HomeCyber BalkansNIS2’s cybersecurity value extends beyond its broader reach

NIS2’s cybersecurity value extends beyond its broader reach

Published on

spot_img

In a recent interview with Computerworld Spain, Erik Prusch, the global CEO of ISACA, expressed his views on the anticipated impact of NIS2 in enhancing the security of organizations against cyberattacks, both within the EU and internationally.

Prusch commended NIS2 as a significant step towards ensuring the resilience of organizational infrastructure and promoting compliance with regulations for critical companies. He highlighted Europe’s leadership in technological regulation, emphasizing that the region’s initiatives could serve as a blueprint for other countries looking to enhance their cybersecurity frameworks. Prusch noted that several countries are already exploring ways to regulate their IT markets, a development that he viewed positively.

When comparing the regulatory approaches of Europe and the US in the IT sector, particularly regarding cybersecurity, Prusch acknowledged Europe’s strong performance in this area. He pointed out the complexities in the EU’s regulatory landscape, given the diverse nature of its member states. In contrast, Prusch noted that the US could learn from Europe’s example, especially in influencing other countries in the Americas and Canada to adopt similar regulatory measures.

Prusch emphasized the need for a coordinated and collaborative approach to cybersecurity regulation, stressing the importance of sharing best practices and lessons learned among countries. He suggested that the EU’s regulatory framework could serve as a model for the US and other nations seeking to strengthen their cybersecurity defenses.

Overall, Prusch’s insights underscored the significance of NIS2 in advancing cybersecurity efforts on a global scale. By leveraging the EU’s regulatory expertise and setting a strong example for other regions, organizations can enhance their resilience to cyber threats and ensure compliance with evolving regulatory requirements.

Source link

Latest articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

More like this

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...