{"id":47130,"date":"2024-08-01T10:33:00","date_gmt":"2024-08-01T08:33:00","guid":{"rendered":"https:\/\/stage2.convotis.com\/es\/?p=47130"},"modified":"2025-08-25T10:34:03","modified_gmt":"2025-08-25T08:34:03","slug":"nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa","status":"publish","type":"post","link":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/","title":{"rendered":"NIS2: Implementaci\u00f3n pr\u00e1ctica e impacto estrat\u00e9gico en su empresa"},"content":{"rendered":"<p data-start=\"175\" data-end=\"509\">El panorama de amenazas en IT evoluciona r\u00e1pidamente, al igual que la necesidad de estrategias de seguridad robustas. Aqu\u00ed entra en juego <strong data-start=\"313\" data-end=\"321\">NIS2<\/strong>, una directiva de la UE que busca establecer est\u00e1ndares de seguridad elevados y uniformes para redes y sistemas de informaci\u00f3n. Pero, \u00bfqu\u00e9 significa esto en la pr\u00e1ctica para su empresa?<\/p>\n<h2 data-start=\"511\" data-end=\"544\">Significado pr\u00e1ctico de NIS2<\/h2>\n<p data-start=\"546\" data-end=\"858\">NIS2 exige a las empresas afectadas desarrollar <strong data-start=\"594\" data-end=\"643\">procedimientos eficaces de gesti\u00f3n de riesgos<\/strong> e implementar <strong data-start=\"658\" data-end=\"718\">sistemas de notificaci\u00f3n de incidentes de ciberseguridad<\/strong>. Estas medidas no solo buscan mejorar la protecci\u00f3n frente a amenazas, sino tambi\u00e9n garantizar una respuesta r\u00e1pida en caso de incidente.<\/p>\n<h2 data-start=\"860\" data-end=\"885\">Lo que est\u00e1 en juego<\/h2>\n<p data-start=\"887\" data-end=\"1254\">El cumplimiento de la Directiva NIS2 es obligatorio. Las infracciones pueden acarrear multas de hasta <strong data-start=\"989\" data-end=\"1053\">10 millones de euros o el 2% de la facturaci\u00f3n anual mundial<\/strong>. Adem\u00e1s, las autoridades de supervisi\u00f3n pueden intervenir directamente para asegurar el cumplimiento. Esto subraya la importancia de contar con una infraestructura de seguridad s\u00f3lida en la empresa.<\/p>\n<h2 data-start=\"1256\" data-end=\"1289\">Respuesta r\u00e1pida obligatoria<\/h2>\n<p data-start=\"1291\" data-end=\"1368\">En caso de incidente de ciberseguridad, la actuaci\u00f3n inmediata es esencial:<\/p>\n<ul data-start=\"1369\" data-end=\"1479\">\n<li data-start=\"1369\" data-end=\"1417\">\n<p data-start=\"1371\" data-end=\"1417\"><strong data-start=\"1371\" data-end=\"1414\">Informe inicial en un plazo de 24 horas<\/strong>.<\/p>\n<\/li>\n<li data-start=\"1418\" data-end=\"1479\">\n<p data-start=\"1420\" data-end=\"1479\"><strong data-start=\"1420\" data-end=\"1476\">An\u00e1lisis detallado dentro de las 72 horas siguientes<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"1481\" data-end=\"1520\">Nuevas responsabilidades bajo NIS2<\/h2>\n<p data-start=\"1522\" data-end=\"1579\">Las empresas afectadas deben adoptar medidas concretas:<\/p>\n<ul data-start=\"1581\" data-end=\"2527\">\n<li data-start=\"1581\" data-end=\"1696\">\n<p data-start=\"1583\" data-end=\"1696\"><strong data-start=\"1583\" data-end=\"1620\">Optimizar evaluaciones de riesgo:<\/strong> procedimientos avanzados para identificar y mitigar riesgos de seguridad.<\/p>\n<\/li>\n<li data-start=\"1697\" data-end=\"1812\">\n<p data-start=\"1699\" data-end=\"1812\"><strong data-start=\"1699\" data-end=\"1743\">Implementar sistemas de alerta temprana:<\/strong> mecanismos para detectar y contener incidentes de forma inmediata.<\/p>\n<\/li>\n<li data-start=\"1813\" data-end=\"1905\">\n<p data-start=\"1815\" data-end=\"1905\"><strong data-start=\"1815\" data-end=\"1850\">Mantener resiliencia operativa:<\/strong> estrategias s\u00f3lidas de <em data-start=\"1874\" data-end=\"1882\">backup<\/em> y gesti\u00f3n de crisis.<\/p>\n<\/li>\n<li data-start=\"1906\" data-end=\"2035\">\n<p data-start=\"1908\" data-end=\"2035\"><strong data-start=\"1908\" data-end=\"1961\">Reforzar la seguridad de la cadena de suministro:<\/strong> garantizar est\u00e1ndares de seguridad consistentes en todos los eslabones.<\/p>\n<\/li>\n<li data-start=\"2036\" data-end=\"2132\">\n<p data-start=\"2038\" data-end=\"2132\"><strong data-start=\"2038\" data-end=\"2082\">Aumentar la concienciaci\u00f3n en seguridad:<\/strong> programas de formaci\u00f3n continua para empleados.<\/p>\n<\/li>\n<li data-start=\"2133\" data-end=\"2230\">\n<p data-start=\"2135\" data-end=\"2230\"><strong data-start=\"2135\" data-end=\"2171\">Proteger datos mediante cifrado:<\/strong> aplicar criptograf\u00eda avanzada para informaci\u00f3n sensible.<\/p>\n<\/li>\n<li data-start=\"2231\" data-end=\"2344\">\n<p data-start=\"2233\" data-end=\"2344\"><strong data-start=\"2233\" data-end=\"2267\">Endurecer controles de acceso:<\/strong> permisos estrictos y procedimientos de seguridad para personal y sistemas.<\/p>\n<\/li>\n<li data-start=\"2345\" data-end=\"2428\">\n<p data-start=\"2347\" data-end=\"2428\"><strong data-start=\"2347\" data-end=\"2376\">Modernizar autenticaci\u00f3n:<\/strong> procesos de autenticaci\u00f3n multifactor y continua.<\/p>\n<\/li>\n<li data-start=\"2429\" data-end=\"2527\">\n<p data-start=\"2431\" data-end=\"2527\"><strong data-start=\"2431\" data-end=\"2463\">Asegurar las comunicaciones:<\/strong> garantizar la seguridad de todos los canales de comunicaci\u00f3n.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"2529\" data-end=\"2552\">El papel de un SOC<\/h2>\n<p data-start=\"2554\" data-end=\"2957\">El establecimiento de un <strong data-start=\"2579\" data-end=\"2615\">Security Operations Center (SOC)<\/strong> resulta clave en este contexto. Un SOC es una unidad centralizada que monitoriza, analiza y responde a incidentes y amenazas cibern\u00e9ticas de manera continua. Con la entrada en vigor de NIS2 y sus requisitos m\u00e1s estrictos, la importancia de contar con un SOC eficaz para la seguridad de redes y datos empresariales se hace a\u00fan m\u00e1s evidente.<\/p>\n<h2 data-start=\"2959\" data-end=\"2974\">Conclusi\u00f3n<\/h2>\n<p data-start=\"2976\" data-end=\"3278\">La adaptaci\u00f3n a NIS2 no es solo una obligaci\u00f3n regulatoria, sino tambi\u00e9n una oportunidad para <strong data-start=\"3070\" data-end=\"3116\">reforzar la confianza de clientes y socios<\/strong>. Aproveche esta oportunidad para asegurar la competitividad de su empresa y garantizar la resiliencia de sus procesos de negocio frente a los retos del futuro.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El panorama de amenazas en IT evoluciona r\u00e1pidamente, al igual que la necesidad de estrategias de seguridad robustas. Aqu\u00ed entra en juego NIS2, una directiva de la UE que busca establecer est\u00e1ndares de seguridad elevados y uniformes para redes y sistemas de informaci\u00f3n. Pero, \u00bfqu\u00e9 significa esto en la pr\u00e1ctica para su empresa? Significado pr\u00e1ctico [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":28944,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[992],"tags":[],"class_list":["post-47130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIS2: Implementaci\u00f3n pr\u00e1ctica<\/title>\n<meta name=\"description\" content=\"La adaptaci\u00f3n a la NIS2 no solo es un requisito normativo, sino tambi\u00e9n una oportunidad para reforzar la confianza de sus clientes y socios.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2: Implementaci\u00f3n pr\u00e1ctica\" \/>\n<meta property=\"og:description\" content=\"La adaptaci\u00f3n a la NIS2 no solo es un requisito normativo, sino tambi\u00e9n una oportunidad para reforzar la confianza de sus clientes y socios.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/\" \/>\n<meta property=\"og:site_name\" content=\"CONVOTIS Iberia\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-01T08:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T08:34:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/08\/NIS2-Praktische-Umsetzung-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1090\" \/>\n\t<meta property=\"og:image:height\" content=\"670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"elianamoldovanska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"elianamoldovanska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/\"},\"author\":{\"name\":\"elianamoldovanska\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/person\\\/43069367f8f43b4689f544f0d1e798af\"},\"headline\":\"NIS2: Implementaci\u00f3n pr\u00e1ctica e impacto estrat\u00e9gico en su empresa\",\"datePublished\":\"2024-08-01T08:33:00+00:00\",\"dateModified\":\"2025-08-25T08:34:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/\"},\"wordCount\":471,\"publisher\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/08\\\/NIS2-Praktische-Umsetzung-.png\",\"articleSection\":[\"Security Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/\",\"name\":\"NIS2: Implementaci\u00f3n pr\u00e1ctica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/08\\\/NIS2-Praktische-Umsetzung-.png\",\"datePublished\":\"2024-08-01T08:33:00+00:00\",\"dateModified\":\"2025-08-25T08:34:03+00:00\",\"description\":\"La adaptaci\u00f3n a la NIS2 no solo es un requisito normativo, sino tambi\u00e9n una oportunidad para reforzar la confianza de sus clientes y socios.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/news\\\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/08\\\/NIS2-Praktische-Umsetzung-.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2024\\\/08\\\/NIS2-Praktische-Umsetzung-.png\",\"width\":1090,\"height\":670,\"caption\":\"Laptop on a desk displaying a NIS2 compliance diagram \u2013 representing practical implementation of the NIS2 directive in cybersecurity strategies.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"name\":\"CONVOTIS\",\"description\":\"For Europe&#039;s digital future.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\",\"name\":\"CONVOTIS\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"width\":2560,\"height\":411,\"caption\":\"CONVOTIS\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/convotis-gmbh\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/person\\\/43069367f8f43b4689f544f0d1e798af\",\"name\":\"elianamoldovanska\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"caption\":\"elianamoldovanska\"},\"sameAs\":[\"https:\\\/\\\/www.convotis.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIS2: Implementaci\u00f3n pr\u00e1ctica","description":"La adaptaci\u00f3n a la NIS2 no solo es un requisito normativo, sino tambi\u00e9n una oportunidad para reforzar la confianza de sus clientes y socios.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/","og_locale":"en_US","og_type":"article","og_title":"NIS2: Implementaci\u00f3n pr\u00e1ctica","og_description":"La adaptaci\u00f3n a la NIS2 no solo es un requisito normativo, sino tambi\u00e9n una oportunidad para reforzar la confianza de sus clientes y socios.","og_url":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/","og_site_name":"CONVOTIS Iberia","article_published_time":"2024-08-01T08:33:00+00:00","article_modified_time":"2025-08-25T08:34:03+00:00","og_image":[{"width":1090,"height":670,"url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/08\/NIS2-Praktische-Umsetzung-.png","type":"image\/png"}],"author":"elianamoldovanska","twitter_card":"summary_large_image","twitter_misc":{"Written by":"elianamoldovanska","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/#article","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/"},"author":{"name":"elianamoldovanska","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af"},"headline":"NIS2: Implementaci\u00f3n pr\u00e1ctica e impacto estrat\u00e9gico en su empresa","datePublished":"2024-08-01T08:33:00+00:00","dateModified":"2025-08-25T08:34:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/"},"wordCount":471,"publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"image":{"@id":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/08\/NIS2-Praktische-Umsetzung-.png","articleSection":["Security Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/","url":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/","name":"NIS2: Implementaci\u00f3n pr\u00e1ctica","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/#primaryimage"},"image":{"@id":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/08\/NIS2-Praktische-Umsetzung-.png","datePublished":"2024-08-01T08:33:00+00:00","dateModified":"2025-08-25T08:34:03+00:00","description":"La adaptaci\u00f3n a la NIS2 no solo es un requisito normativo, sino tambi\u00e9n una oportunidad para reforzar la confianza de sus clientes y socios.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/news\/nis2-implementacion-practica-e-impacto-estrategico-en-su-empresa\/#primaryimage","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/08\/NIS2-Praktische-Umsetzung-.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2024\/08\/NIS2-Praktische-Umsetzung-.png","width":1090,"height":670,"caption":"Laptop on a desk displaying a NIS2 compliance diagram \u2013 representing practical implementation of the NIS2 directive in cybersecurity strategies."},{"@type":"WebSite","@id":"https:\/\/www.convotis.com\/es\/#website","url":"https:\/\/www.convotis.com\/es\/","name":"CONVOTIS","description":"For Europe&#039;s digital future.","publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convotis.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.convotis.com\/es\/#organization","name":"CONVOTIS","url":"https:\/\/www.convotis.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","width":2560,"height":411,"caption":"CONVOTIS"},"image":{"@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/convotis-gmbh\/"]},{"@type":"Person","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af","name":"elianamoldovanska","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","caption":"elianamoldovanska"},"sameAs":["https:\/\/www.convotis.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/47130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/comments?post=47130"}],"version-history":[{"count":1,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/47130\/revisions"}],"predecessor-version":[{"id":47131,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/47130\/revisions\/47131"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media\/28944"}],"wp:attachment":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media?parent=47130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/categories?post=47130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/tags?post=47130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}