{"id":12988,"date":"2025-01-24T07:29:58","date_gmt":"2025-01-24T06:29:58","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?p=12988"},"modified":"2026-05-11T13:54:30","modified_gmt":"2026-05-11T11:54:30","slug":"nis2-directive-belgium","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/nis2-directive-belgium\/","title":{"rendered":"What NIS2 means for strict cybersecurity and how Combell is compliant"},"content":{"rendered":"<p><strong>The new European directive NIS2 (Network and Information Systems) introduces stricter requirements for cybersecurity. This directive aims to strengthen the digital resilience of essential and important entities. At Combell, cybersecurity is a top priority, and we are fully NIS2-compliant. But what does NIS2 mean for your organization?<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-9d400349     \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t><\/p>\n<div class=\"uagb-toc__wrap\">\n<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\t<strong>Table of contents<\/strong>\t\t\t\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox= \"0 0 384 512\"><path d=\"M192 384c-8.188 0-16.38-3.125-22.62-9.375l-160-160c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L192 306.8l137.4-137.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-160 160C208.4 380.9 200.2 384 192 384z\"><\/path><\/svg>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<div class=\"uagb-toc__list-wrap\">\n<ol class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#what-is-nis2\">What is NIS2?<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#technology-people-and-processes\">Technology, people, and processes<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#cyber-fundamentals-as-a-strong-foundation\">Cyber fundamentals as a strong foundation<\/a><\/li>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"uagb-toc__list\"><a href=\"#nis2-essential-vs-important-entities\">NIS2: Essential vs. Important Entities<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#investing-in-a-strong-cybersecurity-strategy-regardless-of-nis2\">Investing in a strong cybersecurity strategy, regardless of NIS2<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#how-to-determine-your-category\">How to determine your category<\/a><\/li>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"uagb-toc__list\"><a href=\"#what-does-nis2-mean-for-your-organization\">What does NIS2 mean for your organization?<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#consequences-of-ignoring-nis2-guidelines\">Consequences of ignoring NIS2 guidelines<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#how-to-become-nis2-compliant\">How to become NIS2-compliant<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#take-action-before-april-18-2026\">Take action before April 18, 2026<\/a><\/li>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"uagb-toc__list\"><a href=\"#combell-fully-nis2-compliant\">Combell fully NIS2-compliant<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#questions-about-combells-nis2-compliance\">Questions about Combell\u2019s NIS2 compliance?<\/a><\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n<\/ul>\n<\/ol><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What is NIS2?<\/h2>\n<p>NIS2 is an <strong>initiative by the European Union<\/strong>, launched by the European Commission, to improve cybersecurity across Europe. <a href=\"https:\/\/www.vlaio.be\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Read more on the VLAIO website.<\/a><\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-fdbc0397 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-af4a5307 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Objective: Strengthen the digital resilience of critical infrastructures and services and ensure they meet fundamental requirements.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Objective<\/strong>: Strengthen the digital resilience of critical infrastructures and services and ensure they meet fundamental requirements.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-aec2fcc5 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Reason: Increasing cyber threats and the need to better protect essential services.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Reason<\/strong>: Increasing cyber threats and the need to better protect essential services.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-0240a7a4 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Goal: Establish a uniform approach to cybersecurity across all EU member states.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Goal<\/strong>: Establish a uniform approach to cybersecurity across all EU member states.<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Technology, people, and processes<\/h3>\n<p>Entrepreneurs are understandably concerned about the impact of NIS2. The stricter regulations require investments in technology, personnel, and processes. <strong>This new framework goes far beyond its predecessor, NIS1.<\/strong><\/p>\n<p>Failing to comply with the NIS2 directive could result in <strong>hefty fines, reputational damage, and increased vulnerability <\/strong>to cyberattacks.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Cyber fundamentals as a strong foundation<\/h3>\n<p>In Belgium, NIS2 is closely linked to the so-called <strong>Cyber Fundamentals (CyFun\u00ae). These fundamentals <\/strong>are essential for building a robust cybersecurity strategy. This framework helps you:<\/p>\n<ol>\n<li><strong>Identify Risks<\/strong>: Understand the threats to your organization.<\/li>\n<li><strong>Enhance Security<\/strong>: Implement measures tailored to your sector.<\/li>\n<li><strong>Demonstrate Compliance<\/strong>: Prove NIS2 compliance through certification.<\/li>\n<\/ol>\n<p><em>The appropriate level (Important or Basic) is determined through a risk analysis.<\/em><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Regardless of the NIS2 guidelines, investing in a strong cybersecurity strategy now can save you significant headaches later.<\/p>\n<p><cite>Veerle Van Hecke \u2013 CISO at Combell<\/cite><\/p><\/blockquote>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">NIS2: Essential vs. Important Entities<\/h2>\n<p>NIS2 distinguishes between:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-d2bdb36f uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-5fe3771c uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Essential Entities: Organizations like energy companies, hospitals, and water suppliers. These entities face stricter requirements and more rigorous oversight.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Essential Entities<\/strong>: Organizations like energy companies, hospitals, and water suppliers. These entities face stricter requirements and more rigorous oversight.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-150e67cd uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Important Entities: Companies such as food producers and postal services. While they must meet specific requirements, the oversight is less intensive.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Important Entities<\/strong>: Companies such as food producers and postal services. While they must meet specific requirements, the oversight is less intensive.<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Investing in a strong cybersecurity strategy, regardless of NIS2<\/h3>\n<p>\u201cAlthough NIS2 applies to businesses in critical and important sectors, the directive also impacts companies not directly covered by it,\u201d says Veerle Van Hecke, Chief Information Security Officer at Combell.<\/p>\n<p>Veerle: \u2018Working with an NIS2-compliant organisation may mean that your security also has to meet the same conditions.<\/p>\n<p>As a result, NIS2 <strong>indirectly becomes the standard for many Flemish businesses.<\/strong> For some clients, it is sufficient to partner with an NIS2-compliant host like Combell.<\/p>\n<p>Investing in a robust cybersecurity strategy now is crucial. Regardless of NIS2 guidelines, it can save you significant headaches.\u201d<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/email-hacking-hacker-4.png\" alt=\"Inadequate security increases the risk of cyberattacks and data breaches.\" class=\"wp-image-28211\"\/><figcaption class=\"wp-element-caption\">Inadequate security increases the risk of cyberattacks and data breaches.<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">How to determine your category<\/h3>\n<p>While the directive is a significant step forward, many uncertainties remain regarding its implementation. Here\u2019s what you can do:<\/p>\n<ol>\n<li><strong>Use the quick start guide<\/strong>: The Centre for Cybersecurity Belgium (CCB) provides documentation such as a <a href=\"https:\/\/atwork.safeonweb.be\/tools-resources\/nis-2-quickstart-guide\" target=\"_blank\" rel=\"noreferrer noopener\">quick start guide <\/a>(\u2018Scope Test Tool\u2019).<\/li>\n<li><strong><a href=\"https:\/\/ccb.belgium.be\/contacts\" target=\"_blank\" rel=\"noreferrer noopener\">Contact the CCB<\/a><\/strong>: Seek advice from CCB experts.<\/li>\n<li><strong>Conduct a risk analysis<\/strong>: A Conformity Assessment Body (CAB) can help determine which rules apply to your organization.<\/li>\n<li><strong>Review the list of critical sectors<\/strong>: Some sectors already have <a href=\"https:\/\/atwork.safeonweb.be\/nis2\" target=\"_blank\" rel=\"noreferrer noopener\">specific guidelines<\/a> indicating whether your organization is considered essential or important.<\/li>\n<\/ol>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-4c9ae8fb uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">DORA guideline for the financial sector<\/p>\n<div class=\"uagb-notice-text\">\n<p>Do you work in the financial sector? If so, the Digital Operational Resilience Act <strong>(DORA<\/strong> ) directive applies. This directive emphasises operational resilience and specific security policies. <a href=\"https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en?prefLang=en\" target=\"_blank\" rel=\"noreferrer noopener\">Read more on the European Commission's website<\/a>.\u00a0<\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What does NIS2 mean for your organization?<\/h2>\n<p>Organisations required to take mandatory action <strong>must comply with the following obligations:<\/strong><\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-ba1af3b1 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-82f2471c uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Perform regular risk analyses.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Perform regular risk analyses.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-fcba5465 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Develop an information security policy.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Develop an information security policy.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-b0fdea15 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Report incidents promptly.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Report incidents promptly.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-b2b0ec72 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Demonstrate compliance through certifications.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Demonstrate compliance through certifications.<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>If you work with Combell as your hosting partner, you can be sure that all our systems and guidelines are NIS2-compliant.<\/p>\n<p><cite>Veerle Van Hecke - CISO at Combell<\/cite><\/p><\/blockquote>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Consequences of ignoring NIS2 guidelines<\/h3>\n<div class=\"wp-block-uagb-icon-list uagb-block-f6ac6186\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-d623fb76\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM168 232C154.7 232 144 242.7 144 256C144 269.3 154.7 280 168 280H344C357.3 280 368 269.3 368 256C368 242.7 357.3 232 344 232H168z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>High fines<\/strong>: You risk severe financial penalties, depending on the severity of the violation.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-090fab2a\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM168 232C154.7 232 144 242.7 144 256C144 269.3 154.7 280 168 280H344C357.3 280 368 269.3 368 256C368 242.7 357.3 232 344 232H168z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Reputational damage<\/strong>: Non-compliance can erode customer and partner trust.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-2cc20a21\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM168 232C154.7 232 144 242.7 144 256C144 269.3 154.7 280 168 280H344C357.3 280 368 269.3 368 256C368 242.7 357.3 232 344 232H168z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Security risks<\/strong>: Inadequate security increases the likelihood of cyberattacks and data breaches.<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">How to become NIS2-compliant<\/h3>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Option<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>CyFun\u00ae Certification<\/strong><\/td>\n<td>Independent assessment by a certified audit party.<\/td>\n<\/tr>\n<tr>\n<td><strong>ISO\/IEC 27001 Certification<\/strong><\/td>\n<td>Submit the scope and statement of applicability to the CCB.<\/td>\n<\/tr>\n<tr>\n<td><strong>CyFun\u00ae Self-Evaluation<\/strong><\/td>\n<td>Submit a self-assessment after conducting a risk analysis.<\/td>\n<\/tr>\n<tr>\n<td><strong>Information Security Policy<\/strong><\/td>\n<td>Assessment by the CCB inspection service.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/email-online-1.png\" alt=\"Combell actively collaborates with designated authorities to effectively roll out NIS2 guidelines in Belgium.\" class=\"wp-image-28212\"\/><figcaption class=\"wp-element-caption\">Combell actively collaborates with designated authorities to effectively roll out NIS2 guidelines in Belgium.<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Take action before April 18, 2026<\/h3>\n<ol>\n<li><strong>Conduct a Risk Analysis<\/strong>: Assess threats and vulnerabilities.<\/li>\n<li><strong>Choose a Certification Path<\/strong>: Opt for CyFun\u00ae or ISO\/IEC 27001.<\/li>\n<li><strong>Develop a Security Policy<\/strong>: Implement a robust policy within your organization.<\/li>\n<li><strong>Get Audited<\/strong>: A Conformity Assessment Body (CAB) conducts an independent audit.<\/li>\n<li><strong>Certify Your Organization<\/strong>: Ensure full certification by 2027.<\/li>\n<\/ol>\n<p>By April 18, 2026, you must have taken one of these steps. Certification must be completed by 2027.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Combell fully NIS2-compliant<\/h2>\n<p>\u201cCybersecurity is a <strong>top priority<\/strong> for Combell. If you partner with us as your cloud provider, you can rest assured that all our systems and guidelines are NIS2-compliant,\u201d says Combell-CISO Veerle Van Hecke.<\/p>\n<p>Combell holds several <strong>key certifications<\/strong>:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-53aa5e06 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-0c52a3ec uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"ISO 27001 Certification: Ensures secure information management and proper risk control. Your data is safe with Combell.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>ISO 27001 Certification<\/strong>: Ensures secure information management and proper risk control. Your data is safe with Combell.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-5281d66d uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"ISO 27701 Certification: Extends ISO 27001 with high-quality privacy management standards.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>ISO 27701 Certification<\/strong>: Extends ISO 27001 with high-quality privacy management standards.<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-63f88e68 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Also read<\/p>\n<div class=\"uagb-notice-text\">\n<p>These are all Combell's <a href=\"https:\/\/www.combell.com\/en\/about-combell\/iso-certificate-hosting\" target=\"_blank\" rel=\"noreferrer noopener\">ISO certificates<\/a>. <\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Questions about Combell\u2019s NIS2 compliance?<\/h3>\n<p>Do you have questions or want to learn more about how Combell meets all NIS2 requirements? Contact your <strong>account manager<\/strong>.<\/p>\n<p>Veerle Van Hecke: \u201cWe understand that NIS2 can feel like a digital maze. Not everything is clear yet. Know that we actively collaborate with designated authorities to roll out NIS2 as effectively as possible in Belgium.\u201d<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h4 class=\"wp-block-heading\">Key resources on NIS2:<\/h4>\n<ul>\n<li><a href=\"https:\/\/ccb.belgium.be\/regulation\/nis2\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2 Guidelines from the CCB<\/a><\/li>\n<li><a href=\"https:\/\/ccb.belgium.be\/sites\/default\/files\/NIS2%20FAQ%20Website%20v1.0%20EN.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FAQ on NIS2 in Belgium<\/a><\/li>\n<li><a href=\"https:\/\/atwork.safeonweb.be\/tools-resources\/cyberfundamentals-framework\/choosing-right-cyber-fundamentals-assurance-level-your-organisation\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Fundamentals Framework<\/a><\/li>\n<li><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"_blank\" rel=\"noreferrer noopener\">European Commission: NIS2 Overview<\/a><\/li>\n<\/ul>\n<p>We will keep you updated on changes and developments.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The new European directive NIS2 (Network and Information Systems) introduces stricter requirements for cybersecurity. This directive aims to strengthen the digital resilience of essential and important entities. At Combell, cybersecurity...<\/p>\n","protected":false},"author":33,"featured_media":12993,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[62,67],"tags":[1242],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small.jpg",1200,420,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-300x105.jpg",300,105,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-768x269.jpg",768,269,true],"large":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-1024x358.jpg",1024,358,true],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small.jpg",1200,420,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small.jpg",1200,420,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-850x290.jpg",850,290,true],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-750x256.jpg",750,256,true],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-850x290.jpg",850,290,true],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-485x165.jpg",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-375x128.jpg",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-guidelines-combell-header-small-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Amber","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/amber\/"},"uagb_comment_info":0,"uagb_excerpt":"The new European directive NIS2 (Network and Information Systems) introduces stricter requirements for cybersecurity. This directive aims to strengthen the digital resilience of essential and important entities. At Combell, cybersecurity...","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12988"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=12988"}],"version-history":[{"count":4,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12988\/revisions"}],"predecessor-version":[{"id":14169,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12988\/revisions\/14169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/12993"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=12988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=12988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=12988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}