{"id":7053,"date":"2025-03-26T15:16:56","date_gmt":"2025-03-26T15:16:56","guid":{"rendered":"https:\/\/www.remoteengineer.eu\/our-approach-on-nis2-and-how-we-comply\/"},"modified":"2026-03-25T12:33:11","modified_gmt":"2026-03-25T12:33:11","slug":"our-approach-on-nis2-and-how-we-comply","status":"publish","type":"page","link":"https:\/\/www.remoteengineer.eu\/en\/our-approach-on-nis2-and-how-we-comply\/","title":{"rendered":"Our NIS2 Approach &amp; Compliance"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-no-small-visibility\" style=\"--awb-font-size:64px;--awb-line-height:1;--awb-letter-spacing:var(--awb-typography1-letter-spacing);--awb-text-transform:var(--awb-typography1-text-transform);--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Our NIS2 Approach &amp; Compliance<\/p>\n<\/div><div class=\"fusion-text fusion-text-2 fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-font-size:48px;--awb-line-height:1;--awb-letter-spacing:var(--awb-typography1-letter-spacing);--awb-text-transform:var(--awb-typography1-text-transform);--awb-text-font-family:&quot;Montserrat&quot;;--awb-text-font-style:normal;--awb-text-font-weight:700;\"><p>Our NIS2 Approach &amp; Compliance<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\"><p><strong>The new European NIS2 directive sets stricter requirements for cybersecurity within critical sectors and digital service providers. We fully support this development. Our approach combines NIS2 with recognized standards such as ISO\/IEC 27001 and IEC 62443-4. Not only to comply with legislation, but to make our organization, supply chain and customers more resilient.   <\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><h2>Our Position<\/h2>\n<p>We fall under the category of <strong>Essential \/ Significant Entity<\/strong> according to NIS2. That classification brings with it clear obligations. We are ready for that. We do not see NIS2 as a burden, but as an opportunity to structurally strengthen our cyber security. By combining it with the risk-based approach of ISO 27001 and the technical depth of IEC 62443-4, we are building a strong and future-proof foundation.<\/p>\n<\/div><div class=\"fusion-text fusion-text-5\"><h2>This is how we ensure compliance<\/h2>\n<p>Our cybersecurity approach rests on three pillars:<\/p>\n<ul>\n<li><strong>NIS2:<\/strong> Legislation and obligations around risk management, incident reporting and chain security.<\/li>\n<li><strong>ISO\/IEC 27001:<\/strong> A certified information security system that ensures continuous risk management and improvements.<\/li>\n<li><strong>IEC 62443-4:<\/strong> Industry standard for cybersecurity in OT environments (operational technology).<\/li>\n<\/ul>\n<h3>Specifically:<\/h3>\n<ol>\n<li><strong>Risk Management and Governance<\/strong><br \/>\nOur information security is <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.remoteengineer.eu\/en\/about-remote\/#ISO27001\">ISO 27001 certified<\/a><\/span>. Risks are periodically assessed and addressed. Cybersecurity is managed at the executive level and is part of our broader risk management.  <\/li>\n<li><strong>Secure Development and Systems<\/strong><br \/>\nFor our OT environments, we follow IEC 62443-4-1 (secure development) and 62443-4-2 (system security). <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.remoteengineer.eu\/en\/solutions\/software\/\">Security is integrated into the design from the start<\/a><\/span>.<\/li>\n<li><strong>Incident detection and notification<\/strong><br \/>\nWe have 24\/7 monitoring and clear response procedures. We comply with NIS2 notification requirements and regularly test our processes with realistic scenarios. <\/li>\n<li><strong>Security of the Chain<\/strong><br \/>\nSuppliers and partners are tested for their security level. We apply requirements based on ISO 27001 and &#8211; where relevant &#8211; IEC 62443. <\/li>\n<li><strong>Continuity and Recovery<\/strong><br \/>\nWe have business continuity and recovery plans that are regularly tested. These are aligned with ISO 27001 as well as adapted for OT risks. <\/li>\n<li><strong>Technical Security Measures<\/strong><br \/>\nWe use strong authentication, segmentation, encryption and monitoring. Everything is aligned with ISO 27001 and IEC 62443-4-2 and monitored regularly. <\/li>\n<li><strong>Awareness and Training<\/strong><br \/>\nEveryone in the organization plays a role in cybersecurity. We structurally provide training and specific sessions for IT and OT teams. <\/li>\n<li><strong>Audit and Improvement<\/strong><br \/>\nWe document everything carefully and are always audit-ready. Our approach is focused on continuous improvement, not just minimum compliance. <\/li>\n<\/ol>\n<\/div><div class=\"fusion-text fusion-text-6\"><h2>Looking Ahead<\/h2>\n<p>Cybersecurity is a strategic priority. By working according to NIS2, ISO 27001 and IEC 62443-4, we not only ensure compliance &#8211; we actively strengthen the resilience of our organization.<br \/>\nThis is not a cost, but an investment in stability, continuity and trust.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-color6);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-size:cover;--awb-border-radius:6px 6px 6px 6px;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color6);--awb-border-color:var(--awb-color1);--awb-background-color:var(--awb-color6);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color1);--awb-toggle-active-accent-color:var(--awb-color1);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:18px;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-7053-1\"><div class=\"fusion-panel panel-default panel-e7b1852303cc37ad7 fusion-toggle-no-divider\" style=\"--awb-title-text-transform:none;--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><h2 class=\"panel-title toggle\" id=\"toggle_e7b1852303cc37ad7\"><a aria-expanded=\"false\" aria-controls=\"e7b1852303cc37ad7\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-7053-1\" data-target=\"#e7b1852303cc37ad7\" href=\"#e7b1852303cc37ad7\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-arrow-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-arrow-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is NIS2?<\/span><\/a><\/h2><\/div><div id=\"e7b1852303cc37ad7\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e7b1852303cc37ad7\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span style=\"color: #ffffff;\">NIS2 stands for the &#8220;Network and Information Security Directive 2&#8221;, a European directive adopted in 2022 that builds upon the original NIS directive from 2016. The aim of NIS2 is to improve cybersecurity and operational resilience of essential and important sectors within the EU. This is particularly important given the increasing threat of cyberattacks.  <\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-e90f9e9a276c53ae1 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h2 class=\"panel-title toggle\" id=\"toggle_e90f9e9a276c53ae1\"><a aria-expanded=\"false\" aria-controls=\"e90f9e9a276c53ae1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-7053-1\" data-target=\"#e90f9e9a276c53ae1\" href=\"#e90f9e9a276c53ae1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-arrow-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-arrow-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What are the Main Obligations under the NIS2 Directive?<\/span><\/a><\/h2><\/div><div id=\"e90f9e9a276c53ae1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e90f9e9a276c53ae1\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<ol>\n<li><span style=\"color: #ffffff;\"><strong>Broader scope<\/strong>: The directive applies not only to critical infrastructure such as energy, transport, and healthcare sectors, but also to many more &#8220;important&#8221; sectors including digital infrastructure, waste management, food production, and even government services.<\/span><\/li>\n<li><span style=\"color: #ffffff;\"><strong>Stricter security requirements<\/strong>: Organizations falling under NIS2 must comply with stricter requirements in risk management, security measures, incident reporting, and supply chain security.<\/span><\/li>\n<li><span style=\"color: #ffffff;\"><strong>Supervision and enforcement<\/strong>: Member States must designate supervisory authorities to monitor compliance with NIS2, and fines can be imposed for non-compliance.<\/span><\/li>\n<li><span style=\"color: #ffffff;\"><strong>Harmonization within the EU<\/strong>: NIS2 ensures more uniform rules across all EU countries, reducing differences in security requirements between countries.<\/span><\/li>\n<li><span style=\"color: #ffffff;\"><strong>Reporting obligations<\/strong>: Organizations must report cyber incidents within a certain timeframe (for example, an initial notification within 24 hours) to enable rapid response.<\/span><\/li>\n<\/ol>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-34ba80993756f3754 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h2 class=\"panel-title toggle\" id=\"toggle_34ba80993756f3754\"><a aria-expanded=\"false\" aria-controls=\"34ba80993756f3754\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-7053-1\" data-target=\"#34ba80993756f3754\" href=\"#34ba80993756f3754\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-arrow-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-arrow-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">When Does NIS2 Come into Effect?<\/span><\/a><\/h2><\/div><div id=\"34ba80993756f3754\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_34ba80993756f3754\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span style=\"color: #ffffff;\">EU member states must transpose NIS2 into national legislation by October <strong>2024<\/strong>, so organizations in relevant sectors have until then to prepare.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-7fe5e95ca49f90cf5 fusion-toggle-no-divider\" style=\"--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color8);\"><div class=\"panel-heading\"><h2 class=\"panel-title toggle\" id=\"toggle_7fe5e95ca49f90cf5\"><a aria-expanded=\"false\" aria-controls=\"7fe5e95ca49f90cf5\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-7053-1\" data-target=\"#7fe5e95ca49f90cf5\" href=\"#7fe5e95ca49f90cf5\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-arrow-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-arrow-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Further Reading about NIS2<\/span><\/a><\/h2><\/div><div id=\"7fe5e95ca49f90cf5\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7fe5e95ca49f90cf5\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span style=\"color: #ffffff;\">For more <a style=\"color: #ffffff;\" href=\"https:\/\/www.ncsc.nl\/over-ncsc\/wettelijke-taak\/wat-gaat-de-nis2-richtlijn-betekenen-voor-uw-organisatie\" target=\"_blank\" rel=\"noopener\">information on NIS2, visit the NCSC<\/a><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7053","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2 Approach &amp; Compliance | Remote Engineer<\/title>\n<meta name=\"description\" content=\"How does Remote comply with the NIS2 directive? Read all about our NIS2 approach, ISO 27001 certification, and the security of our industrial systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.remoteengineer.eu\/en\/our-approach-on-nis2-and-how-we-comply\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 Approach &amp; Compliance | Remote Engineer\" \/>\n<meta property=\"og:description\" content=\"How does Remote comply with the NIS2 directive? Read all about our NIS2 approach, ISO 27001 certification, and the security of our industrial systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.remoteengineer.eu\/en\/our-approach-on-nis2-and-how-we-comply\/\" \/>\n<meta property=\"og:site_name\" content=\"Remote Engineer\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T12:33:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.remoteengineer.eu\/wp-content\/uploads\/2024\/06\/Remote-Engineer.png\" \/>\n\t<meta property=\"og:image:width\" content=\"440\" \/>\n\t<meta property=\"og:image:height\" content=\"93\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/our-approach-on-nis2-and-how-we-comply\\\/\",\"url\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/our-approach-on-nis2-and-how-we-comply\\\/\",\"name\":\"NIS2 Approach & Compliance | Remote Engineer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/#website\"},\"datePublished\":\"2025-03-26T15:16:56+00:00\",\"dateModified\":\"2026-03-25T12:33:11+00:00\",\"description\":\"How does Remote comply with the NIS2 directive? Read all about our NIS2 approach, ISO 27001 certification, and the security of our industrial systems.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/our-approach-on-nis2-and-how-we-comply\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/\",\"name\":\"Remote Engineer\",\"description\":\"Industri\u00eble oplossingen voor remote access | Remote Engineer\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/#organization\"},\"alternateName\":\"Remote\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/#organization\",\"name\":\"Remote Engineer\",\"alternateName\":\"Remote\",\"url\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.remoteengineer.eu\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/logo_remote_engineer.png\",\"contentUrl\":\"https:\\\/\\\/www.remoteengineer.eu\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/logo_remote_engineer.png\",\"width\":460,\"height\":200,\"caption\":\"Remote Engineer\"},\"image\":{\"@id\":\"https:\\\/\\\/www.remoteengineer.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/nl.linkedin.com\\\/company\\\/remote-engineer\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 Approach & Compliance | Remote Engineer","description":"How does Remote comply with the NIS2 directive? Read all about our NIS2 approach, ISO 27001 certification, and the security of our industrial systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.remoteengineer.eu\/en\/our-approach-on-nis2-and-how-we-comply\/","og_locale":"en_US","og_type":"article","og_title":"NIS2 Approach & Compliance | Remote Engineer","og_description":"How does Remote comply with the NIS2 directive? Read all about our NIS2 approach, ISO 27001 certification, and the security of our industrial systems.","og_url":"https:\/\/www.remoteengineer.eu\/en\/our-approach-on-nis2-and-how-we-comply\/","og_site_name":"Remote Engineer","article_modified_time":"2026-03-25T12:33:11+00:00","og_image":[{"width":440,"height":93,"url":"https:\/\/www.remoteengineer.eu\/wp-content\/uploads\/2024\/06\/Remote-Engineer.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.remoteengineer.eu\/en\/our-approach-on-nis2-and-how-we-comply\/","url":"https:\/\/www.remoteengineer.eu\/en\/our-approach-on-nis2-and-how-we-comply\/","name":"NIS2 Approach & Compliance | Remote Engineer","isPartOf":{"@id":"https:\/\/www.remoteengineer.eu\/en\/#website"},"datePublished":"2025-03-26T15:16:56+00:00","dateModified":"2026-03-25T12:33:11+00:00","description":"How does Remote comply with the NIS2 directive? Read all about our NIS2 approach, ISO 27001 certification, and the security of our industrial systems.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.remoteengineer.eu\/en\/our-approach-on-nis2-and-how-we-comply\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.remoteengineer.eu\/en\/#website","url":"https:\/\/www.remoteengineer.eu\/en\/","name":"Remote Engineer","description":"Industri\u00eble oplossingen voor remote access | Remote Engineer","publisher":{"@id":"https:\/\/www.remoteengineer.eu\/en\/#organization"},"alternateName":"Remote","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.remoteengineer.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.remoteengineer.eu\/en\/#organization","name":"Remote Engineer","alternateName":"Remote","url":"https:\/\/www.remoteengineer.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.remoteengineer.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.remoteengineer.eu\/wp-content\/uploads\/2024\/05\/logo_remote_engineer.png","contentUrl":"https:\/\/www.remoteengineer.eu\/wp-content\/uploads\/2024\/05\/logo_remote_engineer.png","width":460,"height":200,"caption":"Remote Engineer"},"image":{"@id":"https:\/\/www.remoteengineer.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/nl.linkedin.com\/company\/remote-engineer"]}]}},"yoast_meta":{"yoast_wpseo_title":"","yoast_wpseo_metadesc":"","yoast_wpseo_canonical":""},"_links":{"self":[{"href":"https:\/\/www.remoteengineer.eu\/en\/wp-json\/wp\/v2\/pages\/7053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.remoteengineer.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.remoteengineer.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.remoteengineer.eu\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.remoteengineer.eu\/en\/wp-json\/wp\/v2\/comments?post=7053"}],"version-history":[{"count":19,"href":"https:\/\/www.remoteengineer.eu\/en\/wp-json\/wp\/v2\/pages\/7053\/revisions"}],"predecessor-version":[{"id":28914,"href":"https:\/\/www.remoteengineer.eu\/en\/wp-json\/wp\/v2\/pages\/7053\/revisions\/28914"}],"wp:attachment":[{"href":"https:\/\/www.remoteengineer.eu\/en\/wp-json\/wp\/v2\/media?parent=7053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}