Logo
    • Hardware - Overview
      • Mobile Computing - Overview
      • Notebooks
      • Mobile Workstations
      • Mobile Thin Clients
      • Tablets
      • Smartphones & Mobile Phones
      • Wearables
      • Mobile Computing Warranties & Services
      • Mobile Computing Accessories
      • Mobile Computing Spare Parts
      • Communication & Conferencing - Overview
      • Conference Systems
      • VoIP Telephony
      • Headsets
      • Webcams
      • Communication Warranties & Services
      • Communication Accessories
      • IT Infrastructure - Overview
      • Servers
      • Storage
      • Uninterruptible Power Supply
      • Network
      • Security
      • Racks
      • IT Infrastructure Warranties & Services
      • IT Infrastructure Accessories
      • IT Infrastructure Spare Parts
      • Computing - Overview
      • PCs
      • Workstations
      • Thin Clients
      • All-in-One PCs
      • Point of Sale & Point of Information
      • Computing Warranties & Services
      • Computing Accessories
      • Peripherals - Overview
      • Monitors
      • Public Displays
      • Projectors
      • Input Devices
      • Audio, Photo & Video
      • Peripherals Warranties & Services
      • Peripherals Accessories
      • Printers & Scanners - Overview
      • Printers
      • Label Printers
      • Disc Duplicators
      • Scanners
      • Barcode Scanners
      • Mobile Data Collection
      • Consumables
      • Warranties & Services
      • Printer & Scanner Accessories
      • Printer Spare Parts
      • Components - Overview
      • SSDs & HDDs
      • Memory
      • Graphics Cards
      • Drives & Enclosures
      • Interfaces & Controllers
      • Storage Media
      • Power Supplies
      • Processors
      • Component Accessories
      • Connectivity - Overview
      • Network Connectivity
      • PC Connectivity
      • USB Connectivity
      • Power Connectivity
      • Phone Connectivity
      • Device Servers
      • Extenders & Splitters
      • Connectivity Accessories
      • Office Equipment - Overview
      • Organisation & Ergonomics
      • Smart Home
      • Cleaning Products
      • Safety, Security & Protection
      • Office Appliances
      • Mounting Solutions
      • Office Furniture
      • Batteries
      • Office Equipment Accessories
    • Software - Overview
      • Storage, Backup & Recovery - Overview
      • Backup, Recovery & Archiving
      • Security Software - Overview
      • Endpoint Security
      • E-mail Security
      • Security Suites
      • Mobile Security
      • Cloud Security
      • Gateway Security
      • Management & Training
      • Development Software - Overview
      • Project Management & Collaboration
      • Collaboration Software - Overview
      • Communication
      • Document Management
      • File Sharing
      • Office Applications - Overview
      • Office Software & Add-ons
      • Creative Design & Publishing
      • Infrastructure Software - Overview
      • Operating Systems
      • Monitoring & Reporting
      • Print Management
      • Optimisation
      • Virtualisation - Overview
      • Desktop Virtualisation
      • Infrastructure & Management
    • IT solutions - Overview
      • Data Centre - Overview
      • Multi Cloud
      • Software Defined Data Centre
      • Modular Data Centre Competence
      • Networking - Overview
      • Data Centre Networking
      • Enterprise Networking
      • Software-Defined Networking
      • Bechtle Networking Services
      • Cloud-Based Networking
      • IT Security - Overview
      • IT & Cyber Security
      • Data centre Security
      • Cloud Security
      • Application Security
      • Data protection in the company
      • Infrastructure & Perimeter Security
      • Modern Workplace - Overview
      • Modern Meeting Room
      • Communication and Collaboration
      • Mobile Working
      • Workplace Security
      • Managed Workplace Services
  • Clouds
    • IT Services - Overview
    • Managed Services
    • Financial Services
      • E-Procurement - Overview
      • My Bechtle
      • ERP Connection
      • Digital business documents
      • Quotes
      • Framework agreements
      • Special conditions
    • News - Overview
    • Newsroom
      • Bechtle Blog FR - Overview
      • Modern Workplace
      • Security
      • Infrastructure
      • Everything as a Service
      • Procurement
      • Corporate Social Responsibility
      • Bechtle Life
      • Corporate news - Overview
      • Press Releases
      • Downloadservice
      • Press Contact
    • Press releases France
    • Careers - Overview
    • Working for Bechtle
    • Development
    • Application process
    • Career Contact
    • Jobs
    • About Bechtle - Overview
      • Company - Overview
      • Management
      • Locations
      • Bechtle Group Companies
      • Company Development
      • Vision 2030
      • Certifications
      • Investors - Overview
      • Bechtle Share
      • Publications
      • Financial Calendar
      • General Meeting
      • Corporate Governance
      • Investors Contact
      • Retail Investors
      • Software revenue according to IFRS 15
    • Sustainability
      • International business with Bechtle - Overview
      • Global IT Alliance
      • Events - Overview
      • Latest events
      • Secteur public - Overview
      • Références
      • OCRE with Bechtle
    • Bechtle France
    • Contact
News
Bechtle Blog FR
Security
NIS2, CRA and DORA
cw06_mainbanner_blog-security-fr
Security - Feb 9, 2024

NIS2, CRA, DORA – What do the new cybersecurity directives entail?

It’s sometimes difficult to make head or tail of all of the acronyms relating to cybersecurity standards. NIS2, CRA, DORA—these are all directives and laws that are coming soon to reinforce enterprise cybersecurity.
In this article, we explain what the new acronyms shaping the cybersecurity landscape this year are all about.

NIS2 (Network and Information Security)

What is the principle objective? To elevate the level of digital security in France and beyond by enabling companies to better protect themselves against threats.

This overhauled NIS Directive builds on what NIS1 achieved and marks a substantial change on a national and EU level. Up against cybercriminals that are ever more successful and better equipped, compromising a greater number of organisations, the NIS2 directive expands the NIS objectives for increased and more extensive security.
 

What does the NIS2 Directive actually consist of in detail?

This Directive is important from a strategic point of view for EU members states as its implementation forces a large number of entities to better protect themselves. It will come into effect in the second half of 2024, allowing comprehensive mobilisation of the French economy and the public sector. Member state cooperation will also be strengthened in terms of cyber crisis management.

The NIS2 Directive now includes a proportionality mechanism that places entities into one of two categories depending on how critical they are—essential and important. This will be considered when defining appropriate and proportional requirements for both categories.

Another key element of the NIS2 that is different from the original directive is a stricter penalty system that applies to all concerned entities and will see fines imposed for infractions calculated as a percentage of the entities’ global annual revenue.
 

Who is the NIS2 Directive aimed at?

The Directive will apply to entities across more than 18 sectors on a national and international scale. Some 600 different types of entity will be affected, including all sizes of companies from SMEs and corporations to CAC40 corporate groups.

The supply chain, administrative offices, local and regional authorities, as well as digital stakeholders will also all be affected by the planned legislation. Increasingly targeted by cybercriminals, they will all need to boost their level of digital security.

To find out more about the NIS2 Directive, please read our guide on the subject.

READ THE NIS2 GUIDE 

 

CRA (Cyber Resilience Act)

In parallel to the NIS2 Directive, the President of the European Commission announced that new legislation on cyber resilience was being prepared—the Cyber Resilience Act (CRA).

Designed on the basis of the EU’s 2020 Cybersecurity Strategy, the CRA is set to introduce common cybersecurity rules for manufacturers and developers of products with digital components i.e. hardware and software. The objective is to protect consumers and companies from cybersecurity threats in their use of wired and networked equipment and software.  
 

What are the new obligations?

The series of measures have two main objectives. To reinforce product cybersecurity and boost the level of information available to consumers and companies..

The new measures will define:

  • Rules to adhere to when bringing to market products subject to the regulation on cybersecurity,
  • Manufacturer obligations spanning design through to product development and production;
  • Essential requirements that apply to manufacturers throughout the entire product lifecycle.
  • Information related to product security, technical support offered by the supplier, and installation of security updates, all of which will be required on all product documentation.

It should be highlighted that the legislator intends to monitor application of these new obligations. The plan is for member states to appoint market surveillance authorities responsible for ensuring the obligations of the CRA are upheld. These authorities’ power will be supported by the ability to impose fines equalling up to 2.5% of a company’s revenue or 15 million euros.

 

DORA (Digital Cyber Resilience Act)

What is DORA (Digital Cyber Resilience Act)?

This European regulation on operational digital resilience in the financial sector—DORA—is a law introduced by the European Commission to reinforce operational resilience in the EU’s financial sector.

DORA was created as a response to the growing digitalisation of the financial world and the need to manage the associated risks. It comprises 5 principle pillars—governance and risk management, which are crucial in an era where the financial sector has become a prime target for cybercriminals; incident reporting, resilience testing, management of third-party risk, and sharing of information.

Despite the urgency of the situation in terms of the threat, the European Commission has authorised a transition period of two years from 16 January 2023. Companies are therefore advised to start preparing to ensure compliance with the raft of measures which will come into force on 17 January 2025. Non-conformity could incur considerable financial sanctions.
 

Which entities will be affected?

DORA applies to virtually all financial entities in the European Union. This includes banks, of course, but also numerous other types of businesses (see Article 2).

 

For more information or support with a cybersecurity project, feel free to visit our website our get in touch with us.

  CONTACT US    VISIT OUR WEBSITE 

    This post was published on Feb 9, 2024.
    Brand shop
    Company
    Bechtle Locations
    Career
    Press
    Investor Relations
    Events
    Professional Equality Index (French)
    Delivery and Payment
    Help Centre
    Newsletter

    Facebook Bechtle Facebook Bechtle direct

    YouTube Bechtle YouTube Bechtle direct

    LinkedIn Bechtle LinkedIn Bechtle direct

    Instagram Bechtle Instagram Bechtle direct

    Products are sold exclusively to commercial end customers and the public sector.

    Prices in Euro plus VAT.

    Legal Notice Privacy Policy T&Cs
    Support-ID: 9164541cac
    © 2025 Bechtle AG