{"id":76852,"date":"2026-03-23T17:27:41","date_gmt":"2026-03-23T16:27:41","guid":{"rendered":"https:\/\/www.teldat.com\/?post_type=glossary&#038;p=76852"},"modified":"2026-03-23T17:27:49","modified_gmt":"2026-03-23T16:27:49","slug":"que-es-la-directiva-nis2-articulos-obligaciones-sanciones","status":"publish","type":"glossary","link":"https:\/\/www.teldat.com\/es\/glossary\/que-es-la-directiva-nis2-articulos-obligaciones-sanciones\/","title":{"rendered":"\u00bfQu\u00e9 es la directiva NIS2?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbCSS Global\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_code admin_label=\u00bbCSS + Schema\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<style>@import url('https:\/\/fonts.googleapis.com\/css2?family=Roboto:wght@400;600;700;800&display=swap');#btn-md span{color:#f1f6f6!important}.et-db #et-boc .et-l .et_pb_section{padding:0!important}body{font-family:'Roboto',-apple-system,BlinkMacSystemFont,sans-serif;color:#1a1625;line-height:1.75}<\/style>\n<p><script type=\"application\/ld+json\">{\"@context\": \"https:\/\/schema.org\", \"@graph\": [{\"@type\": \"Article\", \"headline\": \"\u00bfQu\u00e9 es la Directiva NIS2? Requisitos de ciberseguridad, sectores afectados y sanciones\", \"description\": \"Gu\u00eda completa de la Directiva NIS2: 10 requisitos obligatorios, sectores afectados, sanciones, notificaci\u00f3n de incidentes y soluciones Teldat.\", \"author\": {\"@type\": \"Organization\", \"name\": \"Teldat\", \"url\": \"https:\/\/www.teldat.com\"}, \"publisher\": {\"@type\": \"Organization\", \"name\": \"Teldat\", \"url\": \"https:\/\/www.teldat.com\"}, \"datePublished\": \"2026-03-23\", \"dateModified\": \"2026-03-23\", \"mainEntityOfPage\": \"https:\/\/www.teldat.com\/es\/glosario\/directiva-nis2\/\", \"inLanguage\": \"es\"}, {\"@type\": \"DefinedTerm\", \"name\": \"Directiva NIS2\", \"description\": \"La Directiva NIS2 (Directiva (UE) 2022\/2555) es la normativa actualizada de ciberseguridad de la UE. Establece requisitos armonizados, notificaci\u00f3n de incidentes y medidas de ejecuci\u00f3n para 18 sectores cr\u00edticos. Afecta a m\u00e1s de 100.000 organizaciones. Sanciones hasta 10 M\u20ac o 2% facturaci\u00f3n global.\", \"inDefinedTermSet\": {\"@type\": \"DefinedTermSet\", \"name\": \"Ciberglosario Teldat\", \"url\": \"https:\/\/www.teldat.com\/es\/glosario\/\"}}, {\"@type\": \"BreadcrumbList\", \"itemListElement\": [{\"@type\": \"ListItem\", \"position\": 1, \"name\": \"Teldat\", \"item\": \"https:\/\/www.teldat.com\/es\/\"}, {\"@type\": \"ListItem\", \"position\": 2, \"name\": \"Ciberglosario\", \"item\": \"https:\/\/www.teldat.com\/es\/glosario\/\"}, {\"@type\": \"ListItem\", \"position\": 3, \"name\": \"Cumplimiento\", \"item\": \"https:\/\/www.teldat.com\/es\/glosario\/ciberseguridad\/\"}, {\"@type\": \"ListItem\", \"position\": 4, \"name\": \"Directiva NIS2\", \"item\": \"https:\/\/www.teldat.com\/es\/glosario\/directiva-nis2\/\"}]}, {\"@type\": \"FAQPage\", \"mainEntity\": [{\"@type\": \"Question\", \"name\": \"\u00bfQu\u00e9 es la Directiva NIS2?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"Normativa de ciberseguridad de la UE (Directiva (UE) 2022\/2555) que exige a entidades esenciales e importantes de 18 sectores implementar gesti\u00f3n de riesgos, notificar incidentes y asegurar la cadena de suministro. Afecta a m\u00e1s de 100.000 organizaciones.\"}}, {\"@type\": \"Question\", \"name\": \"\u00bfQui\u00e9n debe cumplir con NIS2?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"Organizaciones con 50+ empleados o 10 M\u20ac+ de facturaci\u00f3n en 18 sectores. Entidades esenciales (energ\u00eda, transporte, sanidad, banca, infraestructura digital) con supervisi\u00f3n proactiva. Entidades importantes (correos, residuos, qu\u00edmica, alimentaci\u00f3n, fabricaci\u00f3n) con supervisi\u00f3n reactiva.\"}}, {\"@type\": \"Question\", \"name\": \"\u00bfCu\u00e1les son las 10 medidas m\u00ednimas?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"Art\u00edculo 21: (1) an\u00e1lisis de riesgos, (2) gesti\u00f3n de incidentes, (3) continuidad de negocio, (4) cadena de suministro, (5) desarrollo seguro, (6) evaluaci\u00f3n de eficacia, (7) ciberhigiene\/formaci\u00f3n, (8) criptograf\u00eda, (9) control de acceso\/activos, (10) MFA\/comunicaciones seguras.\"}}, {\"@type\": \"Question\", \"name\": \"\u00bfCu\u00e1les son las sanciones?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"Esenciales: hasta 10 M\u20ac o 2% facturaci\u00f3n global. Importantes: hasta 7 M\u20ac o 1,4%. Alta direcci\u00f3n personalmente responsable. Formaci\u00f3n obligatoria. Posibles inhabilitaciones.\"}}, {\"@type\": \"Question\", \"name\": \"\u00bfNIS1 vs NIS2?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"NIS2: 18 sectores (vs 7), regla autom\u00e1tica de tama\u00f1o, sanciones armonizadas, notificaci\u00f3n 24h\/72h\/1 mes, responsabilidad ejecutiva, seguridad cadena de suministro.\"}}, {\"@type\": \"Question\", \"name\": \"\u00bfPlazos de notificaci\u00f3n?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"24h alerta temprana. 72h notificaci\u00f3n detallada con IoCs. A petici\u00f3n: informes intermedios. 1 mes: informe final con causa ra\u00edz y mitigaci\u00f3n.\"}}]}]}<\/script>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbHero\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bbHero\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-61px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div style=\"padding: 60px 24px 48px;\">\n<p><span style=\"display: inline-flex; align-items: center; gap: 8px; padding: 6px 16px; background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 100px; font-size: 0.78rem; font-weight: 600; color: #32244a; letter-spacing: 0.05em; text-transform: uppercase; margin-bottom: 24px;\">\u25cf Glosario de ciberseguridad<\/span><\/p>\n<h1 style=\"font-size: clamp(2rem,5vw,3.2rem); font-weight: 800; line-height: 1.15; letter-spacing: -0.03em; color: #32244a; margin-bottom: 24px; max-width: 900px; margin-left: auto; margin-right: auto;\">\u00bfQu\u00e9 es la <span style=\"background: linear-gradient(135deg,#32244a,#4a3570); -webkit-background-clip: text; -webkit-text-fill-color: transparent; background-clip: text;\">Directiva NIS2?<\/span><\/h1>\n<p style=\"font-size: 1.15rem; line-height: 1.8; color: #4a3f5c; max-width: 900px; margin-left: auto; margin-right: auto;\"><strong><span style=\"color: #bea1ff;\"><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/blog\/directivas-ciberseguridad-nis-2-2024\/\" target=\"_blank\" rel=\"noopener\">La Directiva NIS2 (Directiva (UE) 2022\/2555)<\/a><\/span><\/strong> es la normativa actualizada de ciberseguridad de la Uni\u00f3n Europea que establece <strong style=\"color: #1a1625; font-weight: 600;\">requisitos de seguridad armonizados, notificaci\u00f3n obligatoria de incidentes y medidas de ejecuci\u00f3n<\/strong> para entidades esenciales e importantes en <strong style=\"color: #1a1625; font-weight: 600;\">18 sectores cr\u00edticos.<\/strong> Sustituy\u00f3 a la Directiva NIS original el 18 de octubre de 2024, ampliando el alcance a m\u00e1s de <strong style=\"color: #1a1625; font-weight: 600;\">100.000 organizaciones<\/strong> con sanciones de hasta <strong style=\"color: #1a1625; font-weight: 600;\">10 millones de euros o el 2% de la facturaci\u00f3n global.<\/strong> Esta gu\u00eda cubre requisitos, sectores afectados, sanciones y c\u00f3mo las <strong style=\"color: #1a1625; font-weight: 600;\">soluciones de ciberseguridad de Teldat<\/strong> facilitan el cumplimiento.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbTOC\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bbTOC\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-10px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div style=\"max-width: 900px; margin: 0 auto 48px; padding: 0 24px;\">\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(280px, 1fr)); gap: 12px 20px;\"><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#definicion\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">1<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Definici\u00f3n y contexto<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#nis1-vs-nis2\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">2<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">NIS1 vs NIS2<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#quien-debe-cumplir\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">3<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Qui\u00e9n debe cumplir<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#sectores\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">4<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Sectores afectados<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#requisitos\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">5<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">10 medidas m\u00ednimas<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#notificacion\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">6<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Notificaci\u00f3n de incidentes<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#sanciones\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">7<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Sanciones<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#teldat-cumplimiento\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">8<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Soluciones Teldat &#8211; FAQ&#8217;s<\/span><\/a><\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecciones 01-02&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb01 Definici\u00f3n\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-40px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"definicion\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Definici\u00f3n y contexto<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><span style=\"color: #bea1ff;\"><strong>La Directiva NIS2<\/strong><\/span> es la normativa integral de ciberseguridad de la Uni\u00f3n Europea dise\u00f1ada para alcanzar un <strong style=\"color: #1a1625; font-weight: 600;\">nivel com\u00fan elevado de ciberseguridad<\/strong> en todos los estados miembros. Publicada como Directiva (UE) 2022\/2555 en diciembre de 2022, sustituy\u00f3 a la Directiva NIS1 de 2016.<\/p>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">NIS2 exige a las organizaciones medianas y grandes en sectores cr\u00edticos implementar <strong style=\"color: #1a1625; font-weight: 600;\">medidas t\u00e9cnicas, operativas y organizativas adecuadas<\/strong> para gestionar los riesgos de ciberseguridad. Establece requisitos uniformes de gesti\u00f3n de riesgos, notificaci\u00f3n de incidentes, seguridad de la cadena de suministro y responsabilidad de gobernanza en toda la UE.<\/p>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><strong style=\"color: #1a1625; font-weight: 600;\">Dato clave:<\/strong> <strong><span style=\"color: #bea1ff;\"><a style=\"color: #bea1ff;\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"_blank\" rel=\"noopener\">NIS2 afecta a m\u00e1s de 100.000 organizaciones en la UE.<\/a><\/span><\/strong> Los estados miembros deb\u00edan transponer NIS2 antes del <strong style=\"color: #1a1625; font-weight: 600;\">17 de octubre de 2024.<\/strong> Solo cuatro pa\u00edses (B\u00e9lgica, Croacia, Hungr\u00eda e Italia) cumplieron. La Comisi\u00f3n Europea abri\u00f3 procedimientos de infracci\u00f3n contra 23 estados miembros en noviembre de 2024.<\/p>\n<\/div>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">La directiva forma parte de una estrategia m\u00e1s amplia que incluye el <strong><span style=\"color: #bea1ff;\"><a style=\"color: #bea1ff;\" href=\"https:\/\/digital-strategy.ec.europa.eu\/es\/policies\/cyber-resilience-act\" target=\"_blank\" rel=\"noopener\">Reglamento de Ciberresiliencia (CRA),<\/a><\/span><\/strong> el <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en?prefLang=es\" target=\"_blank\" rel=\"noopener\">Reglamento DORA<\/a><\/strong><\/span> para el sector financiero y la <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/es\/ip_23_3992\" target=\"_blank\" rel=\"noopener\">Directiva CER.<\/a><\/strong><\/span> Juntos protegen la infraestructura cr\u00edtica, los servicios digitales y las cadenas de suministro de la UE.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=\u00bb02 NIS1 vs NIS2&#8243; _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-100px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"nis1-vs-nis2\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">NIS1 vs NIS2: diferencias clave<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">La Directiva NIS original sufr\u00eda de <strong style=\"color: #1a1625; font-weight: 600;\">implementaci\u00f3n inconsistente, alcance reducido y aplicaci\u00f3n d\u00e9bil.<\/strong> NIS2 aborda estas deficiencias:<\/p>\n<div style=\"overflow-x: auto; margin: 28px 0;\">\n<table style=\"width: 100%; border-collapse: collapse; font-size: 0.9rem; font-family: Roboto, sans-serif;\">\n<thead style=\"background: #f3f0fa;\">\n<tr>\n<th style=\"padding: 16px 12px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">Aspecto<\/th>\n<th style=\"padding: 16px 12px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">NIS1 (2016)<\/th>\n<th style=\"padding: 16px 12px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">NIS2 (2024)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Alcance<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">7 sectores; estados miembros eleg\u00edan entidades<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">18 sectores; regla autom\u00e1tica de tama\u00f1o (50+ empleados o 10 M\u20ac+)<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Clasificaci\u00f3n<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Operadores de Servicios Esenciales y Proveedores Digitales<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Entidades esenciales e importantes con supervisi\u00f3n diferenciada<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Sanciones<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Variables; sin multas armonizadas<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Hasta 10 M\u20ac \/ 2% (esenciales); 7 M\u20ac \/ 1,4% (importantes)<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Responsabilidad directiva<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">No definida<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Alta direcci\u00f3n personalmente responsable; formaci\u00f3n obligatoria<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Notificaci\u00f3n de incidentes<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Sin plazos estrictos<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">24h alerta temprana, 72h notificaci\u00f3n, 1 mes informe final<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Cadena de suministro<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">No contemplada<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Evaluaciones de riesgo obligatorias<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Aplicaci\u00f3n<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Poderes limitados<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Supervisi\u00f3n proactiva (esenciales); reactiva (importantes)<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Cooperaci\u00f3n<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Marco b\u00e1sico<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">EU-CyCLONe para crisis transfronterizas<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecciones 03-04&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb03 Qui\u00e9n debe cumplir\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-97px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"quien-debe-cumplir\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">\u00bfQui\u00e9n debe cumplir con NIS2?<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">NIS2 introduce una <strong style=\"color: #1a1625; font-weight: 600;\">regla de tama\u00f1o<\/strong> autom\u00e1tica. Cualquier organizaci\u00f3n con <strong style=\"color: #1a1625; font-weight: 600;\">50+ empleados o 10 M\u20ac+ de facturaci\u00f3n<\/strong> en un sector cubierto queda incluida.<\/p>\n<div style=\"margin: 28px 0; display: flex; flex-direction: column; gap: 8px;\">\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">E<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Entidades esenciales (Anexo I supervisi\u00f3n proactiva)<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Grandes organizaciones (250+ empleados o 50 M\u20ac+) en: energ\u00eda, transporte, banca, sanidad, agua potable, aguas residuales, infraestructura digital, gesti\u00f3n TIC, administraci\u00f3n p\u00fablica y espacio. Tambi\u00e9n proveedores de confianza cualificados, registros TLD y proveedores DNS sin l\u00edmite de tama\u00f1o.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">I<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Entidades importantes (Anexo II supervisi\u00f3n reactiva)<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Organizaciones medianas y grandes en: servicios postales, gesti\u00f3n de residuos, fabricaci\u00f3n qu\u00edmica, alimentaci\u00f3n, fabricaci\u00f3n de productos cr\u00edticos (dispositivos m\u00e9dicos, electr\u00f3nica, veh\u00edculos, maquinaria), proveedores digitales e investigaci\u00f3n.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><strong style=\"color: #1a1625; font-weight: 600;\">Complejidad transfronteriza:<\/strong> en enero de 2026, la Comisi\u00f3n propuso simplificar el cumplimiento para <strong style=\"color: #1a1625; font-weight: 600;\">28.700 organizaciones, incluidas m\u00e1s de 6.200 pymes.<\/strong><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=\u00bb04 Sectores\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-116px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"sectores\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Sectores afectados por NIS2<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">NIS2 ampl\u00eda de <strong style=\"color: #1a1625; font-weight: 600;\">7 a 18 sectores:<\/strong><\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">Sectores de alta criticidad (Anexo I)<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><strong style=\"color: #1a1625; font-weight: 600;\">Energ\u00eda<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Transporte<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Banca<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Sanidad<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Agua potable<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Aguas residuales<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Infraestructura digital<\/strong> (DNS, TLD, cloud, data centers, CDN, servicios de confianza) \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Gesti\u00f3n de servicios TIC<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Administraci\u00f3n p\u00fablica<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Espacio<\/strong><\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">Otros sectores cr\u00edticos (Anexo II)<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><strong style=\"color: #1a1625; font-weight: 600;\">Servicios postales<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Residuos<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Qu\u00edmica<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Alimentaci\u00f3n<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Fabricaci\u00f3n<\/strong> de productos cr\u00edticos \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Proveedores digitales<\/strong> \u00b7 <strong style=\"color: #1a1625; font-weight: 600;\">Investigaci\u00f3n<\/strong><\/p>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><strong style=\"color: #1a1625; font-weight: 600;\">Nota banca:<\/strong> banca y mercados financieros est\u00e1n cubiertos por NIS2 pero tambi\u00e9n por <strong style=\"color: #1a1625; font-weight: 600;\">DORA,<\/strong> que prevalece como regulaci\u00f3n sectorial espec\u00edfica.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecciones 05-06&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb05 Requisitos\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-76px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"requisitos\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Requisitos de NIS2: las 10 medidas m\u00ednimas (Art\u00edculo 21)<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">El <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.nis-2-directive.com\/NIS_2_Directive_Article_21.html\" target=\"_blank\" rel=\"noopener\">Art\u00edculo 21<\/a><\/strong><\/span> define <strong style=\"color: #1a1625; font-weight: 600;\">diez medidas m\u00ednimas<\/strong> que son <strong style=\"color: #1a1625; font-weight: 600;\">tecnol\u00f3gicamente neutras y orientadas a resultados:<\/strong><\/p>\n<div style=\"margin: 28px 0; display: flex; flex-direction: column; gap: 8px;\">\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">1<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Pol\u00edticas de an\u00e1lisis de riesgos y seguridad de sistemas<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Marcos de gobernanza, evaluaciones de riesgos peri\u00f3dicas con enfoque multirriesgo, pol\u00edticas de seguridad de redes y sistemas.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">2<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Gesti\u00f3n de incidentes<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Procesos de detecci\u00f3n, gesti\u00f3n y respuesta. Procedimientos de escalado, protocolos de comunicaci\u00f3n, coordinaci\u00f3n con CSIRT.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">3<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Continuidad de negocio y gesti\u00f3n de crisis<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Copias de seguridad, recuperaci\u00f3n ante desastres, gesti\u00f3n de crisis. Objetivos RTO y RPO probados.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">4<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Seguridad de la cadena de suministro<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Evaluar ciberseguridad de proveedores, incluir requisitos en contratos, evaluaciones coordinadas (Art\u00edculo 22).<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">5<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Seguridad en adquisici\u00f3n, desarrollo y mantenimiento de sistemas<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Desarrollo seguro (SDLC), gesti\u00f3n de vulnerabilidades, divulgaci\u00f3n coordinada.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">6<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Evaluaci\u00f3n de la eficacia<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Auditor\u00edas de seguridad, pruebas de penetraci\u00f3n y evaluaciones de vulnerabilidades peri\u00f3dicas.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">7<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Ciberhigiene y formaci\u00f3n en ciberseguridad<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Concienciaci\u00f3n para todos los empleados. Formaci\u00f3n por roles. Formaci\u00f3n obligatoria para alta direcci\u00f3n (Art\u00edculo 20).<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">8<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Pol\u00edticas de criptograf\u00eda y cifrado<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Cifrado de datos en reposo y en tr\u00e1nsito. Controles criptogr\u00e1ficos ajustados a la sensibilidad de los datos.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">9<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Seguridad RRHH, control de acceso y gesti\u00f3n de activos<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">Inventarios de activos, privilegios m\u00ednimos, seguridad en todo el ciclo del empleado.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">10<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Autenticaci\u00f3n multifactor y comunicaciones seguras<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">MFA o autenticaci\u00f3n continua. Comunicaciones seguras de voz, v\u00eddeo y texto, incluidos sistemas de emergencia.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><strong style=\"color: #1a1625; font-weight: 600;\">Principio de proporcionalidad:<\/strong> los controles deben ajustarse a la <strong style=\"color: #1a1625; font-weight: 600;\">exposici\u00f3n al riesgo, tama\u00f1o e impacto socioecon\u00f3mico.<\/strong> Las organizaciones con ISO 27001 cubren gran parte, pero suelen existir deficiencias en cadena de suministro, responsabilidad directiva, plazos de notificaci\u00f3n y MFA.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=\u00bb06 Notificaci\u00f3n\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-109px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"notificacion\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Obligaciones de notificaci\u00f3n de incidentes (Art\u00edculo 23)<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">El <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.nis-2-directive.com\/NIS_2_Directive_Article_23.html\" target=\"_blank\" rel=\"noopener\">Art\u00edculo 23<\/a><\/strong><\/span> establece un <strong style=\"color: #1a1625; font-weight: 600;\">marco de notificaci\u00f3n multifase<\/strong> para incidentes significativos:<\/p>\n<div style=\"margin: 28px 0; display: flex; flex-direction: column; gap: 8px;\">\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">24h<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Alerta temprana<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">En 24 horas, notificaci\u00f3n inicial al CSIRT. Indicar si es il\u00edcito\/malintencionado y si tiene impacto transfronterizo.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">72h<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Notificaci\u00f3n del incidente<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">En 72 horas, informe detallado con evaluaci\u00f3n de gravedad, impacto e indicadores de compromiso (IoC).<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">\u2192<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Informe intermedio<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">A petici\u00f3n, actualizaciones adicionales durante el incidente en curso.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">1M<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Informe final<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d; margin-top: 2px;\">En 1 mes: descripci\u00f3n, gravedad, causa ra\u00edz, medidas de mitigaci\u00f3n e impactos transfronterizos.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">NIS2 fomenta la <strong style=\"color: #1a1625; font-weight: 600;\">notificaci\u00f3n voluntaria<\/strong> de cuasi-incidentes y amenazas para la inteligencia colectiva de la UE a trav\u00e9s de EU-CyCLONe.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecci\u00f3n 07&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb07 Sanciones\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-86px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"sanciones\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Sanciones y cumplimiento<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">NIS2 introduce <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/nis2directive.eu\/nis2-fines\/\" target=\"_blank\" rel=\"noopener\">sanciones armonizadas<\/a><\/strong><\/span><strong style=\"color: #1a1625; font-weight: 600;\"> comparables al RGPD:<\/strong><\/p>\n<div style=\"overflow-x: auto; margin: 28px 0;\">\n<table style=\"width: 100%; border-collapse: collapse; font-size: 0.9rem; font-family: Roboto, sans-serif;\">\n<thead style=\"background: #f3f0fa;\">\n<tr>\n<th style=\"padding: 16px 12px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">Categor\u00eda<\/th>\n<th style=\"padding: 16px 12px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">Entidades esenciales<\/th>\n<th style=\"padding: 16px 12px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">Entidades importantes<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Multa m\u00e1xima<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">10 M\u20ac o 2% facturaci\u00f3n global anual<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">7 M\u20ac o 1,4% facturaci\u00f3n global anual<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Supervisi\u00f3n<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Proactiva: auditor\u00edas, inspecciones y escaneos<\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Reactiva: tras evidencia de incumplimiento<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Responsabilidad directiva<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\" colspan=\"2\">Alta direcci\u00f3n debe aprobar y supervisar medidas (Art\u00edculo 20). Personalmente responsable. Formaci\u00f3n obligatoria. Posibles inhabilitaciones.<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Poderes de ejecuci\u00f3n<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\" colspan=\"2\">Instrucciones vinculantes, medidas correctivas, divulgaci\u00f3n p\u00fablica obligatoria, auditor\u00edas ordenadas por reguladores.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><strong style=\"color: #1a1625; font-weight: 600;\">Solapamiento RGPD:<\/strong> un incidente NIS2 puede ser tambi\u00e9n brecha RGPD. NIS2 no impondr\u00e1 multa adicional por el mismo incidente, pero puede imponer <strong style=\"color: #1a1625; font-weight: 600;\">otras sanciones no financieras.<\/strong><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecci\u00f3n 08&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb08 Teldat\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-81px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"teldat-cumplimiento\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">\u00bfC\u00f3mo Teldat facilita el cumplimiento de NIS2?<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Cumplir con NIS2 exige detecci\u00f3n de amenazas, seguridad de red, control de acceso, respuesta ante incidentes y monitorizaci\u00f3n continua. El portfolio de Teldat aborda m\u00faltiples obligaciones en <strong style=\"color: #1a1625; font-weight: 600;\">entornos IT y OT:<\/strong><\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\"><span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/network-detection-response-xdr-deteccion-y-respuesta-de-red\/\" target=\"_blank\" rel=\"noopener\">be.Safe XDR<\/a><\/strong><\/span>: detecci\u00f3n de amenazas, gesti\u00f3n de incidentes y evaluaci\u00f3n de eficacia<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><strong style=\"color: #1a1625; font-weight: 600;\">be.Safe XDR<\/strong> proporciona <strong style=\"color: #1a1625; font-weight: 600;\">visibilidad completa de red, detecci\u00f3n con IA mediante modelos ML personalizados y respuesta automatizada.<\/strong> Soporta medidas 1, 2 y 6. Detecci\u00f3n de anomal\u00edas en tiempo real en tr\u00e1fico cifrado, UEBA, reconfiguraci\u00f3n autom\u00e1tica de red y an\u00e1lisis de tr\u00e1fico a nivel 7.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\"><span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/seguridad-embebida-ngfw\/\" target=\"_blank\" rel=\"noopener\">be.Safe Pro<\/a><\/strong><\/span>: control de acceso, cifrado y seguridad de red<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><strong style=\"color: #1a1625; font-weight: 600;\">be.Safe Pro<\/strong> ofrece arquitectura SASE con SWG y NGFW para <strong style=\"color: #1a1625; font-weight: 600;\">control de acceso granular, cifrado y seguridad a nivel de aplicaci\u00f3n.<\/strong> Aborda medidas 8, 9 y 10. <strong style=\"color: #1a1625; font-weight: 600;\">M\u00e1s de 15.000 firmas IPS,<\/strong> 84 categor\u00edas de navegaci\u00f3n, <strong style=\"color: #1a1625; font-weight: 600;\">m\u00e1s de 4.000 decodificadores<\/strong> y ZTNA.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\"><span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/networking-avanzado\/solucion-de-redes-avanzada-de-tecnologia-sd-wan\/\" target=\"_blank\" rel=\"noopener\">SD-WAN<\/a><\/strong><\/span>: continuidad de negocio y gesti\u00f3n de activos<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">La <strong style=\"color: #1a1625; font-weight: 600;\">suite CNM SD-WAN<\/strong> proporciona orquestaci\u00f3n centralizada con visibilidad, segmentaci\u00f3n y aplicaci\u00f3n de pol\u00edticas. Soporta medidas 3 y 9. Arquitectura basada en API integrada con XDR para <strong style=\"color: #1a1625; font-weight: 600;\">autorrecuperaci\u00f3n de red.<\/strong> Desplegada en la mayor implementaci\u00f3n SD-WAN + XDR de Europa en la <strong style=\"color: #1a1625; font-weight: 600;\">Junta de Andaluc\u00eda.<\/strong><\/p>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/cpstic.ccn.cni.es\/en\/catalogue?pid=178:teldat&amp;search=&amp;order=i.created&amp;dir=desc&amp;f_familia=&amp;f_nivel_ens=&amp;f_nivel_clasificacion=&amp;f_tipo=&amp;cm=0#tlb\" target=\"_blank\" rel=\"noopener\">Certificaci\u00f3n CPSTIC<\/a><\/strong><\/span><strong style=\"color: #1a1625; font-weight: 600;\">:<\/strong> Teldat posee la doble condici\u00f3n de <strong style=\"color: #1a1625; font-weight: 600;\">Cualificado y Aprobado<\/strong> en el Cat\u00e1logo CPSTIC (CCN\/ENS) al nivel m\u00e1s alto <strong style=\"color: #1a1625; font-weight: 600;\">(ENS Alta).<\/strong> Validaci\u00f3n de alineamiento con el \u00e9nfasis de NIS2 en tecnolog\u00edas certificadas.<\/p>\n<\/div>\n<div style=\"text-align: center; margin-top: 28px;\"><a style=\"display: inline-flex; align-items: center; gap: 8px; padding: 14px 28px; border-radius: 10px; font-size: 0.92rem; font-weight: 600; text-decoration: none; background: #32244a; color: #fff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/\" target=\"_blank\" rel=\"noopener\">Descubrir soluciones de ciberseguridad \u2192<\/a><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=\u00bb09 FAQ\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-80px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"faq\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Preguntas frecuentes (FAQ&#8217;s)<\/h2>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfQu\u00e9 es la Directiva NIS2?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Normativa de ciberseguridad de la UE que exige a <strong style=\"color: #1a1625; font-weight: 600;\">entidades esenciales e importantes de 18 sectores<\/strong> gestionar riesgos, notificar incidentes y asegurar la cadena de suministro. Afecta a <strong style=\"color: #1a1625; font-weight: 600;\">m\u00e1s de 100.000 organizaciones.<\/strong><\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfQui\u00e9n debe cumplir?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Organizaciones con <strong style=\"color: #1a1625; font-weight: 600;\">50+ empleados o 10 M\u20ac+<\/strong> en sectores cubiertos. Entidades esenciales con supervisi\u00f3n proactiva. Entidades importantes con supervisi\u00f3n reactiva.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfCu\u00e1les son las 10 medidas m\u00ednimas?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Art\u00edculo 21: <strong style=\"color: #1a1625; font-weight: 600;\">(1)<\/strong> an\u00e1lisis de riesgos, <strong style=\"color: #1a1625; font-weight: 600;\">(2)<\/strong> incidentes, <strong style=\"color: #1a1625; font-weight: 600;\">(3)<\/strong> continuidad, <strong style=\"color: #1a1625; font-weight: 600;\">(4)<\/strong> cadena de suministro, <strong style=\"color: #1a1625; font-weight: 600;\">(5)<\/strong> desarrollo seguro, <strong style=\"color: #1a1625; font-weight: 600;\">(6)<\/strong> eficacia, <strong style=\"color: #1a1625; font-weight: 600;\">(7)<\/strong> formaci\u00f3n, <strong style=\"color: #1a1625; font-weight: 600;\">(8)<\/strong> criptograf\u00eda, <strong style=\"color: #1a1625; font-weight: 600;\">(9)<\/strong> acceso\/activos, <strong style=\"color: #1a1625; font-weight: 600;\">(10)<\/strong> MFA\/comunicaciones.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfCu\u00e1les son las sanciones?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Esenciales: hasta <strong style=\"color: #1a1625; font-weight: 600;\">10 M\u20ac o 2%.<\/strong> Importantes: hasta <strong style=\"color: #1a1625; font-weight: 600;\">7 M\u20ac o 1,4%.<\/strong> Alta direcci\u00f3n personalmente responsable. Posibles inhabilitaciones.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfNIS1 vs NIS2?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">De <strong style=\"color: #1a1625; font-weight: 600;\">7 a 18 sectores,<\/strong> reglas autom\u00e1ticas, sanciones armonizadas, notificaci\u00f3n <strong style=\"color: #1a1625; font-weight: 600;\">24h\/72h\/1 mes,<\/strong> responsabilidad ejecutiva, cadena de suministro.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfPlazos de notificaci\u00f3n?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><strong style=\"color: #1a1625; font-weight: 600;\">24h:<\/strong> alerta temprana. <strong style=\"color: #1a1625; font-weight: 600;\">72h:<\/strong> notificaci\u00f3n detallada. <strong style=\"color: #1a1625; font-weight: 600;\">A petici\u00f3n:<\/strong> informes intermedios. <strong style=\"color: #1a1625; font-weight: 600;\">1 mes:<\/strong> informe final.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbCTA\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bbCTA\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-87px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div style=\"background: linear-gradient(135deg, #f3f0fa, rgba(50,36,74,0.04)); border: 1px solid rgba(50,36,74,0.08); border-radius: 20px; padding: 48px 40px; text-align: center; margin: 48px 0; max-width: 900px; margin-left: auto; margin-right: auto;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; margin-bottom: 12px;\">Prepara tu organizaci\u00f3n para el cumplimiento de NIS2<\/h2>\n<p style=\"max-width: 560px; margin: 0 auto 28px; color: #4a3f5c;\">Las soluciones integradas de ciberseguridad y redes de Teldat ayudan a construir la postura de seguridad que exige NIS2 desde la detecci\u00f3n de amenazas hasta la respuesta ante incidentes.<\/p>\n<div style=\"display: flex; justify-content: center; gap: 16px; flex-wrap: wrap;\"><a style=\"display: inline-flex; align-items: center; gap: 8px; padding: 14px 28px; border-radius: 10px; font-size: 0.92rem; font-weight: 600; text-decoration: none; background: #32244a; color: #fff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/\" target=\"_blank\" rel=\"noopener\">Descubrir soluciones de ciberseguridad \u2192<\/a><a style=\"display: inline-flex; align-items: center; gap: 8px; padding: 14px 28px; border-radius: 10px; font-size: 0.92rem; font-weight: 600; text-decoration: none; background: transparent; color: #1a1625; border: 1px solid rgba(50,36,74,0.12);\" href=\"https:\/\/go.teldat.com\/contacto\" target=\"_blank\" rel=\"noopener\">Contactar \u2192<\/a><\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 es la directiva NIS2 europea?<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"glossary_category":[1692,1723],"class_list":["post-76852","glossary","type-glossary","status-publish","hentry","glossary_category-ciberseguridad","glossary_category-cumplimiento-normativa"],"acf":[],"wpml_current_locale":"es_ES","wpml_translations":[],"_links":{"self":[{"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary\/76852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/types\/glossary"}],"version-history":[{"count":11,"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary\/76852\/revisions"}],"predecessor-version":[{"id":76886,"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary\/76852\/revisions\/76886"}],"wp:attachment":[{"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/media?parent=76852"}],"wp:term":[{"taxonomy":"glossary_category","embeddable":true,"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary_category?post=76852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}