriminalit\\u00e4t steigt, ebenso wie die F\\u00e4higkeiten dieser Akteure, stetig und rasant an und macht vor L\\u00e4ndergrenzen nat\\u00fcrlich keinen Halt, so dass die Notwendigkeit robuster, umfassender Cybersicherheits-Ma\\u00dfnahmen von gr\\u00f6\\u00dfter Bedeutung ist. Hier kommen Normen wie die IEC 62443 ins Spiel, welche speziell f\\u00fcr die Absicherung industrieller Kommunikationsnetze entwickelt wurde und Aspekte der Risikobewertung, Systementwicklung und -wartung mit einbezieht. Dieses Rahmenwerk unterst\\u00fctzt die Einhaltung der NIS2 nicht nur, sondern verbessert sie sogar, indem sie einen klaren, umsetzbaren Weg zur Implementierung der erforderlichen Cybersicherheits-Kontrollen und -Praktiken aufzeigt.\\n<\\\/p>\\n\n\n<p class=\\\"p1\\\">Die IEC 62443 bietet viele Hilfestellungen f\\u00fcr die Umsetzung der von der NIS2 geforderten Ma\\u00dfnahmen zum Management von Cybersicherheits-Risiken. Im Folgenden wird gezeigt, wie Ma\\u00dfnahmen aus der IEC 62443 auf die entsprechenden Cybersicherheits-Basisanforderungen, wie sie in Artikel 21 der NIS definiert sind, einwirken:<\\\/p>\",\"css\":\".el-element {margin-bottom: 40px;}\",\"margin\":\"default\"}},{\"type\":\"fragment\",\"props\":{\"margin\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h4 class=\\\"p1\\\" style=\\\"text-align: center;\\\">NIS2 requirements<\\\/h4>\",\"content_de_de\":\"\n\n<h4 class=\\\"p1\\\" style=\\\"text-align: center;\\\">NIS2 Anforderungen<\\\/h4>\",\"css\":\".el-element {background-color: #f6a802;\\npadding: 10px;\\nheight:100%;\\n}\\nh4 {color: #ffffff;}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h4 class=\\\"p1\\\" style=\\\"text-align: center;\\\">IEC 62443 Ma\\u00dfnahmen<\\\/h4>\",\"css\":\".el-element {background-color: #0e143e;\\n    padding: 10px;}\\nh4 {color: #ffffff;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Risk analysis and Security Policies<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Risikoanalyse und Sicherheitsrichtlinien<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -30px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Conduct risk analyses and develop information system security policies<\\\/p>\",\"content_de_de\":\"\n\n<p>Durchf\\u00fchrung von Risikoanalysen und Entwicklung von Sicherheitsstrategien f\\u00fcr Informationssysteme.<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Sections 2-1 and 3-3 ensure risk analysis and security policies including a cybersecurity threat modeling and assessment. These are also essential parts of the 4-1 ML3 certification.<\\\/p>\",\"content_de_de\":\"\n\n<p>Die Abschnitte 2-1 und 3-3 sorgen f\\u00fcr eine Risikoanalyse und Sicherheitsrichtlinien, einschlie\\u00dflich eines Cybersicherheits-Bedrohungsmodells und einer Cybersicherheits-Bewertung. Diese sind auch wesentliche Bestandteile einer 4-1 ML3-Zertifizierung.<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Incident Handling<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Umgang mit Vorf\\u00e4llen<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -30px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Aufbau und Aufrechterhaltung der F\\u00e4higkeit zur Behandlung von Sicherheitsvorf\\u00e4llen (Incidents).<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Sections 4-1 and 3-3 assess and assure comprehensive incident handling processes, including detection, response, and recovery mechanisms.<\\\/p>\",\"content_de_de\":\"\n\n<p>In den Abschnitten 4-1 und 3-3 werden umfassende Verfahren zur Behandlung von Sicherheitsvorf\\u00e4llen, einschlie\\u00dflich Erkennungs-, Reaktions- und Wiederherstellungsmechanismen, bewertet und sichergestellt.<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Business Continuity and Crisis Management<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Betriebliches Kontinuit\\u00e4ts- und Krisenmanagement<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -20px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Develop business continuity and crisis management plans<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Entwicklung von Pl\\u00e4nen f\\u00fcr Gesch\\u00e4ftskontinuit\\u00e4t und Krisenmanagement.<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>According to sections 4-1 and 3-3, resilience and recovery planning, ensuring operational continuity need to be implemented. Section 3-3 sets out system security requirements and levels.<\\\/p>\",\"content_de_de\":\"\n\n<p>Gem\\u00e4\\u00df den Abschnitten 4-1 und 3-3 muss eine Ausfallsicherheits- und Wiederherstellungsplanung durchgef\\u00fchrt werden, die die Kontinuit\\u00e4t des Betriebs gew\\u00e4hrleistet. In Abschnitt 3-3 werden die Anforderungen an die Systemsicherheit und die Sicherheitsstufen festgelegt.<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Supply Chain Security<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Sicherheit der Lieferkette<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -30px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Ensure the security of network and information systems within the supply chain<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Gew\\u00e4hrleistung der Sicherheit der Netz- und Informationssysteme innerhalb der Lieferkette.<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Supply chain security risk assessment is crucial part of section 4-1 \\u2013 Section 3-3 demands technical security requirements for IACS components in the supply chain.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Die Risikobewertung f\\u00fcr die Sicherheit der Lieferkette ist ein wesentlicher Bestandteil von Abschnitt 4-1 - Abschnitt 3-3 fordert technische Sicherheitsanforderungen f\\u00fcr IACS-Komponenten in der Lieferkette.<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Security in Network and Information Systems<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Sicherheit in Netz- und Informationssystemen<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -30px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Ensure secure acquisition, development, and maintenance of network and information systems.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Gew\\u00e4hrleistung einer sicheren Beschaffung, Entwicklung und Wartung von Netz- und Informationssystemen.\\n<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">This requirement describes exactly what the IEC standard is designed for and is therefore directly addressed by the corresponding sections.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Diese Anforderung beschreibt genau das, wof\\u00fcr die IEC-Norm gedacht ist, und wird daher in den entsprechenden Abschnitten direkt angesprochen.<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Policies and Procedures to Access the Effectiveness<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Richtlinien und Verfahren zur \\u00dcberpr\\u00fcfung der Ma\\u00dfnahmenwirksamkeit<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -30px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Implement policies and procedures for assessing cybersecurity risk management measures\\u2019 effectiveness<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">\\nUmsetzung von Strategien und Verfahren zur Bewertung der Wirksamkeit von Ma\\u00dfnahmen zum Management von Cybersicherheits-Risiken.\\n<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Continuous evaluation against the IEC 62443 standards, specifically sections 4-1 and 3-3, forces assessing and improving the effectiveness of cybersecurity measures.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Die kontinuierliche Bewertung anhand der IEC 62443-Normen, insbesondere der Abschnitte 4-1 und 3-3, zwingt zur Bewertung und Verbesserung der Wirksamkeit von Cybersicherheits-Ma\\u00dfnahmen..<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Use of Cryptography and Encryption<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Einsatz von Kryptographie und Verschl\\u00fcsselung<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -30px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Utilize cryptography and encryption to protect data and information where appropriate<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Einsatz von Kryptographie und Verschl\\u00fcsselung zum Schutz von Daten und Informationen, wo dies angebracht ist<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">In section 3-3 Data Confidentiality and Integrity is specified including provisions for the use of cryptographic measures in and end-to-end approach.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">In Abschnitt 3-3 wird die Vertraulichkeit und Integrit\\u00e4t der Daten spezifiziert, einschlie\\u00dflich Bestimmungen f\\u00fcr die Verwendung kryptographischer Ma\\u00dfnahmen in einem durchg\\u00e4ngigen Ansatz.<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Human Resources, Security Awareness, and Training<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>Personalwesen, Sicherheitsbewusstsein und Schulung<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -30px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Ensure human resources security through awareness and training.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Gew\\u00e4hrleistung der Sicherheit des Personalwesens durch Aufkl\\u00e4rung und Schulung<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Consistent with sections 4-2 and 3-3, comprehensive security training and awareness program is underpinning cybersecurity defenses with a knowledgeable and prepared workforce.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">In \\u00dcbereinstimmung mit den Abschnitten 4-2 und 3-3 untermauern umfassende Sicherheitsschulungen und Sensibilisierungsprogramme die Cybersicherheit mit einer gut ausgebildeten und vorbereiteten Belegschaft.<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]},{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>MFA and Continuous Authentication Solutions<\\\/b><\\\/span><\\\/h5>\",\"content_de_de\":\"\n\n<h5 class=\\\"p1\\\" style=\\\"text-align: center;\\\"><span class=\\\"s1\\\"><b>MFA- und kontinuierliche Authentifizierungsl\\u00f6sungen<\\\/b><\\\/span><\\\/h5>\",\"css\":\".el-element {margin-top:10px; margin-bottom: -30px;}\",\"margin\":\"\"}}]}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\",\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">Use MFA, secured voice, video and text communications and secured emergency communication where appropriate<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">\\nVerwenden Sie MFA, gesicherte Sprach-, Video- und Textkommunikation und gegebenenfalls gesicherte Notfallkommunikation.\\n<\\\/p>\",\"css\":\".el-element {background-color: #FFF8EB;\\npadding: 10px;\\nheight:100%;\\n}\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">The IEC requires state-of-the-art access control and secure communications which in turn are appropriately implemented via MFA and continuous authentication solution.<\\\/p>\",\"content_de_de\":\"\n\n<p class=\\\"p1\\\">Die IEC erfordert eine hochmoderne Zugangskontrolle und sichere Kommunikation, die wiederum durch MFA und eine kontinuierliche Authentifizierungsl\\u00f6sung angemessen umgesetzt wird.<\\\/p>\",\"css\":\".el-element {background-color: #EEF0FB;\\n    padding: 10px;}\",\"margin\":\"default\"}}]}]}]},{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h4 class=\\\"p1\\\"><span class=\\\"s1\\\"><b>Summary<\\\/b><\\\/span><\\\/h4>\",\"content_de_de\":\"\n\n<h4 class=\\\"p1\\\"><span class=\\\"s1\\\"><b>Zusammenfassung<\\\/b><\\\/span><\\\/h4>\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p class=\\\"p1\\\">The alignment of the IEC 62443 standards with the requirements of the NIS2 Directive establishes a comprehensive and <strong>robust framework for cybersecurity<\\\/strong> within the realm of Industrial Automation and Control Systems (IACS). While NIS2 sets forth the overarching objectives for cybersecurity resilience and the protection of critical network and information systems across the EU, it does not prescribe specific methods or technologies for achieving compliance. This ambiguity leaves organizations with the challenge of <strong>interpreting and implementing the Directive\\u2019s requirements<\\\/strong> in a way that best suits their operational context and risk landscape.<\\\/p>\\n\n\n<p class=\\\"p1\\\"><strong>IEC 62443 steps into this gap<\\\/strong> by providing a detailed, structured approach to cybersecurity that directly supports the achievement of NIS2 objectives for the operation technology. It\\u2019s important to note though, that the IEC 62443 is aimed at the OT-Layer and therefore does not cover all aspects of the corporate IT-Layer, companies must implement suitable information security measures for this layer as well. Common basic standards such as ISO 27001 or BSI IT-Grundschutz are suitable approaches for implementing the appropriate measures in coexistence with the IEC 62443.<\\\/p>\\n\n\n<p class=\\\"p2\\\">This ensures that organizations are not only compliant with current regulations but are also well-prepared to adapt to evolving cybersecurity threats and future legislative changes.<\\\/p>\",\"content_de_de\":\"\n\n<p>Durch die Abbildung der IEC 62443 Ma\\u00dfnahmen auf die Anforderungen der NIS2-Richtlinie wird ein umfassender und robuster Rahmen f\\u00fcr die Cybersicherheit im Bereich der industriellen Automatisierungs- und Steuerungssysteme (IACS) geschaffen. W\\u00e4hrend die NIS2-Richtlinie die \\u00fcbergreifenden Ziele f\\u00fcr die Cybersicherheit und den Schutz kritischer Netzwerk- und Informationssysteme in der EU festlegt, schreibt sie keine spezifischen Methoden oder Technologien vor, um diese Anforderungen zu erf\\u00fcllen. Diese Unklarheit stellt Unternehmen vor die Herausforderung, die Anforderungen der Richtlinie so zu interpretieren und umzusetzen, dass sie am besten zu ihrem betrieblichen Kontext und ihrer Risikolandschaft passen. Die IEC 62443 f\\u00fcllt diese L\\u00fccke, indem sie einen detaillierten, strukturierten Ansatz f\\u00fcr die Cybersicherheit bietet, der die Erreichung der NIS2-Ziele f\\u00fcr die Operative Technologie direkt unterst\\u00fctzt. Es ist jedoch wichtig zu beachten, dass die IEC 62443 auf die OT-Schicht abzielt und daher nicht alle Aspekte der IT-Schicht des Unternehmens abdeckt. Unternehmen m\\u00fcssen auch f\\u00fcr diese Schicht geeignete Informationssicherheits-Ma\\u00dfnahmen umsetzen. G\\u00e4ngige Standards wie die ISO 27001 oder BSI IT-Grundschutz sind geeignete Ans\\u00e4tze, um die entsprechenden Ma\\u00dfnahmen in Koexistenz mit der IEC 62443 durchzuf\\u00fchren.<\\\/p>\\n\n\n<p>Dadurch wird sichergestellt, dass Unternehmen nicht nur die aktuellen Vorschriften einhalten, sondern auch optimal auf entstehende Bedrohungen der Cybersicherheit und k\\u00fcnftige Gesetzes\\u00e4nderungen vorbereitet sind.<\\\/p>\",\"margin\":\"default\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><\\\/p>\\n\n\n<p><strong>Curious to find out how symmedia Hub supports NIS2 compliance and brings your cybersecurity to the next level? Get in touch, we're looking forward to hearing from you:<\\\/strong><\\\/p>\\n\n\n<p><span><a href=\\\"mailto:sales@symmedia.de\\\"><strong>sales@symmedia.de<\\\/strong><\\\/a><\\\/span><strong><br \\\/>+49 (0)521 9665 50<\\\/strong><\\\/p>\",\"content_de_de\":\"\n\n<p><strong>M\\u00f6chten Sie wissen, wie IEC 62443 zertifizierte Produkte wie der symmedia Hub Ihre Organisation bei der NIS2-Konformit\\u00e4t unterst\\u00fctzen? Dann nehmen Sie Kontakt mit uns auf:<\\\/strong><\\\/p>\\n\n\n<p><span><a href=\\\"mailto:sales@symmedia.de\\\"><strong>sales@symmedia.de<\\\/strong><\\\/a><\\\/span><strong><br \\\/>+49 (0)521 9665 50<\\\/strong><\\\/p>\",\"margin\":\"default\"}},{\"type\":\"fragment\",\"props\":{\"css\":\".el-element {background-color: #FFF2D7;\\npadding: 20px;}\",\"margin\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-3,2-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"css\":\"img {border-radius: 200px;}\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/dsc00308_bb_marius-1.jpg\",\"image_alt\":\"Marius, CTO of symmedia\",\"image_height\":200,\"image_svg_color\":\"emphasis\",\"image_width\":200,\"margin\":\"default\",\"text_align\":\"center\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h6>Author<\\\/h6>\",\"margin\":\"default\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5>Marius Burger<\\\/h5>\\n\n\n<p>Marius Burger is symmedia's Chief Technical Officer. Driven by passion for cybersecurity, Marius is committed to developing cutting-edge security solutions for the industrial sector. In the symZone, Marius offers insight into how the symmedia Hub strengthens cybersecurity and helps companies become more resilient and competitive.<\\\/p>\",\"css\":\".el-element {font-size: 14px;}\\nh5 {font-size: 20px; \\nmargin-top: -20px;}\",\"margin\":\"default\"}}]}]}],\"name\":\"Author Box Marius\"},{\"type\":\"yooessentials_social_sharing\",\"props\":{\"css\":\".el-link{color:#f5a802}\\n.el-element::before {\\n  content: \\\"Share\\\";\\n  float:left;\\n    font-weight:700;\\n    margin-top: 2px;\\n}\",\"gap\":\"small\",\"link_style\":\"link\",\"margin\":\"large\"},\"children\":[{\"type\":\"yooessentials_social_sharing_item\",\"props\":{\"link\":\"linkedin\",\"link_target\":\"_blank\",\"link_target_height\":\"\",\"link_target_width\":\"\"}},{\"type\":\"yooessentials_social_sharing_item\",\"props\":{\"custom_link\":\"https:\\\/\\\/www.xing.com\\\/spi\\\/shares\\\/new?url=%s\",\"link\":\"custom\",\"link_target\":\"_blank\",\"link_target_height\":\"\",\"link_target_width\":\"\"}},{\"type\":\"yooessentials_social_sharing_item\",\"props\":{\"link\":\"facebook\",\"link_target\":\"_blank\",\"link_target_height\":\"\",\"link_target_width\":\"\"}},{\"type\":\"yooessentials_social_sharing_item\",\"props\":{\"link\":\"twitter\",\"link_target\":\"_blank\",\"link_target_height\":\"\",\"link_target_width\":\"\"}},{\"type\":\"yooessentials_social_sharing_item\",\"props\":{\"link\":\"whatsapp\",\"link_target\":\"_blank\",\"link_target_height\":\"\",\"link_target_width\":\"\"}}],\"name\":\"social sharing\"},{\"type\":\"headline\",\"props\":{\"content\":\"You might also enjoy:\",\"css\":\".el-element{font-weight:bold}\",\"title_element\":\"h3\",\"title_style\":\"text-lead\"}},{\"type\":\"fs_grid\",\"props\":{\"advanced_enable_grid_1_custom\":true,\"advanced_enable_grid_2_custom\":false,\"advanced_enable_grid_3_custom\":false,\"advanced_enable_grid_4_custom\":false,\"advanced_enable_grid_5_custom\":false,\"advanced_enable_grid_6_custom\":false,\"advanced_enable_grids_empty_disable\":false,\"advanced_enable_grids_empty_notification\":false,\"advanced_enable_grids_hightlight\":false,\"advanced_grid\":true,\"advanced_item_layout\":false,\"attributes\":\"lang=\\\"de\\\"\",\"content_column_breakpoint\":\"m\",\"content_limit\":true,\"content_limit_length\":\"120\",\"css\":\".fs-grid-nested-1-container{\\n\\tposition: absolute;\\n    right: 8px;\\n    top: -10px;\\n}\\n.fs-grid-nested-1-container .uk-tile-secondary{\\n\\tpadding: 5px 15px;\\n    font-size: 12px;\\n    font-weight:bold;\\n    text-transform:uppercase;\\n    letter-spacing:1px;\\n}\\n.fs-grid-nested-1-container .fs-grid-meta-1{\\n        color:#fff;\\n}\\n.fs-grid-nested-1-container .fs-grid-meta-1 a{\\n        color:#fff;\\n}\\n.fs-grid-nested-1-container .fs-grid-meta-1 a:hover{\\n        text-decoration:none;\\n}\\n.el-title{font-size:18px;letter-spacing: 1px;\\n    margin-top: 10px!important;\\n    margin-bottom: -10px!important; }\\n.el-content{font-size:15px}\",\"custom_10_element\":\"div\",\"custom_10_grid\":\"1\",\"custom_10_limit_length\":\"80\",\"custom_10_margin\":\"remove\",\"custom_10_meta_element\":\"div\",\"custom_10_meta_grid\":\"1\",\"custom_10_meta_margin\":\"remove\",\"custom_10_meta_position\":\"above-custom-text\",\"custom_11_element\":\"div\",\"custom_11_grid\":\"1\",\"custom_11_limit_length\":\"80\",\"custom_11_margin\":\"remove\",\"custom_11_meta_element\":\"div\",\"custom_11_meta_grid\":\"1\",\"custom_11_meta_margin\":\"remove\",\"custom_11_meta_position\":\"above-custom-text\",\"custom_12_element\":\"div\",\"custom_12_grid\":\"1\",\"custom_12_limit_length\":\"80\",\"custom_12_margin\":\"remove\",\"custom_12_meta_element\":\"div\",\"custom_12_meta_grid\":\"1\",\"custom_12_meta_margin\":\"remove\",\"custom_12_meta_position\":\"above-custom-text\",\"custom_13_element\":\"div\",\"custom_13_grid\":\"1\",\"custom_13_limit_length\":\"80\",\"custom_13_margin\":\"remove\",\"custom_13_meta_element\":\"div\",\"custom_13_meta_grid\":\"1\",\"custom_13_meta_margin\":\"remove\",\"custom_13_meta_position\":\"above-custom-text\",\"custom_14_element\":\"div\",\"custom_14_grid\":\"1\",\"custom_14_limit_length\":\"80\",\"custom_14_margin\":\"remove\",\"custom_14_meta_element\":\"div\",\"custom_14_meta_grid\":\"1\",\"custom_14_meta_margin\":\"remove\",\"custom_14_meta_position\":\"above-custom-text\",\"custom_15_element\":\"div\",\"custom_15_grid\":\"1\",\"custom_15_limit_length\":\"80\",\"custom_15_margin\":\"remove\",\"custom_15_meta_element\":\"div\",\"custom_15_meta_grid\":\"1\",\"custom_15_meta_margin\":\"remove\",\"custom_15_meta_position\":\"above-custom-text\",\"custom_16_element\":\"div\",\"custom_16_grid\":\"1\",\"custom_16_limit_length\":\"80\",\"custom_16_margin\":\"remove\",\"custom_16_meta_element\":\"div\",\"custom_16_meta_grid\":\"1\",\"custom_16_meta_margin\":\"remove\",\"custom_16_meta_position\":\"above-custom-text\",\"custom_17_element\":\"div\",\"custom_17_grid\":\"1\",\"custom_17_limit_length\":\"80\",\"custom_17_margin\":\"remove\",\"custom_17_meta_element\":\"div\",\"custom_17_meta_grid\":\"1\",\"custom_17_meta_margin\":\"remove\",\"custom_17_meta_position\":\"above-custom-text\",\"custom_18_element\":\"div\",\"custom_18_grid\":\"1\",\"custom_18_limit_length\":\"80\",\"custom_18_margin\":\"remove\",\"custom_18_meta_element\":\"div\",\"custom_18_meta_grid\":\"1\",\"custom_18_meta_margin\":\"remove\",\"custom_18_meta_position\":\"above-custom-text\",\"custom_19_element\":\"div\",\"custom_19_grid\":\"1\",\"custom_19_limit_length\":\"80\",\"custom_19_margin\":\"remove\",\"custom_19_meta_element\":\"div\",\"custom_19_meta_grid\":\"1\",\"custom_19_meta_margin\":\"remove\",\"custom_19_meta_position\":\"above-custom-text\",\"custom_1_element\":\"div\",\"custom_1_grid\":\"1\",\"custom_1_limit_length\":\"80\",\"custom_1_margin\":\"remove\",\"custom_1_meta_element\":\"div\",\"custom_1_meta_grid\":\"1\",\"custom_1_meta_margin\":\"small\",\"custom_1_meta_position\":\"above-custom-text\",\"custom_20_element\":\"div\",\"custom_20_grid\":\"1\",\"custom_20_limit_length\":\"80\",\"custom_20_margin\":\"remove\",\"custom_20_meta_element\":\"div\",\"custom_20_meta_grid\":\"1\",\"custom_20_meta_margin\":\"remove\",\"custom_20_meta_position\":\"above-custom-text\",\"custom_2_element\":\"div\",\"custom_2_grid\":\"1\",\"custom_2_limit_length\":\"80\",\"custom_2_margin\":\"remove\",\"custom_2_meta_element\":\"div\",\"custom_2_meta_grid\":\"1\",\"custom_2_meta_margin\":\"remove\",\"custom_2_meta_position\":\"above-custom-text\",\"custom_3_element\":\"div\",\"custom_3_grid\":\"1\",\"custom_3_limit_length\":\"80\",\"custom_3_margin\":\"remove\",\"custom_3_meta_element\":\"div\",\"custom_3_meta_grid\":\"1\",\"custom_3_meta_margin\":\"remove\",\"custom_3_meta_position\":\"above-custom-text\",\"custom_4_element\":\"div\",\"custom_4_grid\":\"1\",\"custom_4_limit_length\":\"80\",\"custom_4_margin\":\"remove\",\"custom_4_meta_element\":\"div\",\"custom_4_meta_grid\":\"1\",\"custom_4_meta_margin\":\"remove\",\"custom_4_meta_position\":\"above-custom-text\",\"custom_5_element\":\"div\",\"custom_5_grid\":\"1\",\"custom_5_limit_length\":\"80\",\"custom_5_margin\":\"remove\",\"custom_5_meta_element\":\"div\",\"custom_5_meta_grid\":\"1\",\"custom_5_meta_margin\":\"remove\",\"custom_5_meta_position\":\"above-custom-text\",\"custom_6_element\":\"div\",\"custom_6_grid\":\"1\",\"custom_6_limit_length\":\"80\",\"custom_6_margin\":\"remove\",\"custom_6_meta_element\":\"div\",\"custom_6_meta_grid\":\"1\",\"custom_6_meta_margin\":\"remove\",\"custom_6_meta_position\":\"above-custom-text\",\"custom_7_element\":\"div\",\"custom_7_grid\":\"1\",\"custom_7_limit_length\":\"80\",\"custom_7_margin\":\"remove\",\"custom_7_meta_element\":\"div\",\"custom_7_meta_grid\":\"1\",\"custom_7_meta_margin\":\"remove\",\"custom_7_meta_position\":\"above-custom-text\",\"custom_8_element\":\"div\",\"custom_8_grid\":\"1\",\"custom_8_limit_length\":\"80\",\"custom_8_margin\":\"remove\",\"custom_8_meta_element\":\"div\",\"custom_8_meta_grid\":\"1\",\"custom_8_meta_margin\":\"remove\",\"custom_8_meta_position\":\"above-custom-text\",\"custom_9_element\":\"div\",\"custom_9_grid\":\"1\",\"custom_9_limit_length\":\"80\",\"custom_9_margin\":\"remove\",\"custom_9_meta_element\":\"div\",\"custom_9_meta_grid\":\"1\",\"custom_9_meta_margin\":\"remove\",\"custom_9_meta_position\":\"above-custom-text\",\"custom_field_sets\":20,\"custom_filters\":10,\"custom_grids\":6,\"filter\":false,\"filter_align\":\"left\",\"filter_all\":true,\"filter_all_label\":\"Alle Eintr\\u00e4ge\",\"filter_animation\":\"delayed-fade\",\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_groups\":false,\"filter_position\":\"top\",\"filter_sorting\":false,\"filter_sorting_key\":\"\",\"filter_sorting_order\":\"desc\",\"filter_style\":\"subnav-divider\",\"filter_url_hash\":true,\"grid_1_custom_column_gap\":\"small\",\"grid_1_custom_default\":\"1-1\",\"grid_1_custom_grid_match\":false,\"grid_1_custom_icon_width\":80,\"grid_1_custom_image_align\":\"top\",\"grid_1_custom_image_grid_breakpoint\":\"@m\",\"grid_1_custom_image_grid_width\":\"1-2\",\"grid_1_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_1_custom_image_margin_top\":\"uk-margin-small\",\"grid_1_custom_image_svg_color\":\"emphasis\",\"grid_1_custom_panel_card_offset\":false,\"grid_1_custom_panel_padding\":\"small\",\"grid_1_custom_panel_style\":\"tile-secondary\",\"grid_1_custom_position\":\"item-image-cell-top\",\"grid_1_custom_row_gap\":\"small\",\"grid_1_custom_text_align\":\"right\",\"grid_2_custom_column_gap\":\"small\",\"grid_2_custom_default\":\"1-1\",\"grid_2_custom_icon_width\":80,\"grid_2_custom_image_align\":\"top\",\"grid_2_custom_image_grid_breakpoint\":\"@m\",\"grid_2_custom_image_grid_width\":\"1-2\",\"grid_2_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_2_custom_image_margin_top\":\"uk-margin-small\",\"grid_2_custom_image_svg_color\":\"emphasis\",\"grid_2_custom_panel_padding\":\"small\",\"grid_2_custom_position\":\"above-content\",\"grid_2_custom_row_gap\":\"small\",\"grid_3_custom_column_gap\":\"small\",\"grid_3_custom_default\":\"1-1\",\"grid_3_custom_icon_width\":80,\"grid_3_custom_image_align\":\"top\",\"grid_3_custom_image_grid_breakpoint\":\"@m\",\"grid_3_custom_image_grid_width\":\"1-2\",\"grid_3_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_3_custom_image_margin_top\":\"uk-margin-small\",\"grid_3_custom_image_svg_color\":\"emphasis\",\"grid_3_custom_panel_padding\":\"small\",\"grid_3_custom_position\":\"above-content\",\"grid_3_custom_row_gap\":\"small\",\"grid_4_custom_column_gap\":\"small\",\"grid_4_custom_default\":\"1-1\",\"grid_4_custom_icon_width\":80,\"grid_4_custom_image_align\":\"top\",\"grid_4_custom_image_grid_breakpoint\":\"@m\",\"grid_4_custom_image_grid_width\":\"1-2\",\"grid_4_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_4_custom_image_margin_top\":\"uk-margin-small\",\"grid_4_custom_image_svg_color\":\"emphasis\",\"grid_4_custom_panel_padding\":\"small\",\"grid_4_custom_position\":\"bellow-content\",\"grid_4_custom_row_gap\":\"small\",\"grid_5_custom_column_gap\":\"small\",\"grid_5_custom_default\":\"1-1\",\"grid_5_custom_icon_width\":80,\"grid_5_custom_image_align\":\"top\",\"grid_5_custom_image_grid_breakpoint\":\"@m\",\"grid_5_custom_image_grid_width\":\"1-2\",\"grid_5_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_5_custom_image_margin_top\":\"uk-margin-small\",\"grid_5_custom_image_svg_color\":\"emphasis\",\"grid_5_custom_panel_padding\":\"small\",\"grid_5_custom_position\":\"bellow-content\",\"grid_5_custom_row_gap\":\"small\",\"grid_6_custom_column_gap\":\"small\",\"grid_6_custom_default\":\"1-1\",\"grid_6_custom_icon_width\":80,\"grid_6_custom_image_align\":\"top\",\"grid_6_custom_image_grid_breakpoint\":\"@m\",\"grid_6_custom_image_grid_width\":\"1-2\",\"grid_6_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_6_custom_image_margin_top\":\"uk-margin-small\",\"grid_6_custom_image_svg_color\":\"emphasis\",\"grid_6_custom_panel_padding\":\"small\",\"grid_6_custom_position\":\"bellow-content\",\"grid_6_custom_row_gap\":\"small\",\"grid_column_gap\":\"medium\",\"grid_default\":\"1-1\",\"grid_medium\":\"1-3\",\"grid_row_gap\":\"medium\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_height\":\"428\",\"image_svg_color\":\"emphasis\",\"image_width\":\"658\",\"item_animation\":true,\"lightbox\":false,\"link_style\":\"default\",\"link_text\":\"\",\"margin\":\"medium\",\"meta_align\":\"below-content\",\"meta_element\":\"div\",\"meta_limit_length\":\"80\",\"meta_style\":\"text-meta\",\"nav\":\"dotnav\",\"nav_align\":\"center\",\"nav_breakpoint\":\"s\",\"panel_card_image\":true,\"panel_link\":true,\"panel_size\":\"small\",\"panel_style\":\"card-default\",\"parallax_easing\":\"1\",\"rating_star_background_color\":\"#e5e5e5\",\"rating_star_color\":\"#fc0\",\"rating_star_size\":\"25\",\"rating_star_spacing\":\"3\",\"search\":false,\"search_input_placeholder\":\"Search...\",\"search_input_placeholder_de_de\":\"Search...\",\"search_no_items_placeholder\":\"results for posts matching keyword:\",\"search_no_items_placeholder_de_de\":\"results for posts matching keyword:\",\"show_content\":true,\"show_custom_1\":true,\"show_custom_10\":false,\"show_custom_11\":false,\"show_custom_12\":false,\"show_custom_13\":false,\"show_custom_14\":false,\"show_custom_15\":false,\"show_custom_16\":false,\"show_custom_17\":false,\"show_custom_18\":false,\"show_custom_19\":false,\"show_custom_2\":false,\"show_custom_20\":false,\"show_custom_3\":false,\"show_custom_4\":false,\"show_custom_5\":false,\"show_custom_6\":false,\"show_custom_7\":false,\"show_custom_8\":false,\"show_custom_9\":false,\"show_custom_filter_1\":false,\"show_custom_filter_10\":false,\"show_custom_filter_11\":false,\"show_custom_filter_12\":false,\"show_custom_filter_13\":false,\"show_custom_filter_14\":false,\"show_custom_filter_15\":false,\"show_custom_filter_16\":false,\"show_custom_filter_17\":false,\"show_custom_filter_18\":false,\"show_custom_filter_19\":false,\"show_custom_filter_2\":false,\"show_custom_filter_20\":false,\"show_custom_filter_3\":false,\"show_custom_filter_4\":false,\"show_custom_filter_5\":false,\"show_custom_filter_6\":false,\"show_custom_filter_7\":false,\"show_custom_filter_8\":false,\"show_custom_filter_9\":false,\"show_custom_image_1\":false,\"show_custom_image_10\":true,\"show_custom_image_11\":true,\"show_custom_image_12\":true,\"show_custom_image_13\":true,\"show_custom_image_14\":true,\"show_custom_image_15\":true,\"show_custom_image_16\":true,\"show_custom_image_17\":true,\"show_custom_image_18\":true,\"show_custom_image_19\":true,\"show_custom_image_2\":true,\"show_custom_image_20\":true,\"show_custom_image_3\":true,\"show_custom_image_4\":true,\"show_custom_image_5\":true,\"show_custom_image_6\":true,\"show_custom_image_7\":true,\"show_custom_image_8\":true,\"show_custom_image_9\":true,\"show_custom_link_1\":false,\"show_custom_link_10\":true,\"show_custom_link_11\":true,\"show_custom_link_12\":true,\"show_custom_link_13\":true,\"show_custom_link_14\":true,\"show_custom_link_15\":true,\"show_custom_link_16\":true,\"show_custom_link_17\":true,\"show_custom_link_18\":true,\"show_custom_link_19\":true,\"show_custom_link_2\":true,\"show_custom_link_20\":true,\"show_custom_link_3\":true,\"show_custom_link_4\":true,\"show_custom_link_5\":true,\"show_custom_link_6\":true,\"show_custom_link_7\":true,\"show_custom_link_8\":true,\"show_custom_link_9\":true,\"show_custom_meta_1\":true,\"show_custom_meta_10\":true,\"show_custom_meta_11\":true,\"show_custom_meta_12\":true,\"show_custom_meta_13\":true,\"show_custom_meta_14\":true,\"show_custom_meta_15\":true,\"show_custom_meta_16\":true,\"show_custom_meta_17\":true,\"show_custom_meta_18\":true,\"show_custom_meta_19\":true,\"show_custom_meta_2\":true,\"show_custom_meta_20\":true,\"show_custom_meta_3\":true,\"show_custom_meta_4\":true,\"show_custom_meta_5\":true,\"show_custom_meta_6\":true,\"show_custom_meta_7\":true,\"show_custom_meta_8\":true,\"show_custom_meta_9\":true,\"show_custom_settings\":\"all\",\"show_custom_text_1\":true,\"show_custom_text_10\":true,\"show_custom_text_11\":true,\"show_custom_text_12\":true,\"show_custom_text_13\":true,\"show_custom_text_14\":true,\"show_custom_text_15\":true,\"show_custom_text_16\":true,\"show_custom_text_17\":true,\"show_custom_text_18\":true,\"show_custom_text_19\":true,\"show_custom_text_2\":true,\"show_custom_text_20\":true,\"show_custom_text_3\":true,\"show_custom_text_4\":true,\"show_custom_text_5\":true,\"show_custom_text_6\":true,\"show_custom_text_7\":true,\"show_custom_text_8\":true,\"show_custom_text_9\":true,\"show_element_settings\":\"element_panel\",\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_rating\":false,\"show_title\":true,\"slidenav\":\"default\",\"slidenav_breakpoint\":\"s\",\"slidenav_grid\":\"default\",\"slidenav_margin\":\"\",\"slidenav_outside_breakpoint\":\"xl\",\"slider\":false,\"slider_autoplay_pause\":true,\"slider_width_default\":\"1-1\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_limit_length\":\"80\",\"title_margin\":\"small\",\"use_custom_fields\":true},\"children\":[{\"type\":\"fs_grid_item\",\"props\":{\"grid_1_custom_image_height\":\"450\",\"grid_1_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_1_custom_image_margin_top\":\"uk-margin-small\",\"grid_1_custom_image_width\":\"900\",\"grid_1_custom_item_margin\":\"inherit\",\"grid_1_custom_item_text_align_breakpoint\":\"inherit\",\"grid_2_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_2_custom_image_margin_top\":\"uk-margin-small\",\"grid_2_custom_item_margin\":\"inherit\",\"grid_2_custom_item_text_align_breakpoint\":\"inherit\",\"grid_3_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_3_custom_image_margin_top\":\"uk-margin-small\",\"grid_3_custom_item_margin\":\"inherit\",\"grid_3_custom_item_text_align_breakpoint\":\"inherit\",\"grid_4_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_4_custom_image_margin_top\":\"uk-margin-small\",\"grid_4_custom_item_margin\":\"inherit\",\"grid_4_custom_item_text_align_breakpoint\":\"inherit\",\"grid_5_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_5_custom_image_margin_top\":\"uk-margin-small\",\"grid_5_custom_item_margin\":\"inherit\",\"grid_5_custom_item_text_align_breakpoint\":\"inherit\",\"grid_6_custom_image_margin_bottom\":\"uk-margin-small\",\"grid_6_custom_image_margin_top\":\"uk-margin-small\",\"grid_6_custom_item_column_gap\":\"small\",\"grid_6_custom_item_margin\":\"inherit\",\"grid_6_custom_item_text_align_breakpoint\":\"inherit\",\"show_custom_fields\":\"custom_meta\",\"show_custom_settings\":\"grids_images\"},\"source\":{\"query\":{\"name\":\"posts.singlePost\",\"field\":{\"name\":\"relatedPosts\",\"arguments\":{\"category\":\"\",\"post_tag\":\"\",\"post_flag\":\"\",\"offset\":0,\"limit\":3,\"order\":\"date\",\"order_direction\":\"DESC\"}}},\"props\":{\"title\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"},\"meta\":{\"filters\":{\"search\":\"\",\"date\":\"\"},\"name\":\"date\"},\"image\":{\"filters\":{\"search\":\"\"},\"name\":\"featuredImage.url\"},\"image_alt\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"},\"image_title\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"},\"link_panel_custom\":{\"filters\":{\"search\":\"\"},\"name\":\"link\"},\"custom_meta_1\":{\"filters\":{\"search\":\"\"},\"arguments\":{\"separator\":\", \",\"show_link\":true,\"link_style\":\"\"},\"name\":\"post_tagString\"},\"tags\":{\"filters\":{\"search\":\"\"},\"arguments\":{\"separator\":\", \",\"show_link\":true,\"link_style\":\"\"},\"name\":\"categoryString\"},\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"field.vorschautext\"},\"_condition\":{\"filters\":{\"condition\":\"!=\"},\"name\":\"title\"}}}}],\"name\":\"SymZone grid\"}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky\":\"column\",\"position_sticky_breakpoint\":\"m\",\"position_sticky_offset\":\"110\",\"width_medium\":\"1-4\"},\"children\":[{\"type\":\"search\",\"props\":{\"position\":\"relative\",\"position_left\":\"-20\",\"search_icon\":\"right\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Category\",\"content_de_de\":\"Kategorie\",\"margin_remove_bottom\":false,\"title_element\":\"h3\",\"title_style\":\"h5\"}},{\"type\":\"nav\",\"props\":{\"css\":\".el-item{font-size:16px;font-weight:bold}\\n.el-link{padding:3px 0}\",\"grid\":\"1\",\"image_vertical_align\":true,\"nav_style\":\"secondary\",\"show_image\":true,\"show_meta\":true},\"children\":[{\"type\":\"nav_item\",\"source\":{\"query\":{\"name\":\"categories.customCategories\",\"arguments\":{\"id\":60,\"offset\":0,\"limit\":100,\"order\":\"term_order\",\"order_direction\":\"ASC\"}},\"props\":{\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"name\"},\"link\":{\"filters\":{\"search\":\"\"},\"name\":\"link\"}}}}],\"name\":\"navcategeory sorted\"},{\"type\":\"headline\",\"props\":{\"content\":\"Latest Stories\",\"content_de_de\":\"Neueste Artikel\",\"margin_remove_bottom\":true,\"title_element\":\"h3\",\"title_style\":\"h5\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"css\":\".el-title{font-weight:500;font-size:16px;line-height:1.4}\\n.el-meta{margin-top:0px!important;color:#999}\\n.el-item{margin-bottom:10px!important}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_gap\":\"collapse\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_height\":\"214\",\"image_svg_color\":\"emphasis\",\"image_transition\":\"scale-up\",\"image_width\":\"329\",\"item_animation\":true,\"lightbox\":false,\"lightbox_bg_close\":true,\"link_style\":\"\",\"link_text\":\"\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_margin\":\"remove\",\"meta_style\":\"h6\",\"panel_image_no_padding\":true,\"panel_link\":true,\"panel_padding\":\"small\",\"parallax_easing\":\"1\",\"show_content\":false,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":false,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_color\":\"primary\",\"title_element\":\"div\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":true,\"title_margin\":\"remove\"},\"children\":[{\"type\":\"grid_item\",\"source\":{\"query\":{\"name\":\"posts.customPosts\",\"arguments\":{\"terms\":[],\"category_operator\":\"IN\",\"post_flag_operator\":\"IN\",\"post_tag_operator\":\"IN\",\"users\":[],\"users_operator\":\"IN\",\"offset\":0,\"limit\":3,\"order\":\"date\",\"order_direction\":\"DESC\"}},\"props\":{\"title\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"},\"image_alt\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"},\"link\":{\"filters\":{\"search\":\"\"},\"name\":\"link\"},\"meta\":{\"filters\":{\"search\":\"\",\"date\":\"\"},\"name\":\"date\"},\"tags\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"}}}}],\"name\":\"News Grid 10-23\"}]}]}],\"name\":\"Sym Post\"}],\"version\":\"4.5.32\",\"yooessentialsVersion\":\"2.2.9\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ist Ihre Organisation bereit f\u00fcr die NIS2-Richtlinie? Mit ihr wird sich die Cybersicherheit in ganz Europa ver\u00e4ndern und der Kreis der Unternehmen erweitern, der sich an die Vorgaben halten muss.<\/p>\n","protected":false},"author":14,"featured_media":147208,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[60,116],"tags":[132],"post_flags":[],"class_list":["post-147204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-symzone","category-technology","tag-technology"],"acf":[],"_links":{"self":[{"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/posts\/147204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/comments?post=147204"}],"version-history":[{"count":140,"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/posts\/147204\/revisions"}],"predecessor-version":[{"id":187052,"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/posts\/147204\/revisions\/187052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/media\/147208"}],"wp:attachment":[{"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/media?parent=147204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/categories?post=147204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/tags?post=147204"},{"taxonomy":"post_flag","embeddable":true,"href":"https:\/\/symmedia.de\/de\/wp-json\/wp\/v2\/post_flags?post=147204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}