CINXE.COM
NIS 2 Directive Training, Updates, Compliance
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>NIS 2 Directive Training, Updates, Compliance</title> <meta name="description" content="The NIS 2 Directive: Expert-level analysis, training, cutting-edge updates. Stay ahead of cybersecurity compliance challenges with specialized insights and training from Cyber Risk GmbH."> <meta name="keywords" content="NIS 2 Directive, NIS 2 Training, NIS 2 Directive training, NIS 2 compliance, Cyber Risk GmbH"> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "Index", "item": " https://www.nis-2-directive.com" }, { "@type": "ListItem", "position": 2, "name": "NIS 2 Directive Trained Professional (NIS2DTP)", "item": " https://www.nis-2-directive.com/NIS_2_Directive_Trained_Professional_(NIS2DTP).html" }, { "@type": "ListItem", "position": 3, "name": " NIS 2 Directive (Final Text)", "item": "https://www.nis-2-directive.com/NIS_2_Directive_Articles.html" }, { "@type": "ListItem", "position": 4, "name": " NIS 2 Directive Links", "item": "https://www.nis-2-directive.com/Links.html" }, { "@type": "ListItem", "position": 5, "name": "Cyber Risk GmbH", "item": "https://www.cyber-risk-gmbh.com" } ] } </script> <script type="application/ld+json"> { "@context": "https://schema.org", "@type": "Organization", "name": "Cyber Risk GmbH", "url": "https://www.cyber-risk-gmbh.com", "logo": "https://www.cyber-risk-gmbh.com/Cyber_Risk_GmbH_Logo.jpg", "sameAs": [ "https://www.linkedin.com/company/71474270/admin/page-posts/published/", "https://x.com/Cyber_Risk_GmbH" ], "contactPoint": { "@type": "ContactPoint", "telephone": "+41-79-5058960", "contactType": "Customer Service", "areaServed": "Worldwide", "availableLanguage": "English" }, "founder": { "@type": "Person", "name": "George Lekatis" }, "description": "Cyber Risk GmbH is a leading provider of NIS 2 Training in Switzerland and worldwide.", "address": { "@type": "PostalAddress", "streetAddress": "Dammstrasse 16", "addressLocality": "Horgen", "addressRegion": "Canton of Zürich", "postalCode": "8810", "addressCountry": "CH" } } </script> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> <meta name="google-site-verification" content="I0CDxLn5hun_Esd7Gf8jIPUBQ1eIIcVNsUQQ9d4Dq8Q"> <style> .wrapper-banner { background: url("NIS_2_Directive.jpg"); background-size: cover; background-position: center; } </style> <meta name="msvalidate.01" content="3992470AA0B488CE9CF07B1CD73A76D7"> <link rel="stylesheet" href="./style2.css"> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.disinformation.ch/"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.nis-2-directive.com" target="_blank" >Index</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Trained_Professional_(NIS2DTP).html" target="_blank" >NIS2DTP Training</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Training.html" target="_blank" >NIS 2 Directive Training</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Board_of_Directors_Training.html" target="_blank" >NIS 2 Board Training</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Articles.html" target="_blank" >Articles NIS 2 Directive</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Articles_(Proposal_16.12.2020).html" target="_blank" >Articles NIS 2 Directive (Proposal)</a></li> <li><a href="https://www.nis-2-directive.com/Links.html" target="_blank" >NIS 2 Directive Links</a></li> <li><a href="https://www.nis-2-directive.com/NIS_2_Directive_Transposition.html" target="_blank" >NIS 2 Transposition</a></li> <li><a href="https://www.cyber-risk-gmbh.com" target="_blank">Cyber Risk GmbH</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a></li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h1>The NIS 2 Directive</h1> <p class="text-left"><b>What is the NIS 2 Directive? </b></p> <p class="text-left">The NIS 2 Directive (Directive (EU) 2022/2555) is a legislative framework designed to enhance cybersecurity across the European Union by establishing a high common level of security for network and information systems. It builds upon the original NIS Directive, expanding its scope and strengthening requirements to better address evolving cyber threats.</p> <p class="text-left">Under NIS 2, essential and important entities must adopt appropriate, proportionate technical, operational, and organizational measures to manage cybersecurity risks. These measures aim to protect network and information systems, as well as to prevent or minimize the impact of incidents on service recipients and interconnected services.</p> <p class="text-left">The directive mandates an "all-hazards" approach, meaning that entities must be prepared to address a wide range of threats, from cyberattacks to physical disruptions, ensuring comprehensive protection and resilience in their operations.</p> <hr> <p class="text-left"><b>21 November 2024: Assessing the impact of the current EU cybersecurity framework, and particularly the NIS 2 Directive, from the European Union Agency for Cybersecurity (ENISA).</b></p> <p class="text-left">This report aims at providing policy makers with evidence to assess the effectiveness of the existing EU cybersecurity framework specifically through data on how the NIS Directive has influenced cybersecurity investments and overall maturity of organisations in scope. As 2024 is the year of the transposition of NIS 2, this report also intends to capture a pre-implementation snapshot of the relevant metrics for new sectors and entities in scope of NIS 2 to help future assessments of the impact of NIS 2.</p> <p class="text-left">Information security now represents 9% of EU IT investments, a significant increase of 1.9 percentage points from 2022, marking the second consecutive year of growth in cybersecurity investment post-pandemic. </p> <p class="text-left">The report provides insights into the readiness of entities to comply with new requirements introduced by key horizontal (e.g. CRA) and sectorial (e.g. DORA, NCCS) legislation, while also exploring the challenges they face. </p> <p class="text-left">The report:</p> <p class="text-left"><a href="https://www.enisa.europa.eu/publications/nis-investments-2024" target="_blank">https://www.enisa.europa.eu/publications/nis-investments-2024</a></p> <hr> <p class="text-left"><b>7 November 2024: Commission Implementing Regulation (EU) 2024/2690 of 17 October is published at the Official Journal of the European Union</b></p> <p class="text-left"><b>Full name: </b>COMMISSION IMPLEMENTING REGULATION (EU) 2024/2690 of 17 October 2024 laying down rules for the application of Directive (EU) 2022/2555 as regards technical and methodological requirements of cybersecurity risk-management measures and further specification of the cases in which <b>an incident is considered to be significant </b>with regard to DNS service providers, TLD name registries, cloud computing service providers, data centre service providers, content delivery network providers, managed service providers, managed security service providers, providers of online market places, of online search engines and of social networking services platforms, and trust service providers.</p> <p class="text-left">According to <b>Article 1 (Subject matter), </b>this Regulation, with regard to DNS service providers, TLD name registries, cloud computing service providers, data centre service providers, content delivery network providers, managed service providers, managed security service providers, providers of online market places, of online search engines and of social networking services platforms, and trust service providers (the relevant entities) lays down the technical and the methodological requirements of the measures referred to in Article 21(2) of Directive (EU) 2022/2555 and <b>further specifies the cases in which an incident shall be considered to be significant </b>as referred to in Article 23(3) of Directive (EU) 2022/2555.</p> <p class="text-left">According to <b>Article 16 (Entry into force and application),</b> this Regulation shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.</p> <p class="text-left">The official text:</p> <p class="text-left"><a href="https://eur-lex.europa.eu/eli/reg_impl/2024/2690/oj" target="_blank">https://eur-lex.europa.eu/eli/reg_impl/2024/2690/oj</a></p> <br> <p class="text-left"><b>7 November 2024: ENISA is inviting industry stakeholders to provide comments on Commission Implementing Regulation (EU) 2024/2690 of 17 October</b></p> <p class="text-left">ENISA is developing technical guidance to support EU Member States and entities with the implementation of the technical and methodological requirements of the NIS 2 cybersecurity risk-management measures outlined in the Commission Implementing Regulation (EU) 2024/2690 of 17.10.2024. </p> <p class="text-left">ENISA develops this technical guidance to provide: </p> <p class="text-left"> - Additional advice and tips on what to consider when implementing a requirement and further explanation about concepts and terms used in the legal text; </p> <p class="text-left"> - Examples of evidence, which could be used to asses if a requirement has been met; </p> <p class="text-left"> - Tables, mapping the security requirements in the Implementing Regulation to European and international standards, as well as national frameworks. </p> <p class="text-left">The draft of the technical guidance is now available for industry consultation: </p> <p class="text-left"><a href="https://www.enisa.europa.eu/publications/implementation-guidance-on-nis-2-security-measures" target="_blank">https://www.enisa.europa.eu/publications/implementation-guidance-on-nis-2-security-measures</a></p> <hr> <p class="text-left"><b>17 October 2024: The Commission adopted the first implementing regulation on NIS 2 Directive. </b></p> <p class="text-left">The implementing regulation will apply to specific categories of companies providing digital services, such as cloud computing service providers, data centre service providers, online marketplaces, online search engines and social networking platforms, to name a few. For each category of service providers, the implementing act also specifies when an incident is considered significant.</p> <p class="text-left">The full name is:</p> <p class="text-left">COMMISSION IMPLEMENTING REGULATION (EU) of 17.10.2024 laying down rules for the application of Directive (EU) 2022/2555 as regards technical and methodological requirements of cybersecurity risk-management measures and further specification of the cases in which an incident is considered to be significant with regard to DNS service providers, TLD name registries, cloud computing service providers, data centre service providers, content delivery network providers, managed service providers, managed security service providers, providers of online market places, of online search engines and of social networking services platforms, and trust service providers.</p> <p class="text-left"><b>Next Steps: </b> The implementing regulation will be published in the Official Journal in due course and enter into force 20 days thereafter.</p> <p class="text-left"><a href="https://digital-strategy.ec.europa.eu/en/library/nis2-commission-implementing-regulation " target="_blank">https://digital-strategy.ec.europa.eu/en/library/nis2-commission-implementing-regulation</a></p> <hr> <p class="text-left"><b>17 October 2024: NIS 2 Directive, Deadline for EU Member States</b></p> <p class="text-left">Under Article 41 (Transposition) of the NIS 2 Directive, by 17 October 2024, all EU Member States are required to adopt and publish the national measures necessary to ensure compliance with the directive. These measures are critical for aligning national legislation with the enhanced cybersecurity requirements introduced by NIS 2.</p> <p class="text-left">Following the adoption, these measures must be enforced starting from 18 October 2024, marking the beginning of a new era in cybersecurity across the EU.</p> <p class="text-left">Many Member States have faced delays in transposing the directive into national law. This has raised concerns about the uniform implementation of the directive’s provisions and the readiness of essential and important sectors to comply with enhanced cybersecurity requirements.</p> <hr> <p class="text-left"><b>December 2022 - the NIS 2 Directive was published in the Official Journal of the European Union as Directive (EU) 2022/2555. </b></p> <p class="text-left"> <b>Full name: </b>The full name is "Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive)".</p> <br> <p class="text-left"> <b> Which is correct? NIS 2 or NIS2?</b></p> <p class="text-left"> <b>NIS 2 </b>is the correct name, as this is the name published at the Official Journal of the European Union.</p> <br> <img src="NIS2_or_NIS_2.JPG" alt="NIS 2 or NIS2?" width="885" height="314" class="img-responsive"> <br> <p class="text-left"> The name NIS2 has also been used in official documents.</p> <br> <p class="text-left"> <b>Deadlines: </b> By <b>17 October 2024,</b> Member States must adopt and publish the measures necessary to comply with the NIS 2 Directive. </p> <p class="text-left"> They shall apply those measures from <b>18 October 2024.</b></p> <p class="text-left"> Directive (EU) 2016/1148 (the NIS Directive) is repealed with effect from <b> 18 October 2024.</b></p> <p class="text-left">By <b>17 July 2024 </b>and every 18 months thereafter, EU-CyCLONe shall submit to the European Parliament and to the Council a report assessing its work.</p> <p class="text-left">By <b>17 October 2024, </b>the Commission shall adopt implementing acts laying down the technical and the methodological requirements of the measures with regard to DNS service providers, TLD name registries, cloud computing service providers, data centre service providers, content delivery network providers, managed service providers, managed security service providers, providers of online market places, of online search engines and of social networking services platforms, and trust service providers.</p> <p class="text-left">The Cooperation Group shall, on <b>17 January 2025, </b>establish, with the assistance of the Commission and ENISA, and, where relevant, the CSIRTs network, the methodology and organisational aspects of peer reviews with a view to learning from shared experiences, strengthening mutual trust, achieving a high common level of cybersecurity, as well as enhancing Member States’ cybersecurity capabilities and policies necessary to implement this Directive. Participation in peer reviews is voluntary. The peer reviews shall be carried out by cybersecurity experts. The cybersecurity experts shall be designated by at least two Member States, different from the Member State being reviewed.</p> <p class="text-left">By <b>17 April 2025, </b>Member States shall establish a list of essential and important entities as well as entities providing domain name registration services. Member States shall review and, where appropriate, update that list on a regular basis and at least every two years thereafter.</p> <p class="text-left">By <b>17 April 2025 </b>and every two years thereafter, the competent authorities shall notify the Commission and the Cooperation Group of the number of essential and important entities for each sector.</p> <p class="text-left">By <b>17 October 2027 </b>and every 36 months thereafter, the Commission shall review the functioning of this Directive, and report to the European Parliament and to the Council. </p> <br> <p class="text-left"><b>Important obligations: </b>According to Article 20 (Governance), the <b>management bodies </b>of essential and important entities must approve the cybersecurity risk-management measures taken by those entities, oversee its implementation and <b>"can be held liable for infringements."</b> <p class="text-left"> According to Article 20, Member States shall ensure that the <b>"members of the management bodies of essential and important entities are required to follow training," </b>and shall encourage essential and important entities to offer similar training to their employees on a regular basis, in order that they gain sufficient knowledge and skills to enable them to identify risks and assess cybersecurity risk-management practices and their impact on the services provided by the entity.</p> <p class="text-left"> According to Article 21 (Cybersecurity risk-management measures), essential and important entities must take appropriate and proportionate technical, operational and organisational measures to manage the risks posed to the security of network and information systems which those entities use for their operations or for the provision of their services, and to prevent or minimise the impact of incidents on recipients of their services and on other services.</p> <p class="text-left"> Taking into account the <b>"state-of-the-art" </b>and, where applicable, relevant European and international standards, as well as the cost of implementation, the measures referred shall ensure a level of security of network and information systems appropriate to the risks posed. When assessing the proportionality of those measures, due account shall be taken of the degree of the entity’s exposure to risks, the entity’s size and the likelihood of occurrence of incidents and their severity, including their societal and economic impact.</p> <p class="text-left"> The measures shall be based on an <b>"all-hazards approach"</b> that aims to protect network and information systems and the physical environment of those systems from incidents, and shall include <b>"at least" </b>the following:</p> <p class="text-left"> (a) policies on risk analysis and information system security;</p> <p class="text-left"> (b) incident handling;</p> <p class="text-left"> (c) business continuity, such as backup management and disaster recovery, and crisis management;</p> <p class="text-left"> (d) supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers;</p> <p class="text-left"> (e) security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure;</p> <p class="text-left"> (f) policies and procedures to assess the effectiveness of cybersecurity risk-management measures;</p> <p class="text-left"> (g) basic cyber hygiene practices and cybersecurity training;</p> <p class="text-left"> (h) policies and procedures regarding the use of cryptography and, where appropriate, encryption;</p> <p class="text-left"> (i) human resources security, access control policies and asset management;</p> <p class="text-left"> (j) the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.</p> <br> <p class="text-left"><b>Important note for Non-EU entities:</b> Under Article 26 (Jurisdiction and territoriality), if an entity referred to in paragraph 26.1.(b) ("DNS service providers, TLD name registries, entities providing domain name registration services, cloud computing service providers, data centre service providers, content delivery network providers, managed service providers, managed security service providers, as well as providers of online marketplaces, of online search engines or of social networking services platforms") is <b>not established in the EU, but offers services within the EU, </b>it shall designate a representative in the EU. The representative shall be established in one of those Member States where the services are offered. Such an entity shall be considered to fall under the jurisdiction of the Member State where the representative is established. In the <b>absence</b> of a representative, <b>any Member State in which the entity provides services may take legal actions against the entity for the infringement </b>of this Directive. </p> <hr> <p class="text-left"><b>July 24, 2024 – The first report on the cybersecurity and resilience of Europe’s telecommunications and electricity sectors. </b></p> <p class="text-left">The Council, in its Conclusions on the development of the European Union’s cyber posture of 23 May 2022, invited the Commission, the High Representative and the <b>NIS Cooperation Group, </b>in coordination with relevant civilian and military bodies and agencies and established networks, including the <b>EU CyCLONe, </b>to conduct a risk evaluation and build <b>risk scenarios from a cybersecurity perspective </b>in a situation of threat or possible attack against Member States or partner countries and present them to the relevant Council bodies.</p> <p class="text-left">The report puts forward a number of recommendations across 4 areas for improvement, including the recommendation that Member States conduct further self-assessments for the sectors as per the <b>NIS 2 Directive and CER Directive.</b></p> <p class="text-left">The scenarios are very interesting, in a Europe that is preparing for hybrid warfare. Below we can read one of these scenarios in the report:</p> <p class="text-left"><b>Risk Scenario</b></p> <p class="text-left"><b>Context</b></p> <p class="text-left">In the context of ongoing military operations, a state sponsored cyberwarfare group is engaged in the delivery of targeted simultaneous attacks against several power plants connected on a country’s power grid leveraging a recently developed wiper and a range of zero-days vulnerabilities and backdoors in wind turbines, solar panels and electric cars.</p> <p class="text-left"><b>Technical</b></p> <p class="text-left">The cyberwarfare group was able to leverage a zero-day vulnerability in a product used by multiple power plants in the EU to gain foothold to their IT environments. From there, the group leveraged the lack of adequate IT/OT network segregation wherever applicable, to move laterally to OT networks where it deployed its custom-made wiper malware. </p> <p class="text-left">At the same time, the well-resourced group exacerbates the attack by targeting back-up options.</p> <p class="text-left">At first, all wind turbines are being shut off during windy conditions by leveraging a backdoor in a critical component that was manufactured in a third country that (indirectly) supports the cyberwarfare group’s cause. The same then happens for solar panels produced within the third country. Finally, some electric cars start drawing more from the grid than they should, further increasing the load on the grid.</p> <p class="text-left"><b>Impact</b></p> <p class="text-left">As a result of the activity of the wiper on the affected power plants, several OT systems are rendered unavailable. This keeps much of the generation off-the-grid, thus impacting the management and operation of the energy system by the transmission network operator of the country. This results in forced rolling blackouts which are worsened by the unavailability of backup generation from wind farms.</p> <p class="text-left">The resetting and commissioning of the affected OT systems lasts up to two weeks, by when the situation is fully back to normal. Additionally, though most or all Member States were affected, those who are heavily dependent on wind or solar energy as a secondary source might have to request support from other Member States while they are dealing with their own situation. This requires effective cooperation at EU level.</p> <p class="text-left">The rolling blackouts may also cause additional multi-sectoral cascading effects and potentially black starts in several countries. Public rail and road systems (e.g., bus and rail schedules, train operations, signalling systems or track switches) that are successfully disrupted, would be in some cases paralysed. Public administration would likely cease most of its operations for the days of the total blackout, except for emergency services. </p> <p class="text-left">The impact of the power outages on the health system would be far-reaching and result in an increased need for emergency care. With limited power and reliance on generators, hospital services are immediately reduced and healthcare facilities are often not able to provide basic services. Payment systems would also be severely affected, with significant consequences for the retail sector where particularly access to food could pose a major problem.</p> <hr> <p class="text-left"><b>July 12, 2024 – The Artificial Intelligence Act was published in the Official Journal of the European Union. </b></p> <p class="text-left"><b>The AI Act is very important for experts implementing the NIS 2 Directive and the Critical Entities Resilience Directive (CER, Directive (EU) 2022/2557).</b></p> <p class="text-left">According to Article 9.10 of the AI Act: “For providers of high-risk AI systems that are subject to requirements regarding internal risk management processes <b>under other relevant provisions of Union law, </b>the aspects provided in paragraphs 1 to 9 may be part of, or combined with, the risk management procedures established pursuant to that law.”</p> <br> <p class="text-left"><b>NIS 2 and the AI Act, common implementation examples:</b></p> <p class="text-left"><b>a. Risk Management. </b> NIS 2 emphasizes risk management processes, requiring organizations to implement measures to prevent and mitigate cybersecurity incidents. The AI Act focuses on risk management for AI systems, including cybersecurity, testing, documentation, and mitigation strategies.</p> <p class="text-left"><b>b. Incident Reporting and Response. </b>NIS 2 requires entities to report significant cybersecurity incidents within 24 hours. The AI Act includes provisions for monitoring and reporting cybersecurity incidents related to AI systems. </p> <p class="text-left"><b>c. Governance and Accountability. </b>NIS 2 establishes clear responsibilities for senior management in ensuring compliance with cybersecurity measures and reporting. The AI Act asks for robust governance frameworks, including accountability mechanisms and documentation practices to demonstrate compliance.</p> <p class="text-left"><b>d. Data Protection and Security. </b>NIS 2 stresses the importance of securing network and information systems to protect data integrity, availability, and confidentiality. The AI Act requires high-risk AI systems to incorporate measures ensuring data quality and data governance.</p> <br> <p class="text-left"><b> Is data poisoning (as described in the Artificial Intelligence Act) an important challenge for experts implementing the NIS 2 Directive too?</b></p> <p class="text-left">Data poisoning is a form of attack on machine learning (ML) systems where adversaries intentionally manipulate the training data to influence a model's behavior.</p> <p class="text-left">Backdoor Attacks are data poisoning attacks where adversaries manipulate the training data to embed a hidden backdoor within the model. This backdoor remains dormant during normal operations but activates in the presence of a specific trigger, leading to malicious behavior. </p> <p class="text-left"><b>Example 1: AI-based spam filters </b>are advanced systems designed to detect and block unwanted email messages, using artificial intelligence and machine learning techniques. These filters analyze various attributes and patterns within emails to determine their likelihood of being spam or unwanted. By poisoning the training data of spam filters and introducing specific words or patterns as safe, adversaries can bypass detection and conduct phishing attacks or deliver malware. </p> <p class="text-left"><b>Example 2: AI-based Intrusion Detection Systems (IDS) </b>are designed to identify and respond to potential security threats within a network by analyzing data and recognizing patterns indicative of malicious activities. If an AI-based IDS is trained with mislabeled data (poisoned data), and actual threats are labeled as safe, the IDS would fail to detect and alert on real attacks, allowing cybercriminals to bypass defenses.</p> <p class="text-left"><b>Example 3: AI-based surveillance systems </b> utilize AI and machine learning technologies to monitor, analyze, and interpret data from various sensors and cameras. These systems are designed to detect and respond to potential security threats in real-time by automatically recognizing patterns, identifying anomalies, and alerting security personnel to suspicious activities.</p> <p class="text-left">In AI data poisoning attacks, adversaries alter sensor data in AI-based surveillance systems to hide certain activities. Data poisoning corrupts the learning process of machine learning models by introducing poisoned data during the training phase. This causes the models to learn incorrect patterns, leading to faulty decision-making during real-time surveillance. By disabling alerts when certain patterns are detected, attackers can bypass systems and exfiltrate data without raising alarms.</p> <br> <p class="text-left">In cases where <b>AI systems are used in sectors covered by NIS 2 </b>(e.g., healthcare, energy etc.), entities must comply with both, NIS 2 and the AI Act. They must leverage cybersecurity measures to support AI risk management and vice versa. These entities need a holistic approach to compliance, integrating cybersecurity and AI risk management practices. </p> <p class="text-left">We have developed the Artificial Intelligence Act Trained Professional (AIActTPro) program. You can find all the details about the program at: <a href=" https://www.artificial-intelligence-act.com/Artificial_Intelligence_Act_Trained_Professional_(AIActTPro).html" target="_blank"> https://www.artificial-intelligence-act.com/Artificial_Intelligence_Act_Trained_Professional_(AIActTPro).html </a>. </p> <hr> <p class="text-left"><b>16 April 2024 – The European Systemic Risk Board (ESRB) published the paper “Advancing macroprudential tools for cyber resilience – Operational policy tools, April 2024.” </b></p> <p class="text-left">According to the paper, the pan-European systemic cyber incident coordination framework (EU-SCICF) should build on the Digital Operational Resilience Act (DORA) for the financial sector and should complement existing frameworks (e.g. financial and cyber incident) as well as the Network and Information Security (NIS2) Directive and the Resilience of Critical Entities Directive (CER). </p> <p class="text-left">Read the paper at: <a href="https://www.esrb.europa.eu/pub/pdf/reports/esrb.report202404_advancingmacroprudentialtools~ca44cf0c8a.en.pdf?a59d39c66e7046ba099e5119d79cb3ea" target="_blank" >Advancing macroprudential tools for cyber resilience – Operational policy tools, April 2024</a></p> <br> <img src="NIS2_DORA_CER.JPG" alt="NIS2 DORA CER" width="603" height="322" class="img-responsive"> <br> <hr> <p class="text-left"><b>18 September 2023 - Commission Guidelines about the relationship between the NIS 2 Directive and the Digital Operational Resilience Act (DORA).</b></p> <p class="text-left">The Commission Guidelines on the application of Article 4 (1) and (2) of the NIS 2 Directive, that was published at the Official Journal of the European Union the 18th of September 2023, covers some of the major areas of concern for entities that try to understand if they must comply with the NIS 2 Directive, or the Digital Operational Resilience Act (DORA) and other <b>sector-specific </b>Union legal acts.</p> <p class="text-left">Article 4(1) of the NIS 2 Directive provides that, where <b>sector-specific </b>Union legal acts (like DORA, that applies in the financial sector) require essential or important entities to adopt cybersecurity risk-management measures or to notify significant incidents, and where those requirements are at least equivalent in effect to the obligations laid down in the NIS 2 Directive, the relevant provisions of the NIS 2 Directive shall <b>not apply </b>to such entities. The sector-specific provisions will apply.</p> <p class="text-left">That provision further provides that where <b>sector-specific </b>Union legal acts <b> do not cover all entities in a specific sector </b>falling within the scope of the NIS 2 Directive, the relevant provisions of the NIS 2 Directive shall continue to apply to the entities not covered by those sector-specific Union legal acts. </p> <p class="text-left">Article 4(2)(a) of the NIS 2 Directive provides that cybersecurity risk-management measures that essential or important entities are required to adopt under <b>sector-specific </b> Union legal acts shall be considered to be equivalent in effect to the obligations laid down in the NIS 2 Directive, where those measure are at least equivalent in effect to those laid down in Article 21(1) and (2) of the NIS 2 Directive. </p> <p class="text-left">When assessing whether the requirements in a sector-specific Union legal act on cybersecurity risk-management measures are at least equivalent in effect to those laid down in Article 21(1) and (2) of the NIS 2 Directive, the requirements in that sector-specific Union legal act should, at a minimum, correspond to the requirements of those provisions or go beyond them, meaning that the sector-specific provisions may be more granular on substance compared to the corresponding provisions of the NIS 2 Directive.</p> <p class="text-left">An important consideration when assessing the equivalence of a sector-specific Union legal act with the requirements of Article 21(1) and (2) of the NIS 2 Directive is that the cybersecurity risk-management measures required by the sector-specific Union legal act should be based on an <b>‘all-hazard approach’. </b></p> <p class="text-left">Since threats to the security of network and information systems could have different origins, <b>any type of event </b>can have a negative impact on the network information systems of the entity and potentially lead to an incident. Therefore, the cybersecurity risk-management measures taken by the entity should protect not only the entity’s network and information systems, but also the <b>physical environment </b>of those systems from any event such as <b>sabotage, theft, fire, flood, telecommunication or power failures, or unauthorised physical access </b>that are capable of compromising the availability, authenticity, integrity or confidentiality of stored, transmitted or processed data or of the services offered by, or accessible via, network and information systems. </p> <p class="text-left">Consequently, the cybersecurity risk-management measures required by a <b>sector-specific </b>Union legal act should specifically address the physical and environmental security of network and information systems from systems failure, human error, malicious acts, or natural phenomena.</p> <br> <p class="text-left"><b>NIS 2 and DORA.</b></p> <p class="text-left">The Commission Guidelines about the relationship between the NIS 2 Directive and the Digital Operational Resilience Act (DORA) of 18 September 2023, further explain the following in the Appendix:</p> <p class="text-left">Article 1(2) of DORA provides that, in relation to financial entities covered by the NIS 2 Directive and its corresponding national transposition rules, <b>DORA shall be considered a sector-specific </b>Union legal act for the purposes of Article 4 of the NIS 2 Directive. </p> <p class="text-left">This statement is mirrored in recital (28) of the preamble to the NIS 2 Directive, which says that DORA should be considered a sector-specific Union legal act in relation to the NIS 2 Directive with regard to financial entities. </p> <p class="text-left">Consequently, <b>the provisions of DORA </b>relating to information and communication technology (ICT) risk management (Article 6 et seq.), management of ICT-related incidents and, in particular, major ICT-related incident reporting (Article 17 et seq.), as well as on digital operational resilience testing, (Art 24 et seq.) information-sharing arrangements (Article 25) and ICT third-party risk (Article 28 et seq.) <b>shall apply instead of those provided for in the NIS 2 Directive. </b></p> <p class="text-left">Member States <b>should therefore not apply </b>the provisions of the NIS 2 Directive on cybersecurity risk-management and reporting obligations, and supervision and enforcement, <b>to financial entities covered by DORA.</b></p> <hr> <p class="text-left"><b>November 28, 2022 - the Council adopts the NIS 2 Directive. </b></p> <p class="text-left">The NIS 2 Directive replaces and repeals the NIS Directive (Directive 2016/1148/EC). NIS 2 will improve cybersecurity risk management and will introduce reporting obligations across sectors such as energy, transport, health and digital infrastructure.</p> <p class="text-left"><b>Next step: </b>The directive will be published in the Official Journal of the European Union in the coming days, and will enter into force on the twentieth day following this publication.</p> <p class="text-left">Member states must incorporate the provisions of the NIS 2 Directive into national law in <b>21 months</b> from the entry into force of the directive. </p> <hr> <p class="text-left"><b>November 10, 2022 - the European Parliament adopts the NIS 2 Directive. </b></p> <p class="text-left">The NIS 2 Directive replaces and repeals the NIS Directive (Directive 2016/1148/EC).</p> <p class="text-left"><b>Next step:</b> The Council of the European Union must formally adopt the text of the NIS 2 Directive.</p> <hr> <p class="text-left"><b>May 13, 2022 - Strengthening EU-wide cybersecurity and resilience – provisional agreement by the Council and the European Parliament</b></p> <p class="text-left">The Council and the European Parliament agreed on measures for a high common level of cybersecurity across the Union, to further improve the resilience and incident response capacities of both the public and private sector and the EU as a whole.</p> <p class="text-left">Once adopted, the new directive, called ‘NIS2’, will replace the current directive on security of network and information systems (the NIS directive).</p> <br> <p class="text-left"><b>Stronger risk and incident management and cooperation</b></p> <p class="text-left">NIS2 will set the baseline for cybersecurity risk management measures and reporting obligations across all sectors that are covered by the directive, such as energy, transport, health and digital infrastructure.</p> <p class="text-left">The revised directive aims to remove divergences in cybersecurity requirements and in implementation of cybersecurity measures in different member states. To achieve this, it sets out minimum rules for a regulatory framework and lays down mechanisms for effective cooperation among relevant authorities in each member state. It updates the list of sectors and activities subject to cybersecurity obligations, and provides for remedies and sanctions to ensure enforcement.</p> <p class="text-left">The directive will formally establish the European Cyber Crises Liaison Organisation Network, EU-CyCLONe, which will support the coordinated management of large-scale cybersecurity incidents.</p> <br> <p class="text-left"><b>Widening of the scope of the rules</b></p> <p class="text-left">While under the old NIS directive member states were responsible for determining which entities would meet the criteria to qualify as operators of essential services, the new NIS2 directive introduces a size-cap rule. This means that all medium-sized and large entities operating within the sectors or providing services covered by the directive will fall within its scope.</p> <p class="text-left">While the agreement between the European Parliament and the Council maintains this general rule, the provisionally agreed text includes additional provisions to ensure proportionality, a higher level of risk management and clear-cut criticality criteria for determining the entities covered.</p> <p class="text-left">The text also clarifies that the directive will not apply to entities carrying out activities in areas such as defence or national security, public security, law enforcement and the judiciary. Parliaments and central banks are also excluded from the scope.</p> <p class="text-left">As public administrations are also often targets of cyberattacks, NIS2 will apply to public administration entities at central and regional level. In addition, member states may decide that it applies to such entities at local level too.</p> <br> <p class="text-left"><b>Other changes introduced by the co-legislators</b></p> <p class="text-left">The European Parliament and the Council have aligned the text with sector-specific legislation, in particular the regulation on digital operational resilience for the financial sector (DORA) and the directive on the resilience of critical entities (CER), to provide legal clarity and ensure coherence between NIS2 and these acts.</p> <p class="text-left">A voluntary peer-learning mechanism will increase mutual trust and learning from good practices and experiences, thereby contributing to achieving a high common level of cybersecurity.</p> <p class="text-left">The two co-legislators have also streamlined the reporting obligations in order to avoid causing over-reporting and creating an excessive burden on the entities covered.</p> <p class="text-left">Member states will have 21 months from the entry into force of the directive in which to incorporate the provisions into their national law.</p> <br> <p class="text-left"><b>Next steps</b></p> <p class="text-left">The provisional agreement concluded today is now subject to approval by the Council and the European Parliament.</p> <p class="text-left">On the Council’s side, the French presidency intends to submit the agreement to the Council’s Permanent Representatives Committee for approval soon.</p> <hr> <p class="text-left"><b>A revised Directive on Security of Network and Information Systems (NIS 2 Directive).</b></p> <p class="text-left"> 16.12.2020 - The European Commission adopted a proposal for a revised Directive on Security of Network and Information Systems (NIS 2 Directive).</p> <p class="text-left"> In spite of its notable achievements, the Directive on the security of network and information systems (NIS Directive), has by now also proven its limitations. The digital transformation of society (intensified by the COVID-19 crisis) has expanded the threat landscape and is bringing about new challenges, which require adapted and innovative responses.</p> <p class="text-left"> Now any disruption, even one initially confined to one entity or one sector, can have cascading effects more broadly, potentially resulting in far-reaching and long-lasting negative impacts in the delivery of services across the whole internal market.</p> <p class="text-left"> To address these challenges, as announced in the Communication on Shaping Europe’s Digital Future, the Commission accelerated the Directive’s review to the end of 2020, carried out an impact assessment and presented a new legislative proposal. </p> <p class="text-left">This proposal is part of a package of measures to improve further the resilience and incident response capacities of public and private entities, competent authorities and the Union as a whole in the field of cybersecurity and critical infrastructure protection. It is in line with the Commission’s priorities to make Europe fit for the digital age and to build a future-ready economy that works for the people. </p> <p class="text-left">Cybersecurity is a priority in the Commission’s response to the COVID-19 crisis. The package includes a new Strategy on Cybersecurity with the aim of strengthening the Union’s strategic autonomy to improve its resilience and collective response and to build an open and global internet. Finally, the package contains a proposal for a directive on the resilience of critical operators of essential services, which aims to mitigate physical threats against such operators.</p> <p class="text-left"> This proposal builds on and repeals Directive (EU) 2016/1148 on security of network and information systems (NIS Directive), which is the first piece of EU-wide legislation on cybersecurity and provides legal measures to boost the overall level of cybersecurity in the Union. The NIS Directive has:</p> <p class="text-left">(1) contributed to improving cybersecurity capabilities at national level by requiring Member States to adopt national cybersecurity strategies and to appoint cybersecurity authorities; </p> <p class="text-left">(2) increased cooperation between Member States at Union level by setting up various fora facilitating the exchange of strategic and operational information; and </p> <p class="text-left">(3) improved the cyber resilience of public and private entities in seven specific sectors (energy, transport, banking, financial market infrastructures, healthcare, drinking water supply and distribution, and digital infrastructures) and across three digital services (online marketplaces, online search engines and cloud computing services) by requiring Member States to ensure that operators of essential services and digital service providers put in place cybersecurity requirements and report incidents.</p> <p class="text-left"> The proposal modernises the existing legal framework taking account of the increased digitisation of the internal market in recent years and an evolving cybersecurity threat landscape. Both developments have been further amplified since the onset of the COVID-19 crisis. The proposal also addresses several weaknesses that prevented the NIS Directive from unlocking its full potential.</p> <p class="text-left">Notwithstanding its notable achievements, the NIS Directive, which paved the way for a significant change in mind-set, in relation to the institutional and regulatory approach to cybersecurity in many Member States, has also proven its limitations. The digital transformation of society (intensified by the COVID-19 crisis) has expanded the threat landscape and is bringing about new challenges which require adapted and innovative responses. The number of cyber -attacks continues to rise, with increasingly sophisticated attacks coming from a wide range of sources inside and outside the EU. </p> <p class="text-left">The evaluation on the functioning of the NIS Directive, conducted for the purposes of the Impact Assessment, identified the following issues: </p> <p class="text-left">(1) the low level of cyber resilience of businesses operating in the EU; </p> <p class="text-left">(2) the inconsistent resilience across Member States and sectors; and </p> <p class="text-left">(3) the low level of joint situational awareness and lack of joint crisis response. For example, certain major hospitals in a Member State do not fall within the scope of the NIS Directive and hence are not required to implement the resulting security measures, while in another Member State almost every single healthcare provider in the country is covered by the NIS security requirements.</p> <p class="text-left"> Being an initiative within the Regulatory Fitness Programme (REFIT), the proposal aims at reducing the regulatory burden for competent authorities and compliance costs for public and private entities. Most notably, this is achieved by abolishing the obligation of competent authorities to identify operators of essential services and by increasing the level of harmonisation of security and reporting requirements to facilitate regulatory compliance for entities providing cross-border services. At the same time, competent authorities will also be given a number of new tasks, including the supervision of entities in sectors so far not covered by the NIS Directive. </p> <p class="text-left"> 16.12.2020 - <a href="https://www.nis-2-directive.com/Proposal_for_a_directive_on_measures_for_a_high_common_level_of_cybersecurity_across_the_Union.pdf" target="_blank">The Proposal for a directive on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148</a> </p> <p class="text-left"> 16.12.2020 - <a href="https://www.nis-2-directive.com/Annexes_to_the_Proposal_for_a_directive_on_measures_for_a_high_common_level_of_cybersecurity_across_the_Union.pdf" target="_blank">Annexes to the Proposal for a directive on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148</a> </p> <p class="text-left"> <a href="https://www.nis-2-directive.com/European_Parliament_A_high_common_level_of_cybersecurity_in_the_EU.pdf" target="_blank">The NIS 2 Directive, European Parliament, A high common level of cybersecurity in the EU</a> </p> <br> <p class="text-left"><b>European Council - Strengthening EU-wide cybersecurity and resilience. </b></p> <p class="text-left"> NIS 2 will set the baseline for cybersecurity risk management measures and reporting obligations across all sectors that are covered by the directive, such as energy, transport, health and digital infrastructure.</p> <p class="text-left"> The revised directive aims to remove divergences in cybersecurity requirements and in implementation of cybersecurity measures in different member states. To achieve this, it sets out minimum rules for a regulatory framework and lays down mechanisms for effective cooperation among relevant authorities in each member state. It updates the list of sectors and activities subject to cybersecurity obligations, and provides for remedies and sanctions to ensure enforcement.</p> <p class="text-left"> The directive will formally establish the European Cyber Crises Liaison Organisation Network, EU-CyCLONe, which will support the coordinated management of large-scale cybersecurity incidents. </p> <p class="text-left"> While under the old NIS directive member states were responsible for determining which entities would meet the criteria to qualify as operators of essential services, the new NIS2 directive introduces a size-cap rule. This means that all medium-sized and large entities operating within the sectors or providing services covered by the directive will fall within its scope.</p> <p class="text-left"> While the Council’s position maintains this general rule, it includes additional provisions to ensure proportionality, a higher level of risk management and clear-cut criticality criteria for determining the entities covered.</p> <p class="text-left"> The Council text also clarifies that the directive will not apply to entities carrying out activities in areas such as defence or national security, public security, law enforcement and the judiciary. Parliaments and central banks are also excluded from the scope.</p> <p class="text-left"> As public administrations are also often targets of cyberattacks, NIS2 will apply to public administration entities of central governments. In addition, member states may decide that it applies to such entities at regional and local level too. </p> <hr> <p class="text-left"><b> The first NIS directive, main elements. </b> </p> <p class="text-left"> The NIS Directive provides legal measures to boost the overall level of cybersecurity in the EU, in order to contribute to the overall functioning of the internal market. It is based on 3 main pillars:</p> <p class="text-left"> 1. In order to achieve a high level of preparedness of Member States, the NIS Directive requires Member States to adopt a national strategy on the security of network and information systems. Member States are also required to designate national Computer Security Incident Response Teams (CSIRTs), who are responsible for risk and incident handling, a competent national NIS authority, and a single point of contact (SPOC). The SPOC has to exercise a liaison function to ensure cross-border cooperation between the Member State authorities with the relevant authorities in other Member States and with the NIS Cooperation Group.</p> <p class="text-left"> 2. The NIS Directive establishes the NIS Cooperation Group to support and facilitate strategic cooperation and the exchange of information among Member States, and the CSIRTs Network, which promotes swift and effective operational cooperation between national CSIRTs.</p> <p class="text-left"> 3. The NIS Directive ensures that cybersecurity measures are taken across seven sectors, which are vital for our economy and society and which rely heavily on ICT, such as energy, transport, banking, financial market infrastructures, drinking water, healthcare and digital infrastructure.</p> <p class="text-left"> Public and private entities identified by the Member States as operators of essential services (OES) in these sectors are required to undertake a cybersecurity risk assessment and put in place appropriate and proportionate security measures. They are required to notify serious incidents to the relevant authorities. And, providers of key digital services (digital service providers or DSPs), such as search engines, cloud computing services and online marketplaces, have to comply with the security and notification requirements under the Directive. At the same time, the latter are subject to a so-called ‘light-touch’ regulatory regime, which entails, among other measures, that they are under the jurisdiction of one Member State for the whole EU and are not subjected to ex-ante supervisory measures. </p> <hr> <p class="text-left"><b> The new NIS 2 directive, main elements. </b> </p> <p class="text-left"> The new Commission proposal aims to address the deficiencies of the previous NIS Directive, to adapt it to the current needs and make it future-proof. </p> <p class="text-left"> To this end, the Commission proposal expands the scope of the current NIS Directive by adding new sectors based on their how crucial they are for the economy and society, and by introducing a clear size cap — meaning that all medium and large companies in selected sectors will be included in the scope. At the same time, it leaves some flexibility for Member States to identify smaller entities with a high security risk profile. </p> <p class="text-left"> The proposal also eliminates the distinction between operators of essential services and digital service providers. Entities would be classified based on their importance, and divided into essential and important categories, which will be subjected to different supervisory regimes. </p> <p class="text-left"> The proposal strengthens and streamlines security and reporting requirements for companies by imposing a risk management approach, which provides a minimum list of basic security elements that have to be applied. The proposal introduces more precise provisions on the process for incident reporting, content of the reports and timelines. </p> <p class="text-left"> Furthermore, the Commission proposes to address security of supply chains and supplier relationships by requiring individual companies to address cybersecurity risks in supply chains and supplier relationships. At European level, the proposal strengthens supply chain cybersecurity for key information and communication technologies. Member States in cooperation with the Commission and ENISA, may carry out coordinated risk assessments of critical supply chains, building on the successful approach taken in the context of the Commission Recommendation on Cybersecurity of 5G networks. </p> <p class="text-left"> The proposal introduces more stringent supervisory measures for national authorities, stricter enforcement requirements and aims at harmonising sanctions regimes across Member States. </p> <p class="text-left"> The proposal also enhances the role of the Cooperation Group in shaping strategic policy decisions and increases information sharing and cooperation between Member State authorities. It also enhances operational cooperation including on cyber crisis management. </p> <p class="text-left"> The Commission proposal also establishes a basic framework with responsible key actors on coordinated vulnerability disclosure for newly discovered vulnerabilities across the EU and creates EU registry in this area, operated by the EU agency for cybersecurity (ENISA). </p> <hr> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Cyber Risk GmbH, some of our clients</h3> <br> <div class="logos"> <div class="logos-slide"> <img src="Logos/XMA8.png" alt="" > <img src="Logos/SYGNIA5.jpg" alt="" > <img src="Logos/DELL3.jpg" alt="" > <img src="Logos/VW.jpg" alt="" > <img src="Logos/Bosch9.png" alt="" > <img src="Logos/Swisslife3.JPG" alt="" > <img src="Logos/ATLAS8.png" alt="" > <img src="Logos/INSIG8.png" alt="" > <img src="Logos/SANT8.png" alt="" > <img src="Logos/NTT38.png" alt="" > <img src="Logos/EIB15.PNG" alt="" > <img src="Logos/SC8.JPG" alt="" > <img src="Logos/schindler.jpg" alt="" > <img src="Logos/AO9.png" alt="" > <img src="Logos/GS300.JPG" alt="" > <img src="Logos/DB8.png" alt="" > <img src="Logos/TM8.png" alt="" > <img src="Logos/OK8.png" alt="" > <img src="Logos/PWC5.JPG" alt="" > <img src="Logos/Fujitsu.png" alt="" > <img src="Logos/HO5.JPG" alt="" > <img src="Logos/FIN22.png" alt="" > <img src="Logos/SAN8.png" alt="" > <img src="Logos/BAH9.png" alt="" > <img src="Logos/AT32.png" alt="" > <img src="Logos/WINS25.png" alt="" > <img src="Logos/SKY12.png" alt="" > <img src="Logos/RB78.png" alt="" > <img src="Logos/WU8.png" alt="" > <img src="Logos/TDC.JPG" alt="" > <img src="Logos/BH18.png" alt="" > <img src="Logos/DeepSec_Conference7.png" alt="" > <img src="Logos/DC12.png" alt="" > <img src="Logos/BROAD8.png" alt="" > <img src="Logos/LEMON8.PNG" alt="" > <img src="Logos/SIK8.PNG" alt="" > <img src="Logos/KUMO8.PNG" alt="" > <img src="Logos/VEST8.PNG" alt="" > <img src="Logos/MOXA8.PNG" alt="" > <img src="Logos/TIET8.PNG" alt="" > <img src="Logos/UNI8.PNG" alt="" > <img src="Logos/BCC11.PNG" alt="" > <img src="Logos/SN8.PNG" alt="" > <img src="Logos/KYN8.PNG" alt="" > <img src="Logos/PG8.PNG" alt="" > <img src="Logos/MER8.PNG" alt="" > <img src="Logos/LIB8.PNG" alt="" > <img src="Logos/ALI8.PNG" alt="" > <img src="Logos/USA8.PNG" alt="" > <img src="Logos/MAR8.PNG" alt="" > <img src="Logos/ABB8.PNG" alt="" > <img src="Logos/INSI8.PNG" alt="" > </div> </div> <script> var copy = document.querySelector(".logos-slide").cloneNode(true); document.querySelector(".logos").appendChild(copy); </script> </div> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> </div> </div> </div> </div> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>