{"id":4731,"date":"2025-10-28T04:36:22","date_gmt":"2025-10-28T04:36:22","guid":{"rendered":"https:\/\/www.trustlinks.com\/nis2\/"},"modified":"2026-03-20T13:45:01","modified_gmt":"2026-03-20T13:45:01","slug":"nis2","status":"publish","type":"page","link":"https:\/\/www.trustlinks.com\/es\/nis2\/","title":{"rendered":"Marco: NIS2"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4731\" class=\"elementor elementor-4731 elementor-718\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f8ae8d geo-targeted-element e-flex e-con-boxed e-con e-parent\" data-id=\"5f8ae8d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-60da76b e-con-full e-flex e-con e-child\" data-id=\"60da76b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c29945f elementor-widget elementor-widget-heading\" data-id=\"c29945f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Prep\u00e1rate para <br>NIS2<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de6dba4 e-flex e-con-boxed e-con e-parent\" data-id=\"de6dba4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2ef32a elementor-widget elementor-widget-heading\" data-id=\"c2ef32a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 es la Directiva NIS2?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-617bb69 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"617bb69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"770\" data-end=\"1041\">La Directiva de Seguridad de las Redes y de la Informaci\u00f3n (NIS2) es la ley de ciberseguridad actualizada de la UE, dise\u00f1ada para aumentar la resistencia digital en sectores esenciales e importantes. Establece requisitos de seguridad m\u00e1s estrictos, plazos m\u00e1s r\u00e1pidos para la notificaci\u00f3n de incidentes e introduce importantes sanciones por incumplimiento. <\/p><p data-start=\"1043\" data-end=\"1228\">Para muchas peque\u00f1as y medianas empresas, la NIS2 representa un cambio importante. Exige pol\u00edticas documentadas, procesos estructurados, responsabilidades claras y una gesti\u00f3n continua de los riesgos y los proveedores. La NIS2 entr\u00f3 en vigor a escala de la UE en enero de 2023, y el plazo para que los Estados miembros transpusieran la Directiva a la legislaci\u00f3n nacional finaliz\u00f3 el 17 de octubre de 2024. Ahora las organizaciones deben ser capaces de demostrar su cumplimiento, ya que las leyes locales se est\u00e1n implantando en toda Europa.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-597d0bc elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"597d0bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MzA3NywidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Solicita una Demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a83e0c e-flex e-con-boxed e-con e-parent\" data-id=\"2a83e0c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-64b44ad e-con-full e-flex e-con e-child\" data-id=\"64b44ad\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-64d4b53 e-con-full e-flex e-con e-child\" data-id=\"64d4b53\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66d716c elementor-widget elementor-widget-heading\" data-id=\"66d716c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQui\u00e9n debe cumplir con NIS2?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6bbd51 elementor-widget elementor-widget-heading\" data-id=\"c6bbd51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">NIS2 se aplica a las entidades esenciales e importantes de toda la UE. \nEsto incluye empresas de sectores como<\/p>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bdc841a e-con-full e-flex e-con e-child\" data-id=\"bdc841a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ed4cc27 e-con-full e-flex e-con e-child\" data-id=\"ed4cc27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f4f09c list-section feature-listing elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5f4f09c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Energ\u00eda, transporte, agua, residuos<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sanidad<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Infraestructura digital y servicios en la nube<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Gesti\u00f3n de servicios inform\u00e1ticos<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Administraci\u00f3n p\u00fablica<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Producci\u00f3n y suministro de alimentos<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-497a7f4 elementor-widget elementor-widget-text-editor\" data-id=\"497a7f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Un n\u00famero significativo de peque\u00f1as y medianas empresas entran en el \u00e1mbito del NIS2 porque prestan servicios digitales cr\u00edticos o apoyan las cadenas de suministro de organizaciones m\u00e1s grandes y reguladas.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d453ef5 e-con-full e-flex e-con e-child\" data-id=\"d453ef5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd133ab elementor-widget elementor-widget-image\" data-id=\"bd133ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"655\" src=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png\" class=\"attachment-large size-large wp-image-3824\" alt=\"Woman working at laptop in office.\" srcset=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png 1024w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-300x246.png 300w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-768x629.png 768w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1536x1258.png 1536w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-342d81c e-flex e-con-boxed e-con e-parent\" data-id=\"342d81c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-77ff26f e-con-full e-flex e-con e-child\" data-id=\"77ff26f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-eee1b53 e-con-full e-flex e-con e-child\" data-id=\"eee1b53\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-315c760 elementor-widget elementor-widget-image\" data-id=\"315c760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/elementor\/thumbs\/TL-image-shape-dots-3-3-rkelb63iy5pyramhmwsnj23zq1h3xd9kpbd4qrdees.png\" title=\"TL image shape dots (3)\" alt=\"TL image shape dots (3)\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe6ed57 e-con-full e-flex e-con e-child\" data-id=\"fe6ed57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77ccc9f elementor-widget elementor-widget-heading\" data-id=\"77ccc9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NIS2 afecta tambi\u00e9n a los proveedores y a las peque\u00f1as empresas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc1fd36 elementor-widget elementor-widget-text-editor\" data-id=\"fc1fd36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Incluso las empresas no clasificadas directamente en NIS2 pueden verse afectadas. Dado que NIS2 hace mucho hincapi\u00e9 en la seguridad de la cadena de suministro, las grandes organizaciones deben gestionar los riesgos de ciberseguridad de sus proveedores y prestadores de servicios. En consecuencia, a muchas empresas m\u00e1s peque\u00f1as se les pedir\u00e1 que demuestren procesos estructurados, controles documentados y una gesti\u00f3n b\u00e1sica de los riesgos.  <\/p><p>Trustlinks est\u00e1 dise\u00f1ado para facilitar esta tarea. Ayuda a los proveedores a mostrar las pr\u00e1cticas alineadas con NIS2 de forma clara y organizada, facilitando el cumplimiento de las expectativas de los clientes y el mantenimiento de la competitividad sin necesidad de un equipo dedicado al cumplimiento. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8af72d1 e-flex e-con-boxed e-con e-parent\" data-id=\"8af72d1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bf0b10b e-con-full e-flex e-con e-child\" data-id=\"bf0b10b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-7ee14c9 e-con-full e-flex e-con e-child\" data-id=\"7ee14c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-90e23ca elementor-widget elementor-widget-heading\" data-id=\"90e23ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Qu\u00e9 necesita NIS2<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f1cef6 e-con-full e-flex e-con e-child\" data-id=\"5f1cef6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30ec8bf e-con-full e-flex e-con e-child\" data-id=\"30ec8bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec244a8 list-section feature-listing elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ec244a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Evaluaci\u00f3n de riesgos y pol\u00edticas de seguridad<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detecci\u00f3n y respuesta a incidentes<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Continuidad de negocio y gesti\u00f3n de crisis<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Gesti\u00f3n del riesgo de la cadena de suministro y de los proveedores<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Arquitectura segura de redes y sistemas<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Autenticaci\u00f3n multifactor y control de acceso<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Gesti\u00f3n de vulnerabilidades y parches<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Formaci\u00f3n del personal y sensibilizaci\u00f3n cibern\u00e9tica<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7f3d82 elementor-widget elementor-widget-text-editor\" data-id=\"f7f3d82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2563\" data-end=\"2614\">Las organizaciones deben notificar los incidentes graves dentro de unos plazos estrictos: una alerta temprana en un plazo de 24 horas, una notificaci\u00f3n m\u00e1s detallada del incidente en un plazo de 72 horas y un informe final a m\u00e1s tardar un mes despu\u00e9s del incidente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-885bfed e-con-full e-flex e-con e-child\" data-id=\"885bfed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a32c338 elementor-widget elementor-widget-image\" data-id=\"a32c338\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"672\" src=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/TL-image-shape-dots-7-1-1024x860.png\" class=\"attachment-large size-large wp-image-4634\" alt=\"\" srcset=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/TL-image-shape-dots-7-1-1024x860.png 1024w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/TL-image-shape-dots-7-1-300x252.png 300w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/TL-image-shape-dots-7-1-768x645.png 768w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/TL-image-shape-dots-7-1-1536x1291.png 1536w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/TL-image-shape-dots-7-1.png 2034w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4c8cf4 e-flex e-con-boxed e-con e-parent\" data-id=\"b4c8cf4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b978005 elementor-widget elementor-widget-heading\" data-id=\"b978005\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cumplimiento, claridad y control<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e5f3e4 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2e5f3e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>La agencia de ciberseguridad de la UE informa de que muchas organizaciones de los sectores NIS2 siguen mostrando importantes lagunas de madurez y preparaci\u00f3n. Con el aumento de las amenazas y el endurecimiento de las normas, las herramientas de cumplimiento estructuradas ya no son opcionales, sino esenciales. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c68b29a e-flex e-con-boxed e-con e-parent\" data-id=\"c68b29a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e93cd49 e-con-full e-flex e-con e-child\" data-id=\"e93cd49\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e658a49 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e658a49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35cc7c1 elementor-widget elementor-widget-counter\" data-id=\"35cc7c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"300\" data-from-value=\"20\" data-delimiter=\",\">20<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">k<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bed662 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6bed662\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Las estimaciones sugieren que el n\u00famero de entidades de la UE con obligaciones de ciberseguridad aumentar\u00e1 de unas 20.000 a aproximadamente 300.000 con la NIS2.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95dc8c4 e-con-full e-flex e-con e-child\" data-id=\"95dc8c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fcb55c6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fcb55c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3762c0b elementor-widget elementor-widget-counter\" data-id=\"3762c0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"4.5\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">m<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08f91f8 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"08f91f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">El coste medio mundial de una violaci\u00f3n de datos alcanz\u00f3 unos 4,5 millones de euros en 2024.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb7d52b e-con-full e-flex e-con e-child\" data-id=\"cb7d52b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b24100 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1b24100\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78aca35 elementor-widget elementor-widget-counter\" data-id=\"78aca35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"2200\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb03891 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"eb03891\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Cada d\u00eda se producen m\u00e1s de 2.200 ciberataques en todo el mundo, aproximadamente un ataque cada 39 segundos.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de328ee e-flex e-con-boxed e-con e-parent\" data-id=\"de328ee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b361114 e-con-full e-flex e-con e-child\" data-id=\"b361114\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9b1c5cc e-con-full e-flex e-con e-child\" data-id=\"9b1c5cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-479840d elementor-widget elementor-widget-image\" data-id=\"479840d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"672\" src=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/12\/WhistlelinkObjectives_model321-1024x860.png\" class=\"attachment-large size-large wp-image-2217\" alt=\"NIS2 team discussion in a modern business environment.\" srcset=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/12\/WhistlelinkObjectives_model321-1024x860.png 1024w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/12\/WhistlelinkObjectives_model321-300x252.png 300w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/12\/WhistlelinkObjectives_model321-768x645.png 768w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/12\/WhistlelinkObjectives_model321-1536x1290.png 1536w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/12\/WhistlelinkObjectives_model321-2048x1720.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f881c24 e-con-full e-flex e-con e-child\" data-id=\"f881c24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f59456 elementor-widget elementor-widget-heading\" data-id=\"0f59456\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">El reto para las organizaciones<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05e48de elementor-widget elementor-widget-heading\" data-id=\"05e48de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Para las empresas, especialmente las peque\u00f1as y medianas, el cumplimiento del NIS2 crea obst\u00e1culos inmediatos:<\/p>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e6e0c3d e-con-full e-flex e-con e-child\" data-id=\"e6e0c3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-61dff90 e-con-full e-flex e-con e-child\" data-id=\"61dff90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a258584 list-section feature-listing elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a258584\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">No hay un equipo dedicado al cumplimiento o la seguridad<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Tiempo limitado para comprender los requisitos legales detallados<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Documentos dispersos y responsabilidades poco claras<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dificultad para evaluar los riesgos o gestionar a los proveedores<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">No existe un marco para las obligaciones de informaci\u00f3n<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Presi\u00f3n de los clientes que exigen pruebas de cumplimiento de las obligaciones de informaci\u00f3n<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Graves consecuencias econ\u00f3micas en caso de incumplimiento, con multas de hasta 10 millones de euros o el 2% de la facturaci\u00f3n anual global para las entidades esenciales.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-769a85e e-flex e-con-boxed e-con e-parent\" data-id=\"769a85e\" data-element_type=\"container\" data-e-type=\"container\" id=\"compliance\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aacacb7 e-con-full e-flex e-con e-child\" data-id=\"aacacb7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ecd0d46 e-con-full e-flex e-con e-child\" data-id=\"ecd0d46\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a7a92 elementor-widget elementor-widget-heading\" data-id=\"d5a7a92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consigue la conformidad NIS2 con Trustlinks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-178f835 elementor-widget elementor-widget-text-editor\" data-id=\"178f835\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Trustlinks traduce los complejos requisitos de NIS2 en pasos claros y pr\u00e1cticos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e696cb tab_width elementor-widget elementor-widget-jet-tabs\" data-id=\"3e696cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_position&quot;:&quot;left&quot;,&quot;tabs_position_mobile&quot;:&quot;top&quot;,&quot;tabs_position_tablet&quot;:&quot;top&quot;,&quot;no_active_tabs&quot;:&quot;false&quot;}\" data-widget_type=\"jet-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"jet-tabs jet-tabs-position-left jet-tabs-move-up-effect  \" data-settings=\"{&quot;activeIndex&quot;:0,&quot;event&quot;:&quot;click&quot;,&quot;autoSwitch&quot;:false,&quot;autoSwitchDelay&quot;:3000,&quot;ajaxTemplate&quot;:false,&quot;tabsPosition&quot;:&quot;left&quot;,&quot;switchScrolling&quot;:false,&quot;switchScrollingOffset&quot;:0}\">\n\t\t\t\t\t\t<div style=\"min-width:50%; min-width:50%;width:50%;flex:0 0 50%;\" class=\"jet-tabs__control-wrapper\" role=\"tablist\">\n\n                                    <div id=\"jet-tabs-control-6541\" class=\"jet-tabs__control jet-tabs__control-icon-left elementor-menu-anchor active-tab \" data-tab=\"1\" tabindex=\"0\" role=\"tab\" aria-controls=\"jet-tabs-content-6541\" aria-expanded=\"true\" data-template-id=\"false\"><div class=\"jet-tabs__control-inner\"><div class=\"jet-tabs__label-icon jet-tabs-icon\"><svg class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/div><div class=\"jet-tabs__label-text\">Marco NIS2 listo para usar<\/div><\/div><\/div><div id=\"jet-tabs-control-6542\" class=\"jet-tabs__control jet-tabs__control-icon-left elementor-menu-anchor  \" data-tab=\"2\" tabindex=\"0\" role=\"tab\" aria-controls=\"jet-tabs-content-6542\" aria-expanded=\"false\" data-template-id=\"false\"><div class=\"jet-tabs__control-inner\"><div class=\"jet-tabs__label-icon jet-tabs-icon\"><svg class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/div><div class=\"jet-tabs__label-text\">Flujo de trabajo guiado y responsabilidad del equipo<\/div><\/div><\/div><div id=\"jet-tabs-control-6543\" class=\"jet-tabs__control jet-tabs__control-icon-left elementor-menu-anchor  \" data-tab=\"3\" tabindex=\"0\" role=\"tab\" aria-controls=\"jet-tabs-content-6543\" aria-expanded=\"false\" data-template-id=\"false\"><div class=\"jet-tabs__control-inner\"><div class=\"jet-tabs__label-icon jet-tabs-icon\"><svg class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/div><div class=\"jet-tabs__label-text\">Gesti\u00f3n de riesgos y proveedores integrada<\/div><\/div><\/div><div id=\"jet-tabs-control-6544\" class=\"jet-tabs__control jet-tabs__control-icon-left elementor-menu-anchor  \" data-tab=\"4\" tabindex=\"0\" role=\"tab\" aria-controls=\"jet-tabs-content-6544\" aria-expanded=\"false\" data-template-id=\"false\"><div class=\"jet-tabs__control-inner\"><div class=\"jet-tabs__label-icon jet-tabs-icon\"><svg class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/div><div class=\"jet-tabs__label-text\">Documentaci\u00f3n y pruebas centralizadas<\/div><\/div><\/div><div id=\"jet-tabs-control-6545\" class=\"jet-tabs__control jet-tabs__control-icon-left elementor-menu-anchor  \" data-tab=\"5\" tabindex=\"0\" role=\"tab\" aria-controls=\"jet-tabs-content-6545\" aria-expanded=\"false\" data-template-id=\"false\"><div class=\"jet-tabs__control-inner\"><div class=\"jet-tabs__label-icon jet-tabs-icon\"><svg class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/div><div class=\"jet-tabs__label-text\">Informes de incidentes y resultados listos para la auditor\u00eda<\/div><\/div><\/div>\n                    \t\t\t    <\/div>\n\t\t\t<div class=\"jet-tabs__content-wrapper\">\n\t\t\t\t<div id=\"jet-tabs-content-6541\" class=\"jet-tabs__content active-content\" data-tab=\"1\" role=\"tabpanel\" aria-hidden=\"false\" data-template-id=\"false\"><p>Empieza con una configuraci\u00f3n clara, estructurada e intuitiva, alineada con los requisitos de NIS2, que incluya controles predefinidos, plantillas de pol\u00edticas y orientaci\u00f3n sobre documentaci\u00f3n.<\/p>\n<p>Esto ayuda a tu empresa a ponerse en marcha r\u00e1pidamente sin necesidad de profundos conocimientos de cumplimiento. Nada de adivinanzas, todo est\u00e1 dispuesto en un flujo claro y l\u00f3gico para que tu equipo sepa exactamente por d\u00f3nde empezar. <\/p>\n<\/div><div id=\"jet-tabs-content-6542\" class=\"jet-tabs__content \" data-tab=\"2\" role=\"tabpanel\" aria-hidden=\"true\" data-template-id=\"false\"><p>Cada requisito se desglosa en tareas pr\u00e1cticas explicadas paso a paso de forma clara.<\/p>\n<p>Puedes asignar responsabilidades y tareas a tus compa\u00f1eros, fijar plazos y seguir el progreso desde un solo lugar. Los recordatorios autom\u00e1ticos mantienen a todo el mundo al d\u00eda, haciendo del cumplimiento una responsabilidad compartida por toda la organizaci\u00f3n. <\/p>\n<\/div><div id=\"jet-tabs-content-6543\" class=\"jet-tabs__content \" data-tab=\"3\" role=\"tabpanel\" aria-hidden=\"true\" data-template-id=\"false\"><p>Trustlinks incluye herramientas f\u00e1ciles de usar para identificar y evaluar los riesgos, hacer un seguimiento de las actividades de mitigaci\u00f3n y documentar las mejoras a lo largo del tiempo.<\/p>\n<p>La supervisi\u00f3n de los proveedores forma parte del flujo de trabajo, ayud\u00e1ndote a registrar las evaluaciones, hacer un seguimiento de las acciones y demostrar la supervisi\u00f3n de la cadena de suministro, todas ellas expectativas centrales de NIS2.<\/p>\n<\/div><div id=\"jet-tabs-content-6544\" class=\"jet-tabs__content \" data-tab=\"4\" role=\"tabpanel\" aria-hidden=\"true\" data-template-id=\"false\"><p>Todos tus registros de cumplimiento en un espacio seguro y organizado, incluyendo pol\u00edticas, controles, revisiones, datos de proveedores y archivos de pruebas.<\/p>\n<p>Trustlinks te ayuda a mantener una pista de auditor\u00eda clara que refleje tus continuos esfuerzos de cumplimiento y mantenga a tu organizaci\u00f3n preparada para comprobaciones internas o solicitudes externas.<\/p>\n<\/div><div id=\"jet-tabs-content-6545\" class=\"jet-tabs__content \" data-tab=\"5\" role=\"tabpanel\" aria-hidden=\"true\" data-template-id=\"false\"><p>Trustlinks apoya tu trabajo de gesti\u00f3n de incidentes con flujos de trabajo de informes guiados y plantillas que te ayudan a preparar alertas tempranas, notificaciones a las 72 horas y documentaci\u00f3n de seguimiento cuando sea necesario.<\/p>\n<p>Cuando las partes interesadas soliciten pruebas de tu estado de cumplimiento, puedes generar informes estructurados y profesionales que ofrezcan una visi\u00f3n clara del progreso, los controles y las tareas pendientes<\/p>\n<\/div>\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d37281 e-con-full e-flex e-con e-child\" data-id=\"4d37281\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61dae3c elementor-widget elementor-widget-image\" data-id=\"61dae3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"727\" src=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/meeting-04-1024x930.png\" class=\"attachment-large size-large wp-image-1853\" alt=\"Team discussion on strengthening organisational accountability.\" srcset=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/meeting-04-1024x930.png 1024w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/meeting-04-300x272.png 300w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/meeting-04-768x697.png 768w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/meeting-04-1536x1395.png 1536w, https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/meeting-04-2048x1859.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5489fdb e-flex e-con-boxed e-con e-parent\" data-id=\"5489fdb\" data-element_type=\"container\" data-e-type=\"container\" id=\"book-a-meeting\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c256ea1 e-con-full e-flex e-con e-child\" data-id=\"c256ea1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-91ac720 e-con-full e-flex e-con e-child\" data-id=\"91ac720\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0a1e86b e-con-full e-flex e-con e-child\" data-id=\"0a1e86b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fc5698 elementor-widget elementor-widget-heading\" data-id=\"5fc5698\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Prep\u00e1rate para NIS2<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c52c7f2 e-con-full e-flex e-con e-child\" data-id=\"c52c7f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0523c53 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0523c53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Si tienes preguntas sobre Trustlinks o quieres explorar c\u00f3mo nuestra plataforma apoya tu trabajo de cumplimiento de NIS2, ponte en contacto con nosotros y nuestro equipo estar\u00e1 encantado de ayudarte.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dbbc0b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dbbc0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa76ce6 e-con-full e-flex e-con e-child\" data-id=\"aa76ce6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-986f155 e-con-full e-flex e-con e-child\" data-id=\"986f155\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8062236 e-con-full e-flex e-con e-child\" data-id=\"8062236\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1aa8d80 elementor-widget elementor-widget-image\" data-id=\"1aa8d80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/elementor\/thumbs\/Maria-2-rcnlkcztt6ocr9inan9vhzn7272zq49dba57rhfi8w.png\" title=\"Maria-2.png\" alt=\"Portrait of Maria Boboc, Territory Manager at Trustlinks.\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e20ad9 elementor-widget elementor-widget-text-editor\" data-id=\"3e20ad9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Maria Boboc<br \/>Tel. <a href=\"tel:900752496\"><span data-olk-copy-source=\"MessageBody\">900 752 496<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0953122 e-con-full e-flex e-con e-child\" data-id=\"0953122\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93bc074 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"93bc074\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"mailto:maria.boboc@trustlinks.com\">maria.boboc@trustlinks.com<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47c379b e-con-full e-flex e-con e-child\" data-id=\"47c379b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6bd8e4 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"f6bd8e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.trustlinks.com\/es\/producto\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Explora Trustlinks<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05ba079 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"05ba079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MzA3NywidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Solicitar una Demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aac664b e-flex e-con-boxed e-con e-parent\" data-id=\"aac664b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-98bff1d e-con-full e-flex e-con e-child\" data-id=\"98bff1d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36dcbe0 elementor-widget elementor-widget-heading\" data-id=\"36dcbe0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Preguntas frecuentes sobre el cumplimiento de NIS2<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82ea905 e-con-full e-flex e-con e-child\" data-id=\"82ea905\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9e08865 e-con-full e-flex e-con e-child\" data-id=\"9e08865\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d92e4e elementor-widget elementor-widget-n-accordion\" data-id=\"6d92e4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1140\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1140\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfQu\u00e9 es la Directiva NIS2 y por qu\u00e9 es importante? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1140\" class=\"elementor-element elementor-element-503e914 e-con-full e-flex e-con e-child\" data-id=\"503e914\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1140\" class=\"elementor-element elementor-element-2710563 e-flex e-con-boxed e-con e-child\" data-id=\"2710563\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49f63a7 elementor-widget elementor-widget-text-editor\" data-id=\"49f63a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>NIS2 es la directiva actualizada de la UE sobre ciberseguridad, dise\u00f1ada para reforzar la resistencia digital en sectores esenciales e importantes. Introduce controles de seguridad m\u00e1s estrictos, supervisi\u00f3n de la cadena de suministro, plazos de notificaci\u00f3n de incidentes y sanciones por incumplimiento. Cualquier organizaci\u00f3n de un sector regulado, o que suministre a uno, debe conocer sus requisitos.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1141\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1141\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfQui\u00e9n debe cumplir con NIS2? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1141\" class=\"elementor-element elementor-element-8f242dc e-con-full e-flex e-con e-child\" data-id=\"8f242dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1141\" class=\"elementor-element elementor-element-c5d8fc0 e-flex e-con-boxed e-con e-child\" data-id=\"c5d8fc0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9004b7b elementor-widget elementor-widget-text-editor\" data-id=\"9004b7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>NIS2 se aplica a organizaciones medianas y grandes de sectores como la energ\u00eda, el transporte, la sanidad, los servicios digitales, las finanzas y la administraci\u00f3n p\u00fablica. Las empresas m\u00e1s peque\u00f1as tambi\u00e9n pueden verse afectadas indirectamente si prestan servicios a entidades cubiertas por la directiva, ya que la ciberseguridad de la cadena de suministro es ahora un requisito clave. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1142\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1142\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfCu\u00e1les son los principales requisitos de cumplimiento con NIS2? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1142\" class=\"elementor-element elementor-element-4e36a23 e-con-full e-flex e-con e-child\" data-id=\"4e36a23\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1142\" class=\"elementor-element elementor-element-930e0c9 e-flex e-con-boxed e-con e-child\" data-id=\"930e0c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b2319 elementor-widget elementor-widget-text-editor\" data-id=\"11b2319\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>NIS2 exige a las organizaciones que apliquen la gesti\u00f3n de riesgos de ciberseguridad, la detecci\u00f3n y notificaci\u00f3n de incidentes, el control de acceso, el cifrado, la continuidad de la actividad, la supervisi\u00f3n de riesgos de los proveedores y la formaci\u00f3n peri\u00f3dica. Las organizaciones deben documentar sus procesos y demostrar su cumplimiento a los reguladores cuando se les solicite. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1143\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1143\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfQu\u00e9 ocurre si mi organizaci\u00f3n no cumple con NIS2? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1143\" class=\"elementor-element elementor-element-5f3c2bb e-con-full e-flex e-con e-child\" data-id=\"5f3c2bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1143\" class=\"elementor-element elementor-element-23d182d e-flex e-con-boxed e-con e-child\" data-id=\"23d182d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ba3c8e elementor-widget elementor-widget-text-editor\" data-id=\"0ba3c8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>El incumplimiento puede dar lugar a investigaciones reglamentarias, medidas correctoras obligatorias, riesgo para la reputaci\u00f3n y multas administrativas. Para las entidades esenciales, las multas pueden alcanzar hasta 10 millones de euros o el 2% de la facturaci\u00f3n anual global, mientras que las entidades importantes pueden enfrentarse a multas de hasta 7 millones de euros o el 1,4% de la facturaci\u00f3n anual global. <\/p><p>La direcci\u00f3n puede ser considerada responsable por no aplicar las medidas de ciberseguridad adecuadas. Un cumplimiento estricto tambi\u00e9n reduce el riesgo de incidentes cibern\u00e9ticos e interrupciones del servicio. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1144\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1144\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfC\u00f3mo ayuda Trustlinks a las organizaciones a cumplir los requisitos de NIS2? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1144\" class=\"elementor-element elementor-element-715c84b e-con-full e-flex e-con e-child\" data-id=\"715c84b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1144\" class=\"elementor-element elementor-element-edc9eb2 e-flex e-con-boxed e-con e-child\" data-id=\"edc9eb2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6906bfd elementor-widget elementor-widget-text-editor\" data-id=\"6906bfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Trustlinks proporciona un marco de cumplimiento guiado con flujos de trabajo predefinidos, plantillas de documentaci\u00f3n, almacenamiento de pruebas, herramientas de gesti\u00f3n de proveedores y orientaci\u00f3n paso a paso. Esto ayuda a las organizaciones a comprender los requisitos, aplicar los controles de forma eficaz y demostrar el cumplimiento de forma transparente. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1145\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1145\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfNIS2 requiere documentaci\u00f3n espec\u00edfica? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1145\" class=\"elementor-element elementor-element-a8847de e-con-full e-flex e-con e-child\" data-id=\"a8847de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1145\" class=\"elementor-element elementor-element-8e413eb e-flex e-con-boxed e-con e-child\" data-id=\"8e413eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-210e040 elementor-widget elementor-widget-text-editor\" data-id=\"210e040\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>S\u00ed. Las organizaciones deben mantener pruebas claras de los controles de ciberseguridad, planes de respuesta a incidentes, evaluaciones de riesgos, evaluaciones de proveedores y procedimientos de informaci\u00f3n. Trustlinks centraliza toda la documentaci\u00f3n en un solo lugar, lo que facilita su actualizaci\u00f3n y la demostraci\u00f3n del cumplimiento.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1146\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1146\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfNecesitan las peque\u00f1as organizaciones preocuparse por NIS2? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1146\" class=\"elementor-element elementor-element-afb2d00 e-con-full e-flex e-con e-child\" data-id=\"afb2d00\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1146\" class=\"elementor-element elementor-element-cf0c7e8 e-flex e-con-boxed e-con e-child\" data-id=\"cf0c7e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ce67a5 elementor-widget elementor-widget-text-editor\" data-id=\"4ce67a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Aunque no est\u00e9n directamente reguladas, las peque\u00f1as empresas a menudo tienen que cumplir las expectativas de seguridad relacionadas con NIS2 cuando trabajan con socios m\u00e1s grandes. En la actualidad, muchas empresas solicitan a los proveedores pruebas de las medidas de ciberseguridad. Trustlinks hace que este proceso sea sencillo y estructurado.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"\\u00bfQu\\u00e9 es la Directiva NIS2 y por qu\\u00e9 es importante?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"NIS2 es la directiva actualizada de la UE sobre ciberseguridad, dise\\u00f1ada para reforzar la resistencia digital en sectores esenciales e importantes. Introduce controles de seguridad m\\u00e1s estrictos, supervisi\\u00f3n de la cadena de suministro, plazos de notificaci\\u00f3n de incidentes y sanciones por incumplimiento. Cualquier organizaci\\u00f3n de un sector regulado, o que suministre a uno, debe conocer sus requisitos.\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfQui\\u00e9n debe cumplir con NIS2?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"NIS2 se aplica a organizaciones medianas y grandes de sectores como la energ\\u00eda, el transporte, la sanidad, los servicios digitales, las finanzas y la administraci\\u00f3n p\\u00fablica. Las empresas m\\u00e1s peque\\u00f1as tambi\\u00e9n pueden verse afectadas indirectamente si prestan servicios a entidades cubiertas por la directiva, ya que la ciberseguridad de la cadena de suministro es ahora un requisito clave.\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfCu\\u00e1les son los principales requisitos de cumplimiento con NIS2?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"NIS2 exige a las organizaciones que apliquen la gesti\\u00f3n de riesgos de ciberseguridad, la detecci\\u00f3n y notificaci\\u00f3n de incidentes, el control de acceso, el cifrado, la continuidad de la actividad, la supervisi\\u00f3n de riesgos de los proveedores y la formaci\\u00f3n peri\\u00f3dica. Las organizaciones deben documentar sus procesos y demostrar su cumplimiento a los reguladores cuando se les solicite.\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfQu\\u00e9 ocurre si mi organizaci\\u00f3n no cumple con NIS2?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"El incumplimiento puede dar lugar a investigaciones reglamentarias, medidas correctoras obligatorias, riesgo para la reputaci\\u00f3n y multas administrativas. Para las entidades esenciales, las multas pueden alcanzar hasta 10 millones de euros o el 2% de la facturaci\\u00f3n anual global, mientras que las entidades importantes pueden enfrentarse a multas de hasta 7 millones de euros o el 1,4% de la facturaci\\u00f3n anual global. La direcci\\u00f3n puede ser considerada responsable por no aplicar las medidas de ciberseguridad adecuadas. Un cumplimiento estricto tambi\\u00e9n reduce el riesgo de incidentes cibern\\u00e9ticos e interrupciones del servicio.\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfC\\u00f3mo ayuda Trustlinks a las organizaciones a cumplir los requisitos de NIS2?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Trustlinks proporciona un marco de cumplimiento guiado con flujos de trabajo predefinidos, plantillas de documentaci\\u00f3n, almacenamiento de pruebas, herramientas de gesti\\u00f3n de proveedores y orientaci\\u00f3n paso a paso. Esto ayuda a las organizaciones a comprender los requisitos, aplicar los controles de forma eficaz y demostrar el cumplimiento de forma transparente.\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfNIS2 requiere documentaci\\u00f3n espec\\u00edfica?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"S\\u00ed. Las organizaciones deben mantener pruebas claras de los controles de ciberseguridad, planes de respuesta a incidentes, evaluaciones de riesgos, evaluaciones de proveedores y procedimientos de informaci\\u00f3n. Trustlinks centraliza toda la documentaci\\u00f3n en un solo lugar, lo que facilita su actualizaci\\u00f3n y la demostraci\\u00f3n del cumplimiento.\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfNecesitan las peque\\u00f1as organizaciones preocuparse por NIS2?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Aunque no est\\u00e9n directamente reguladas, las peque\\u00f1as empresas a menudo tienen que cumplir las expectativas de seguridad relacionadas con NIS2 cuando trabajan con socios m\\u00e1s grandes. En la actualidad, muchas empresas solicitan a los proveedores pruebas de las medidas de ciberseguridad. Trustlinks hace que este proceso sea sencillo y estructurado.\"}}]}<\/script>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Prep\u00e1rate para NIS2 \u00bfQu\u00e9 es la Directiva NIS2? La Directiva de Seguridad de las Redes y de la Informaci\u00f3n (NIS2) es la ley de ciberseguridad actualizada de la UE, dise\u00f1ada para aumentar la resistencia digital en sectores esenciales e importantes. Establece requisitos de seguridad m\u00e1s estrictos, plazos m\u00e1s r\u00e1pidos para la notificaci\u00f3n de incidentes e [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4731","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cumplimiento de la Directiva de Seguridad de las Redes y de la Informaci\u00f3n (NIS2) | Trustlinks<\/title>\n<meta name=\"description\" content=\"Consigue la conformidad con NIS2 con Trustlinks. Simplifica los requisitos complejos con flujos de trabajo claros, documentos centralizados y orientaci\u00f3n paso a paso.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trustlinks.com\/es\/nis2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Marco: NIS2\" \/>\n<meta property=\"og:description\" content=\"Consigue la conformidad con NIS2 con Trustlinks. Simplifica los requisitos complejos con flujos de trabajo claros, documentos centralizados y orientaci\u00f3n paso a paso.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trustlinks.com\/es\/nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustlinks\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-20T13:45:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trustlinks.com\/es\/nis2\/\",\"url\":\"https:\/\/www.trustlinks.com\/es\/nis2\/\",\"name\":\"Cumplimiento de la Directiva de Seguridad de las Redes y de la Informaci\u00f3n (NIS2) | Trustlinks\",\"isPartOf\":{\"@id\":\"https:\/\/www.trustlinks.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.trustlinks.com\/es\/nis2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.trustlinks.com\/es\/nis2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png\",\"datePublished\":\"2025-10-28T04:36:22+00:00\",\"dateModified\":\"2026-03-20T13:45:01+00:00\",\"description\":\"Consigue la conformidad con NIS2 con Trustlinks. Simplifica los requisitos complejos con flujos de trabajo claros, documentos centralizados y orientaci\u00f3n paso a paso.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trustlinks.com\/es\/nis2\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trustlinks.com\/es\/nis2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.trustlinks.com\/es\/nis2\/#primaryimage\",\"url\":\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png\",\"contentUrl\":\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trustlinks.com\/es\/nis2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trustlinks.com\/es\/inicio\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Marco: NIS2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trustlinks.com\/es\/#website\",\"url\":\"https:\/\/www.trustlinks.com\/es\/\",\"name\":\"Trustlinks\",\"description\":\"Clarity. Control. Continuous compliance.\",\"publisher\":{\"@id\":\"https:\/\/www.trustlinks.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trustlinks.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trustlinks.com\/es\/#organization\",\"name\":\"Trustlinks\",\"url\":\"https:\/\/www.trustlinks.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.trustlinks.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/Trustlinks_logo_dark.png\",\"contentUrl\":\"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/Trustlinks_logo_dark.png\",\"width\":1634,\"height\":190,\"caption\":\"Trustlinks\"},\"image\":{\"@id\":\"https:\/\/www.trustlinks.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/trustlinks-compliance\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cumplimiento de la Directiva de Seguridad de las Redes y de la Informaci\u00f3n (NIS2) | Trustlinks","description":"Consigue la conformidad con NIS2 con Trustlinks. Simplifica los requisitos complejos con flujos de trabajo claros, documentos centralizados y orientaci\u00f3n paso a paso.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trustlinks.com\/es\/nis2\/","og_locale":"es_ES","og_type":"article","og_title":"Marco: NIS2","og_description":"Consigue la conformidad con NIS2 con Trustlinks. Simplifica los requisitos complejos con flujos de trabajo claros, documentos centralizados y orientaci\u00f3n paso a paso.","og_url":"https:\/\/www.trustlinks.com\/es\/nis2\/","og_site_name":"Trustlinks","article_modified_time":"2026-03-20T13:45:01+00:00","og_image":[{"url":"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trustlinks.com\/es\/nis2\/","url":"https:\/\/www.trustlinks.com\/es\/nis2\/","name":"Cumplimiento de la Directiva de Seguridad de las Redes y de la Informaci\u00f3n (NIS2) | Trustlinks","isPartOf":{"@id":"https:\/\/www.trustlinks.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.trustlinks.com\/es\/nis2\/#primaryimage"},"image":{"@id":"https:\/\/www.trustlinks.com\/es\/nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png","datePublished":"2025-10-28T04:36:22+00:00","dateModified":"2026-03-20T13:45:01+00:00","description":"Consigue la conformidad con NIS2 con Trustlinks. Simplifica los requisitos complejos con flujos de trabajo claros, documentos centralizados y orientaci\u00f3n paso a paso.","breadcrumb":{"@id":"https:\/\/www.trustlinks.com\/es\/nis2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trustlinks.com\/es\/nis2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.trustlinks.com\/es\/nis2\/#primaryimage","url":"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png","contentUrl":"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2026\/03\/Trustlinks_Shape-6-1024x838.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.trustlinks.com\/es\/nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trustlinks.com\/es\/inicio\/"},{"@type":"ListItem","position":2,"name":"Marco: NIS2"}]},{"@type":"WebSite","@id":"https:\/\/www.trustlinks.com\/es\/#website","url":"https:\/\/www.trustlinks.com\/es\/","name":"Trustlinks","description":"Clarity. Control. Continuous compliance.","publisher":{"@id":"https:\/\/www.trustlinks.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trustlinks.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.trustlinks.com\/es\/#organization","name":"Trustlinks","url":"https:\/\/www.trustlinks.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.trustlinks.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/Trustlinks_logo_dark.png","contentUrl":"https:\/\/www.trustlinks.com\/wp-content\/uploads\/2025\/10\/Trustlinks_logo_dark.png","width":1634,"height":190,"caption":"Trustlinks"},"image":{"@id":"https:\/\/www.trustlinks.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/trustlinks-compliance\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.trustlinks.com\/es\/wp-json\/wp\/v2\/pages\/4731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trustlinks.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trustlinks.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trustlinks.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trustlinks.com\/es\/wp-json\/wp\/v2\/comments?post=4731"}],"version-history":[{"count":7,"href":"https:\/\/www.trustlinks.com\/es\/wp-json\/wp\/v2\/pages\/4731\/revisions"}],"predecessor-version":[{"id":5505,"href":"https:\/\/www.trustlinks.com\/es\/wp-json\/wp\/v2\/pages\/4731\/revisions\/5505"}],"wp:attachment":[{"href":"https:\/\/www.trustlinks.com\/es\/wp-json\/wp\/v2\/media?parent=4731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}