{"id":31620,"date":"2026-01-07T09:23:03","date_gmt":"2026-01-07T08:23:03","guid":{"rendered":"https:\/\/www.proactivanet.com\/blog\/sin-categorizar\/nis2-ens-and-dora-the-regulatory-challenge-putting-cybersecurity-teams-to-the-test\/"},"modified":"2026-01-07T09:23:03","modified_gmt":"2026-01-07T08:23:03","slug":"nis2-ens-and-dora-the-regulatory-challenge-putting-cybersecurity-teams-to-the-test","status":"publish","type":"post","link":"https:\/\/www.proactivanet.com\/en\/blog\/proactivanet-en\/nis2-ens-and-dora-the-regulatory-challenge-putting-cybersecurity-teams-to-the-test\/","title":{"rendered":"NIS2, ENS and DORA: The regulatory challenge putting cybersecurity teams to the test"},"content":{"rendered":"<p data-path-to-node=\"6\">In today's digital threat landscape, cybersecurity is no longer the exclusive technical concern of IT departments, but has become a strategic pillar of corporate governance. The entry into force of the <a href=\"https:\/\/www.boe.es\/buscar\/doc.php?id=DOUE-L-2022-81963\" target=\"_blank\" rel=\"noopener\"><b data-path-to-node=\"6\" data-index-in-node=\"241\">NIS Directive2<\/b><\/a>Directive, together with consolidated frameworks such as the <a href=\"https:\/\/ens.ccn.cni.es\/es\/\" target=\"_blank\" rel=\"noopener\"><b data-path-to-node=\"6\" data-index-in-node=\"295\">ENS (National Security Scheme)<\/b> <\/a>and specific regulations such as <a href=\"https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en\" target=\"_blank\" rel=\"noopener\"><b data-path-to-node=\"6\" data-index-in-node=\"362\">DORA (Digital Operational Resilience Act)<\/b><\/a>has created a new legal scenario in the European Union. Today, digital resilience is not an option, but an obligation that scales up to the highest hierarchical level.  <\/p>\n<h3 data-path-to-node=\"7\">The end of managerial \"blindness<\/h3>\n<p data-path-to-node=\"8\">Historically, senior management tended to view cybersecurity as an operational expense or a \"necessary evil\" managed in technology silos. However, the new regulatory framework breaks this dynamic. With the advent of NIS2 and DORA, responsibility for information security and business continuity is elevated to Boards <b data-path-to-node=\"8\" data-index-in-node=\"336\">of Directors<\/b>.  <\/p>\n<p data-path-to-node=\"9\">Managers now have a legal obligation to approve, monitor and, most importantly, demonstrate compliance with security measures. The penalty regime and the personal liability of directors underline that cybersecurity is now a corporate compliance issue on a par with the prevention of money laundering or tax regulations. <\/p>\n<p data-path-to-node=\"9\"><img decoding=\"async\" class=\"alignnone wp-image-26162\" src=\"https:\/\/www.proactivanet.com\/wp-content\/uploads\/2025\/06\/Logo_ENS_DORA_NIS2_Proactivanet_AC.png\" alt=\"nis 2  \" width=\"496\" height=\"154\" srcset=\"https:\/\/www.proactivanet.com\/wp-content\/uploads\/2025\/06\/Logo_ENS_DORA_NIS2_Proactivanet_AC.png 2060w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2025\/06\/Logo_ENS_DORA_NIS2_Proactivanet_AC-300x93.png 300w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2025\/06\/Logo_ENS_DORA_NIS2_Proactivanet_AC-1024x318.png 1024w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2025\/06\/Logo_ENS_DORA_NIS2_Proactivanet_AC-768x239.png 768w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2025\/06\/Logo_ENS_DORA_NIS2_Proactivanet_AC-1536x477.png 1536w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2025\/06\/Logo_ENS_DORA_NIS2_Proactivanet_AC-2048x636.png 2048w, https:\/\/www.proactivanet.com\/wp-content\/uploads\/2025\/06\/Logo_ENS_DORA_NIS2_Proactivanet_AC-640x199.png 640w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/><\/p>\n<h3 data-path-to-node=\"10\">Why does NIS2 mark a turning point?<\/h3>\n<p data-path-to-node=\"11\">The NIS2 Directive is not simply an update of its predecessor; it is a paradigm shift. Its importance lies in the fact that it is no longer a matter of \"installing tools\" but a <b data-path-to-node=\"11\" data-index-in-node=\"204\">risk management challenge<\/b>. The regulation requires:  <\/p>\n<ol start=\"1\" data-path-to-node=\"12\">\n<li>\n<p data-path-to-node=\"12,0,0\"><b data-path-to-node=\"12,0,0\" data-index-in-node=\"0\">Auditable maturity level:<\/b> Antivirus is not enough; professionalized risk management is required.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"12,1,0\"><b data-path-to-node=\"12,1,0\" data-index-in-node=\"0\">Complete visibility:<\/b> Organizations must have a holistic view of their infrastructure, including the supply chain.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"12,2,0\"><b data-path-to-node=\"12,2,0\" data-index-in-node=\"0\">Traceable evidence:<\/b> In the event of an audit or incident, the company must demonstrate with historical data that controls were active and monitored.<\/p>\n<\/li>\n<\/ol>\n<h3 data-path-to-node=\"13\">The Challenges of Compliance: From Paper to Reality<\/h3>\n<p data-path-to-node=\"14\">Despite the clarity of the legal texts, many organizations find themselves in a state of analysis paralysis. Cybersecurity and compliance teams face three critical questions: <\/p>\n<ul data-path-to-node=\"15\">\n<li>\n<p data-path-to-node=\"15,0,0\"><b data-path-to-node=\"15,0,0\" data-index-in-node=\"0\">Which measures to implement first?<\/b>  Deploying controls can be overwhelming if not prioritized under a real risk analysis.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"15,1,0\"><b data-path-to-node=\"15,1,0\" data-index-in-node=\"0\">How to generate evidence without dying in the attempt?<\/b>  Many companies fail audits not because of a lack of security, but because of an inability to document it in a timely manner.<\/p>\n<\/li>\n<li>\n<p data-path-to-node=\"15,2,0\"><b data-path-to-node=\"15,2,0\" data-index-in-node=\"0\">How can we avoid technological over-access?<\/b>  There is a risk of acquiring expensive tools that do not meet regulatory requirements for visibility and process control.<\/p>\n<\/li>\n<\/ul>\n<h3 data-path-to-node=\"16\">A roadmap for resilience<\/h3>\n<p data-path-to-node=\"17\">To meet this challenge, improvisation must give way to method. It is not just a matter of complying with a checklist, but of building a sustainable security strategy over time. The integration of service management tools (ITSM) and cybersecurity tools is essential to automate the collection of evidence and ensure that every company asset is under control.  <\/p>\n<p data-path-to-node=\"18\">To help CIOs, CISOs and compliance officers navigate this complex environment, the <b data-path-to-node=\"18\" data-index-in-node=\"107\">Proactivanet<\/b> team has developed a critical resource. It is a <b data-path-to-node=\"18\" data-index-in-node=\"175\">free whitepaper<\/b> that synthesizes the regulatory complexity into a guide for immediate action. <\/p>\n<p data-path-to-node=\"19\">This whitepaper outlines the <b data-path-to-node=\"19\" data-index-in-node=\"33\">13 key actions<\/b> to consolidate an effective compliance strategy, enabling organizations to move from theoretical compliance to operational security. The whitepaper addresses everything from total inventory control to the automation of key controls, providing the clarity necessary for senior management to make informed decisions. <\/p>\n<p data-path-to-node=\"20\"><b data-path-to-node=\"20\" data-index-in-node=\"0\"><a class=\"ng-star-inserted\" href=\"https:\/\/www.proactivanet.com\/en\/whitepaper\/compliance\/?source=blog\" target=\"_blank\" rel=\"noopener\">Download here the whitepaper: 13 actions to comply with NIS2, ENS and DORA<\/a><\/b><\/p>\n<p data-path-to-node=\"21\">Regulatory compliance is a long-distance race. Starting today with a clear roadmap is the only guarantee to protect not only the systems, but also the reputation and legality of the organization. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today's digital threat landscape, cybersecurity is no longer the exclusive...  <\/p>\n<div class=\"read-more mt-4 text-blue text-xs\"><\/div>\n","protected":false},"author":7,"featured_media":31569,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1856,1848],"tags":[],"class_list":["post-31620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance-13-quick-steps-to-meet-the-most-demanding-security-frameworks","category-proactivanet-en"],"acf":{"is_icon":""},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/posts\/31620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/comments?post=31620"}],"version-history":[{"count":0,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/posts\/31620\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/media\/31569"}],"wp:attachment":[{"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/media?parent=31620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/categories?post=31620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proactivanet.com\/en\/wp-json\/wp\/v2\/tags?post=31620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}