The EU’s NIS2 Directive (Network and Information Security Directive) imposes significant requirements on the cybersecurity of critical and essential infrastructures. Companies subject to this directive must implement several measures to ensure the security of their networks and information. This Expert View describes the steps required to comply with NIS2 and provides some technical examples and recommendations.
SHARE :
This short vendor profile provides a quick overview of the local portfolio and performance of Capgemini in France. We analyze the background, ...
Event Date : November 06, 2024
PAC has done an in-depth analysis of 24 leading providers of SAP-related services in Europe and Germany, evaluating them in 16 different RADAR ...
Event Date : March 06, 2024
This Excel document positions and ranks the major software and IT services suppliers by revenue in Romania
Event Date : July 11, 2025
The term “5G campus network” refers to a geographically limited, local mobile network adapted to special requirements such as industrial ...
Event Date : March 02, 2022
This Vendor Positioning provides a comparative positioning of the 20 leading IT services vendors in Germany.
Event Date : October 28, 2024
CxO Survey - Investment Priorities - Detailed Datamart - Poland
Datamart September 08, 2025
CxO Survey - Investment Priorities - InSight Analysis - Poland
CxO Survey September 08, 2025
AlmavivA - Figures - Worldwide - FY 31-Dec-2024
Datamart September 04, 2025
AlmavivA - Vendor Profile - Worldwide
Vendor Profile September 04, 2025
LTIMindtree - Figures - Worldwide - FY 31-Mar-2025
Datamart September 04, 2025
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Adobe’s LLM Optimizer: Why Generative Engine Optimization (GEO) Matters for Enterprises
Blog Post September 03, 2025
Part 6: The Human Side of GRC: Why Governance, Risk, and Compliance Must Live in Your Culture
Blog Post September 02, 2025
AT&T's Acquisition Of Ecostar's Spectrum - "Use It Or Lose It"
Blog Post August 28, 2025
Part 5: From Policy to Practice: Operationalizing Cybersecurity Governance, Risk and Compliance
Blog Post August 26, 2025
Part 4: GRC in Context: How Cybersecurity Governance, Risk, and Compliance Varies by Industry
Blog Post August 19, 2025