{"id":38942,"date":"2026-02-13T06:11:06","date_gmt":"2026-02-13T11:11:06","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=38942"},"modified":"2026-02-13T07:11:51","modified_gmt":"2026-02-13T12:11:51","slug":"nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/","title":{"rendered":"NIS2 and CER Serve a Broader Purpose Than Cybersecurity &#8211; The 5 Biggest Risks You Need to Address Now"},"content":{"rendered":"<div class=\"inner_content\">\n<p>The European directives <a class=\"link\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"blank\">NIS2 (Network and Information Security Directive 2)<\/a> and Critical Entities Resilience (CER) Directive have rapidly sharpened the conversation around digital resilience. While many organizations initially viewed these directives as an extension of their cybersecurity obligations, it is becoming increasingly clear that much more is at stake. These directives require a strategic transformation in how organizations manage risks, processes, and responsibilities. They compel CIOs, IT managers, and other IT leaders not only to reassess their security strategies to prevent data loss, but also to rethink their role as guardians of continuity, transparency, and trust. In short, resilience goes beyond cybersecurity.<\/p>\n<p>In this blog, I\u2019ll highlight the five biggest risks organizations must address in light of NIS2 and CER, and explain how focusing on these areas leads to a stronger, future-proof digital foundation.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_NIS2_and_CER\"><\/span>What are NIS2 and CER?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As \u201cdirectives\u201d, NIS2 and CER provide goals and objectives that EU member states must achieve. These require transposition into national law by each member state, allowing flexibility in how the objectives are met.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"NIS2\"><\/span>NIS2<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The NIS2 Directive establishes a unified legal framework to uphold cybersecurity in 18 critical sectors across the EU. It also calls on Member States to define national cybersecurity strategies and collaborate with the EU for cross-border reaction and enforcement.<\/p>\n<p>Here, in the Netherlands, the NIS2 directive is being implemented into national legislation through the Cybersecurity Act (<a class=\"link\" href=\"https:\/\/www.tweedekamer.nl\/kamerstukken\/wetsvoorstellen\/detail?cfg=wetsvoorsteldetails&amp;qry=wetsvoorstel%3A36764\" target=\"blank\">Cyberbeveiligingswet \u2013 Cbw<\/a>). Its goal is to create greater consistency and coherence in European network and information security policy by increasing digital resilience and reducing the impact of cyber incidents.<\/p>\n<p>Learn more: <a class=\"link\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"blank\">NIS2 Directive: securing network and information systems | Shaping Europe\u2019s digital future<\/a>.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"CER\"><\/span>CER<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The <a class=\"link\" href=\"https:\/\/home-affairs.ec.europa.eu\/news\/critical-entities-resilience-directive-enters-application-ensure-protection-critical-infrastructure-2024-10-23_en#:~:text=The%20new%20Directive%20replaces%20the,public%20administration%2C%20space%20and%20food.\" target=\"blank\">CER directive<\/a> is designed to ensure that organizations delivering essential services, in 11 key sectors, can continue operating during major disruptions. It focuses on strengthening resilience not only against cyber threats, but also against physical, operational, and environmental risks such as natural disasters, supply-chain failures, terrorism, or system outages.<\/p>\n<p>The CER directive is being implemented in the Netherlands through the Critical Entities Resilience Act (<a class=\"link\" href=\"https:\/\/www.eerstekamer.nl\/wetsvoorstel\/36765_wet_weerbaarheid_kritieke\" target=\"blank\">Wet weerbaarheid kritieke entiteiten \u2013 Wwke<\/a>). The purpose of this law is to increase the resilience of organizations that provide essential services in the Netherlands.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-38963 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-compliance-banner.jpg\" alt=\"Clickable banner to access a blog titled &quot;What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance&quot; \" width=\"850\" height=\"180\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-compliance-banner.jpg 850w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-compliance-banner-300x64.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-compliance-banner-768x163.jpg 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-compliance-banner-800x169.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-compliance-banner-310x66.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-compliance-banner-140x30.jpg 140w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_5_Biggest_Risks_You_Need_to_Address_Now_for_NIS2_and_CER\"><\/span>The 5 Biggest Risks You Need to Address Now for NIS2 and CER<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"margin-bottom: 15px;\">I\u2019ll now cover the 5 key risks associated with the NIS2 and CER directives that you need to consider, namely:<\/p>\n<ol>\n<li>Governance and responsibility<\/li>\n<li>Business continuity<\/li>\n<li>Supply chain responsibility<\/li>\n<li>Compliance and transparency<\/li>\n<li>Trust and reputation<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Risk_1_-_Governance_and_Responsibility_From_Compliance_to_Demonstrable_Control\"><\/span>Risk #1 &#8211; Governance and Responsibility: From Compliance to Demonstrable Control<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-38953 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/Governance-icon-1.png\" alt=\"icon representing governance for NIS2 and CER\" width=\"121\" height=\"103\" \/>One of the most discussed aspects of NIS2 is that responsibility for cyber resilience is explicitly placed with executive management, and that individual board members can be held personally liable. While CER does not (as yet) prescribe legal or personal liability for directors in the same way, boards are still required to take ownership and provide policy-level direction for digital resilience.<\/p>\n<p>Executives and boards can no longer shield themselves behind the IT organization or external suppliers. They must demonstrate active governance, oversight, and an understanding of risks at a strategic level.<\/p>\n<p>For IT leaders, this represents a fundamental shift: from operational executor to strategic advisor and risk manager. This raises an unavoidable question: how does an IT leader demonstrate that they are truly \u201cin control\u201d? This is where a major risk lies. When responsibilities are unclear and governance structures are insufficient, blind spots emerge that make organizations vulnerable.<\/p>\n<p>A mature governance structure begins with clear roles and accountability. Everyone must know who makes decisions, who provides oversight, and how incidents are escalated. A shared language between IT, security, legal teams, and executive leadership is essential to understand and manage risks effectively. Transparency in decision-making and risk acceptance is not optional; it is a strategic necessity.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risk_2_Business_Continuity_-_Resilience_as_a_Core_Capability\"><\/span>Risk #2: Business Continuity &#8211; Resilience as a Core Capability<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-38955 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/Resilience-icon-2.png\" alt=\"icon representing business continuity for NIS2 and CER\" width=\"118\" height=\"117\" \/>Both NIS2 and CER emphasize operational continuity and resilience: the ability of organizations to continue delivering essential services even under disruptive conditions. Cybersecurity, business continuity planning, and disaster recovery are no longer optional\u2014they are core elements of operational strategy.<\/p>\n<p>Business continuity under NIS2 and CER is not just about recovery after an incident, but also about preventing outages and minimizing recovery time. Organizations cannot respond effectively if they lack real-time insight into what is failing. Those with visibility into critical processes, systems, and services are far better equipped to withstand disruptions.<\/p>\n<p>This requires investment in proactive detection and scenario-based stress testing. The future of resilience lies in continuous awareness\u2014the ability to see where threats are emerging before users are impacted.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risk_3_Supply_Chain_Responsibility_-_The_Weakest_Link_Determines_Resilience\"><\/span>Risk #3: Supply Chain Responsibility &#8211; The Weakest Link Determines Resilience<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-38956 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/Responsibility-icon-3.png\" alt=\"icon representing supply chain continuity for NIS2 and CER\" width=\"121\" height=\"109\" \/>Under NIS2 and CER, responsibility extends beyond the boundaries of the organization itself. Suppliers, partners, and IT service providers are explicitly included in risk assessments. Organizations remain responsible for the security of their supply chain and must gain visibility and control through screening, monitoring, and contractual obligations.<\/p>\n<p>A significant risk lies in hidden dependencies. Many organizations do not fully understand which third parties have access to their core systems or data. CIOs and IT managers must therefore develop a holistic view of their digital ecosystem. This requires data-driven insight into dependencies, vulnerabilities, and performance across external parties.<\/p>\n<p>Supply chain transparency becomes not only a compliance requirement, but a prerequisite for trust. Regulators under NIS2 and CER will expect organizations to demonstrate control over their supply chains\u2014not merely rely on contracts with vendors and partners.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risk_4_Compliance_and_Transparency_-_Evidence_Does_Not_Come_From_Spreadsheets\"><\/span>Risk #4: Compliance and Transparency &#8211; Evidence Does Not Come From Spreadsheets<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-38957 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/Compliance-icon-4.png\" alt=\"icon representing compliance for NIS2 and CER\" width=\"102\" height=\"121\" \/>New regulations often prompt organizations to focus on policies, documentation, and audit preparation. However, NIS2 and CER demand more than periodic compliance\u2014they require continuous demonstrability.<\/p>\n<p>The risk is treating compliance as an end goal rather than a component of good governance. Organizations that only react to external requirements remain perpetually behind. When compliance is approached as an ongoing process of transparency, the focus shifts from hindsight to foresight.<\/p>\n<p>Organizations must be able to prove they are in control of risks by providing transparent, verifiable evidence. Automation enables continuous assurance, ensuring that controls remain effective and compliance becomes a trust-building mechanism for boards, regulators, and customers alike.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risk_5_Trust_and_Reputation_-_Digital_Resilience_as_the_Foundation_for_Continuity_and_Market_Position\"><\/span>Risk #5: Trust and Reputation &#8211; Digital Resilience as the Foundation for Continuity and Market Position<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-38958 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/Reputation-icon-5.png\" alt=\"icon representing trust for NIS2 and CER\" width=\"118\" height=\"121\" \/>In the digital age, trust is a critical prerequisite for business continuity and competitive positioning. When digital incidents can make headlines within minutes, the response is as important as the incident itself. Restoring services is essential, but preventing long-term reputational damage is equally critical.<\/p>\n<p>A single incident can erode the confidence of customers, shareholders, and partners. Trust cannot be rebuilt through technical fixes or marketing campaigns alone\u2014it requires sustained trust management. NIS2 and CER make trust tangible and measurable by requiring organizations to demonstrate control, transparency, and accountability in protecting critical services.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-38951 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-banner.jpg\" alt=\"Clickable banner to download a free eBook about eG Enterprise and AIOps\" width=\"850\" height=\"180\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-banner.jpg 850w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-banner-300x64.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-banner-768x163.jpg 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-banner-800x169.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-banner-310x66.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-banner-140x30.jpg 140w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Connecting_Factor_Observability_as_the_Foundation_for_Trust_and_Resilience\"><\/span>The Connecting Factor: Observability as the Foundation for Trust and Resilience<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/observability.webp\" alt=\"\" width=\"840\" height=\"250\" class=\"aligncenter size-full wp-image-39050\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/observability.webp 840w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/observability-300x89.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/observability-768x229.webp 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/observability-800x238.webp 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/observability-310x92.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/observability-140x42.webp 140w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/p>\n<p>The common thread across all five risks is visibility\u2014the ability to continuously understand what is happening, where risks are emerging, and how controls are performing. This is where <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/glossary\/observability\">observability<\/a> becomes essential.<\/p>\n<p>A modern observability solution provides contextual insight across the entire digital chain, from infrastructure and applications to user experience and compliance. By combining technical data with business context, organizations gain a unified view of digital health and risk.<\/p>\n<p>With observability, CIOs and IT leaders can substantiate governance with real-time insight, strengthen continuity through early detection, fulfil supply chain responsibility with full ecosystem visibility, automate compliance reporting, and protect trust through transparency and rapid incident response.<\/p>\n<p>Ultimately, observability is a strategic instrument for complying with NIS2 and CER and for achieving true digital resilience\u2014today and in the future.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>NIS2 and CER mark a turning point. What were once IT concerns are now board-level responsibilities and benchmarks for trust. CIOs and IT managers operate at the strategic core of their organizations.<\/p>\n<p>The five risks\u2014governance, continuity, supply chain responsibility, compliance, and trust\u2014define the arena in which digital leaders make the difference. Observability is the key enabler, making risks visible, manageable, and provable.<\/p>\n<p>Investing in observability today is an investment not just in technology, but in digital credibility. And that is ultimately the broader purpose served by NIS2 and CER: a resilient, transparent, and trustworthy digital society.<\/p>\n<p>Learn more about the practicalities of NIS2 and how the eG Enterprise observability platform is helping organizations implement workflows and strategies to address the demands from NIS2, see: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/\">What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance | eG Innovations<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Related_Information\"><\/span>Related Information<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/glossary\/observability\">What is Observability? &#8211; IT Glossary | eG Innovations<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-the-digital-operational-resilience-act-dora-everything-you-need-to-know-about-dora-compliance\/\">What is the Digital Operational Resilience Act (DORA)? Everything you need to know about DORA compliance | eG Innovations<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/\">What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance | eG Innovations<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/observability-best-practices\/\">Observability Best Practices: Balance Sustainability and IT Cost | eG Innovations<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/cloud-observability-vs-monitoring-a-practical-guide-to-go-beyond-cloud-native-tools\/\">Cloud Observability vs Monitoring: A Practical Guide to Go Beyond Cloud-Native Tools | eG Innovations<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The European directives NIS2 (Network and Information Security Directive 2) and Critical Entities Resilience (CER) Directive have rapidly sharpened the conversation around digital resilience. While many organizations initially viewed these directives as an extension of their cybersecurity obligations, it is becoming increasingly clear that much more is at stake. These directives require a strategic transformation [&hellip;]<\/p>\n","protected":false},"author":59,"featured_media":38965,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"yes","_lmt_disable":"","footnotes":""},"categories":[375],"tags":[2378,122,165,2282],"class_list":["post-38942","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cer","tag-compliance-reports","tag-it-security-and-compliance","tag-nis2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIS2 and CER Serve a Broader Purpose Than Cybersecurity - The 5 Biggest Risks You Need to Address Now<\/title>\n<meta name=\"description\" content=\"Learn how the NIS2 and CER directives go beyond cybersecurity and the practical role observability plays in enabling organizations to take a broader, strategic approach to digital resilience, governance, and accountability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 and CER Serve a Broader Purpose Than Cybersecurity - The 5 Biggest Risks You Need to Address Now\" \/>\n<meta property=\"og:description\" content=\"Learn how the NIS2 and CER directives go beyond cybersecurity and the practical role observability plays in enabling organizations to take a broader, strategic approach to digital resilience, governance, and accountability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-13T11:11:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-13T12:11:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-Social-banner-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erik van Veenendaal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erik van Veenendaal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 and CER Serve a Broader Purpose Than Cybersecurity - The 5 Biggest Risks You Need to Address Now","description":"Learn how the NIS2 and CER directives go beyond cybersecurity and the practical role observability plays in enabling organizations to take a broader, strategic approach to digital resilience, governance, and accountability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/","og_locale":"en_US","og_type":"article","og_title":"NIS2 and CER Serve a Broader Purpose Than Cybersecurity - The 5 Biggest Risks You Need to Address Now","og_description":"Learn how the NIS2 and CER directives go beyond cybersecurity and the practical role observability plays in enabling organizations to take a broader, strategic approach to digital resilience, governance, and accountability.","og_url":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2026-02-13T11:11:06+00:00","article_modified_time":"2026-02-13T12:11:51+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-Social-banner-scaled.jpg","type":"image\/jpeg"}],"author":"Erik van Veenendaal","twitter_card":"summary_large_image","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Erik van Veenendaal","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/"},"author":{"name":"Erik van Veenendaal","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/24fb6dad95984d6acecc985344777259"},"headline":"NIS2 and CER Serve a Broader Purpose Than Cybersecurity &#8211; The 5 Biggest Risks You Need to Address Now","datePublished":"2026-02-13T11:11:06+00:00","dateModified":"2026-02-13T12:11:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/"},"wordCount":1491,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-thumbnail-banner.jpg","keywords":["CER","Compliance Reports","IT Security and Compliance","NIS2"],"articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/","url":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/","name":"NIS2 and CER Serve a Broader Purpose Than Cybersecurity - The 5 Biggest Risks You Need to Address Now","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-thumbnail-banner.jpg","datePublished":"2026-02-13T11:11:06+00:00","dateModified":"2026-02-13T12:11:51+00:00","description":"Learn how the NIS2 and CER directives go beyond cybersecurity and the practical role observability plays in enabling organizations to take a broader, strategic approach to digital resilience, governance, and accountability.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-thumbnail-banner.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2026\/02\/NIS2-thumbnail-banner.jpg","width":363,"height":236},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/nis2-and-cer-serve-a-broader-purpose-than-cybersecurity-the-5-biggest-risks-you-need-to-address-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"NIS2 and CER Serve a Broader Purpose Than Cybersecurity &#8211; The 5 Biggest Risks You Need to Address Now"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/24fb6dad95984d6acecc985344777259","name":"Erik van Veenendaal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/251d1e9347d3889d7068dccbf9b683e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/251d1e9347d3889d7068dccbf9b683e9?s=96&d=mm&r=g","caption":"Erik van Veenendaal"},"url":"https:\/\/www.eginnovations.com\/blog\/author\/erik-van-veenendaal\/"}]}},"modified_by":"eG Innovations","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/38942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=38942"}],"version-history":[{"count":3,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/38942\/revisions"}],"predecessor-version":[{"id":39288,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/38942\/revisions\/39288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/38965"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=38942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=38942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=38942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}