{"id":4634,"date":"2023-03-03T14:26:29","date_gmt":"2023-03-03T14:26:29","guid":{"rendered":"https:\/\/locaterisk.com\/?p=4634"},"modified":"2025-08-08T07:26:37","modified_gmt":"2025-08-08T07:26:37","slug":"it-sicherheitsgesetz-2-0-und-nis2","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/it-sicherheitsgesetz-2-0-und-nis2\/","title":{"rendered":"IT Security Act 2.0 and NIS 2"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">IT Security Act 2.0 and NIS 2: Who Needs to Take Action and Where? <\/h1>\r\n            <p class=\"paragraph\">The IT Security Act 2.0 has been put into practice. The NIS 2 implementation is coming. And with it, expanded sectors, stricter regulations and new obligations. The aim of the directive: a high common level of protection in the European Union. Some of this is already part of the IT Security Act. Others are yet to be added. Find out what already applies today, what will come in the future and why your implementation status should be put to the test now. An overview.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"492\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft-1024x492.png\" alt=\"\" class=\"wp-image-4737\" style=\"width:943px;height:452px\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft-1024x492.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft-300x144.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft-768x369.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft-18x9.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">NIS 2 makes IT security a matter for the boss. The clock is ticking.<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">IT Security Act 2.0\/Part1 <\/h3>\n\n\n\n<p>Valid since December 2021. <strong>Application to KRITIS operators<\/strong>.<br><strong>TARGET<\/strong><br>Comprehensively secure availability, integrity, authenticity &amp; confidentiality of data. <br><br><strong>CHANGE <\/strong><br>Compared to the IT Security Act 1.0 from 2015, the Act primarily contains further developments regarding IT security precautions with the following most important innovations:<br><br><strong>SECTORS<\/strong><br>As in IT Security Act 1.0.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nutrition<\/li>\n\n\n\n<li>Health<\/li>\n\n\n\n<li>Energy (electricity &amp; gas)<\/li>\n\n\n\n<li>Water &amp; waste water<\/li>\n\n\n\n<li>Finance &amp; Insurance<br>+ NEW<\/li>\n\n\n\n<li>Municipal waste disposal &amp; municipal services<\/li>\n\n\n\n<li>UBI operator (public interest entity) IT-SIG2.0\/Part 2<\/li>\n<\/ul>\n\n\n\n<p>N<strong>EW REPORTING AND AUDIT OBLIGATIONS<\/strong><br>The 2-year implementation period from the IT Security Act 1.0 no longer applies. Instead, the deadlines apply from day 1 of the corresponding company classification. The deadline also applies if your company suddenly exceeds thresholds and becomes a UBI or KRITIS during the term of the law.<strong> For KRITIS<\/strong>-operators applies:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Registration obligation of the KRITIS facilities with indication of the contact persons<\/li>\n\n\n\n<li>Reporting of facts concerning the correctness of the information to the BSI<\/li>\n\n\n\n<li>Reporting information on incident management and other safety precautions<\/li>\n\n\n\n<li>The use of critical components must be indicated<\/li>\n\n\n\n<li>Manufacturer's warranty declarations must be handed over for critical new and existing components (concerns manufacturers + suppliers of the entire supply chain)<\/li>\n\n\n\n<li>For new launches, 2 - 4 months waiting period before installation applies<\/li>\n\n\n\n<li>Minimum security standards must be met (e.g. attack detection systems)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">IT Security Act 2.0\/Part 2<\/h3>\n\n\n\n<p>Valid from May 2023. <strong>Application to UBI operators<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>UBI1: Companies that fall under the Foreign Trade and Payments Ordinance, e.g. manufacturers of armaments or IT products for classified government information.<\/li>\n\n\n\n<li>UBI2: Companies that are among the largest companies in Germany in terms of domestic value added, e.g. Dax corporations (further in BSI KRITIS Regulation 2.0)<\/li>\n\n\n\n<li>UBI3: Operator of an operating area in the upper class of the Hazardous Incident Ordinance (for example companies in the chemical industry, ...)<\/li>\n\n\n\n<li>Companies &lt; 50 persons, &lt; 10 Mio \u20ac turnover are not affected<\/li>\n<\/ul>\n\n\n\n<p>N<strong>EW REPORTING AND AUDIT OBLIGATIONS<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Registration obligation at the BSI with indication of contact persons<\/li>\n\n\n\n<li>Issuance of self-declarations (e.g. on certifications, safeguarding of processes in IT security (systems, components, ...)<\/li>\n\n\n\n<li>Once initial, then every two years<\/li>\n\n\n\n<li>Reporting of significant disturbances is mandatory<\/li>\n\n\n\n<li>But: No reporting obligation with regard to critical components<\/li>\n<\/ul>\n\n\n\n<p><strong>ADJUSTED FINE FRAMEWORK<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A fine of up to two million euros is possible. For example, in the case of KRITIS: No accessibility of the contact point. At UBI: Self-declaration not submitted<\/li>\n\n\n\n<li>Fine also against traders<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><br>EU Directive NIS 2 <\/h3>\n\n\n\n<p>In force since January 16, 2023. To be implemented in national law by the member states by 2024. <br>Background: The new European directive is based on the NIS 1 directive from 2016, whose scope and security requirements no longer reflected actual developments. In addition, there was insufficient harmonization among member states regarding the categorization of cybersecurity incidents, reporting requirements and sanctions.<\/p>\n\n\n\n<p><strong>TARGET<\/strong><br>A high common level of protection in the European Union.<br><br><strong>CHANGE <\/strong><br>NIS 2 restricts the member states' scope for action and specifies how the directive is to be implemented in national law. Germany already meets a large part of the requirements with its IT Security Act 2.0. The extent to which the new requirements will be anchored in it or whether there will be an IT Security Act 3.0 is not clear yet. In addition to the expansion of sectors and obligations, the main changes are the personal liability of managing directors and the amount of possible fines for non-compliance. National authorities will be responsible for monitoring and enforcing the regulations.<br><br><strong>SECTORS<\/strong><br><strong>Expansion of defined CRITIS sectors\/essentials:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nutrition<\/li>\n\n\n\n<li>Health<\/li>\n\n\n\n<li>Energy (electricity &amp; gas)&nbsp;<\/li>\n\n\n\n<li>Water &amp; waste water&nbsp;<\/li>\n\n\n\n<li>Finance &amp; Insurance\n<ul class=\"wp-block-list\">\n<li>+<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Transport &amp; Traffic<\/li>\n\n\n\n<li>Digital infrastructure<br><br><strong>Plus NEW sectors\/important:<\/strong><\/li>\n\n\n\n<li>ICT Service Management (in B2B)<\/li>\n\n\n\n<li>Public administration (hydrogen district heating\/municipal utilities &amp; energy suppliers)<\/li>\n\n\n\n<li>Postal &amp; courier services<\/li>\n\n\n\n<li>Waste Management<\/li>\n\n\n\n<li>Chemistry<\/li>\n\n\n\n<li>Industry\/manufacturing<\/li>\n\n\n\n<li>Pharmacy<\/li>\n\n\n\n<li>Oil<\/li>\n\n\n\n<li>Aerospace<\/li>\n\n\n\n<li>Research&nbsp;<\/li>\n\n\n\n<li>Digital services (search engines, social networks)<\/li>\n<\/ul>\n\n\n\n<p>N<strong>EW REPORTING AND AUDIT OBLIGATIONS<\/strong><br><strong>Minimum requirements for contractors and operators<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analysis and assessment of IT security risks<\/li>\n\n\n\n<li>Establish an IT incident management system that includes: Prevention, detection of security incidents, identification, containment, mitigation and response.<\/li>\n\n\n\n<li>Ensuring business continuity<\/li>\n\n\n\n<li>Establishment of a crisis management<\/li>\n\n\n\n<li>Ensuring security in the procurement, development and maintenance of networks and information systems<\/li>\n\n\n\n<li>Ensure controls of safety requirements also of suppliers in the supply chain<\/li>\n\n\n\n<li>Initial report: reporting of significant incidents mandatory within 24 hours, final report within one month<\/li>\n<\/ul>\n\n\n\n<p><strong>EXTENSION OF THE RANGE OF FINES<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Own, personal liability for managers<\/li>\n\n\n\n<li>Fines attract up to \u20ac10 million or two percent of annual worldwide turnover<\/li>\n\n\n\n<li>Exceptions for small and micro enterprises, e.g., in the case of monopolies or when public communications networks are affected.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>By October 2024, Germany must implement <a href=\"https:\/\/locaterisk.com\/en\/eu-richtlinie-nis2-tritt-in-kraft\/\">NIS 2 EU Directive<\/a> into national law. This means that waiting is not an option. The threat level is higher than ever and the challenges in the cyber space will continue to increase rapidly. We recommend that all organizations put their own IT security implementation status to the test and see where work needs to be done. <a href=\"https:\/\/locaterisk.com\/en\/landing\/it-risikoanalyse\/\">IT Risk Analyses<\/a> and monitoring of your organization-wide IT attack surface provide the necessary transparency and are ideal preparation for upcoming inspections and certifications. In addition, an intelligent <a href=\"https:\/\/locaterisk.com\/en\/landing\/geschaftspartner-risikomanagement\/\">Supplier Risk Management<\/a> spares many manual processes and makes administration significantly more efficient.<\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"it-sicherheitsgesetz-2-0-und-nis2\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Learn what's already in place today, what's coming in the future, and why your implementation status needs to be put to the test now. <\/p>","protected":false},"author":8,"featured_media":4737,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[36,43,42,37],"class_list":["post-4634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-eu-richtlinie","tag-it-sicherheitsgesetz-2-0","tag-it-sig-2-0","tag-nis2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Sicherheitsgesetz 2.0 und NIS 2 - LocateRisk<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, was heute schon gilt, was zuk\u00fcnftig kommt und warum Ihr Umsetzungsstatus jetzt auf den Pr\u00fcfstand geh\u00f6rt. Eine \u00dcbersicht.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/it-sicherheitsgesetz-2-0-und-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Sicherheitsgesetz 2.0 und NIS 2 - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, was heute schon gilt, was zuk\u00fcnftig kommt und warum Ihr Umsetzungsstatus jetzt auf den Pr\u00fcfstand geh\u00f6rt. Eine \u00dcbersicht.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/it-sicherheitsgesetz-2-0-und-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-03T14:26:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:26:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"IT-Sicherheitsgesetz 2.0 und NIS 2\",\"datePublished\":\"2023-03-03T14:26:29+00:00\",\"dateModified\":\"2025-08-08T07:26:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/\"},\"wordCount\":978,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png\",\"keywords\":[\"EU-Richtlinie\",\"IT-Sicherheitsgesetz 2.0\",\"IT-SiG 2.0\",\"NIS2\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/\",\"name\":\"IT-Sicherheitsgesetz 2.0 und NIS 2 - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png\",\"datePublished\":\"2023-03-03T14:26:29+00:00\",\"dateModified\":\"2025-08-08T07:26:37+00:00\",\"description\":\"Erfahren Sie, was heute schon gilt, was zuk\u00fcnftig kommt und warum Ihr Umsetzungsstatus jetzt auf den Pr\u00fcfstand geh\u00f6rt. Eine \u00dcbersicht.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png\",\"width\":1200,\"height\":576,\"caption\":\"IT-Sicherheitsgesetz 2.0 und NIS2 \u2013 Die Zeit la\u0308uft\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheitsgesetz-2-0-und-nis2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Sicherheitsgesetz 2.0 und NIS 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security Act 2.0 and NIS 2 - LocateRisk","description":"Find out what already applies today, what is coming in the future and why your implementation status should be put to the test now. An overview.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/it-sicherheitsgesetz-2-0-und-nis2\/","og_locale":"en_US","og_type":"article","og_title":"IT-Sicherheitsgesetz 2.0 und NIS 2 - LocateRisk","og_description":"Erfahren Sie, was heute schon gilt, was zuk\u00fcnftig kommt und warum Ihr Umsetzungsstatus jetzt auf den Pr\u00fcfstand geh\u00f6rt. Eine \u00dcbersicht.","og_url":"https:\/\/locaterisk.com\/en\/it-sicherheitsgesetz-2-0-und-nis2\/","og_site_name":"LocateRisk","article_published_time":"2023-03-03T14:26:29+00:00","article_modified_time":"2025-08-08T07:26:37+00:00","og_image":[{"width":1200,"height":576,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"IT-Sicherheitsgesetz 2.0 und NIS 2","datePublished":"2023-03-03T14:26:29+00:00","dateModified":"2025-08-08T07:26:37+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/"},"wordCount":978,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png","keywords":["EU-Richtlinie","IT-Sicherheitsgesetz 2.0","IT-SiG 2.0","NIS2"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/","url":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/","name":"IT Security Act 2.0 and NIS 2 - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png","datePublished":"2023-03-03T14:26:29+00:00","dateModified":"2025-08-08T07:26:37+00:00","description":"Find out what already applies today, what is coming in the future and why your implementation status should be put to the test now. An overview.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/03\/IT-Sicherheitsgesetz-2.0-und-NIS2-\u2013-Die-Zeit-laeuft.png","width":1200,"height":576,"caption":"IT-Sicherheitsgesetz 2.0 und NIS2 \u2013 Die Zeit la\u0308uft"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/it-sicherheitsgesetz-2-0-und-nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"IT-Sicherheitsgesetz 2.0 und NIS 2"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=4634"}],"version-history":[{"count":99,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4634\/revisions"}],"predecessor-version":[{"id":6305,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4634\/revisions\/6305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/4737"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=4634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=4634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=4634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}