{"id":35247,"date":"2025-11-10T12:58:20","date_gmt":"2025-11-10T12:58:20","guid":{"rendered":"https:\/\/mainstream.eu\/?p=35247"},"modified":"2026-01-29T12:25:17","modified_gmt":"2026-01-29T12:25:17","slug":"nis2-directive-business-continuity","status":"publish","type":"post","link":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity","title":{"rendered":"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents"},"content":{"rendered":"\n<p>As expected, the introduction of the NIS2 Directive has sparked concern\u2014some would say even panic\u2014among companies across the European Union. The scope of affected sectors has expanded, and the measures are more stringent, covering multiple dimensions, one of the most critical being business continuity.<\/p>\n\n\n\n<p>In this article, we explain what business continuity means in the context of the NIS2 Directive and how you can approach compliance.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#What_Does_Business_Continuity_Management_BCM_Include\" >What Does Business Continuity Management (BCM) Include?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#Whats_the_Connection_Between_NIS2_and_Business_Continuity\" >What\u2019s the Connection Between NIS2 and Business Continuity?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#Where_to_Start\" >Where to Start?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#Business_Continuity_and_NIS2_Critical_Areas_to_Address\" >Business Continuity and NIS2: Critical Areas to Address<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#Make_Progress_Toward_NIS2_Compliance_and_a_More_Resilient_Business\" >Make Progress Toward NIS2 Compliance (and a More Resilient Business)<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Does_Business_Continuity_Management_BCM_Include\"><\/span><strong>What Does Business Continuity Management (BCM) Include?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The primary goal of the NIS2 Directive is to strengthen cybersecurity across critical sectors, with a focus on preventing incidents. Business continuity management (BCM), on the other hand, is aimed at maintaining operational workflows even when incidents occur. The purpose of BCM activities is to minimize the impact on business functions and restore operations to a normal state within an acceptable time frame.<\/p>\n\n\n\n<p>Since NIS2 emphasizes the security of information systems, BCM in this context primarily refers to backup and disaster recovery solutions. Backup ensures fast data recovery, while disaster recovery focuses on the swift restoration of IT systems. In some industries\u2014such as healthcare information systems or transportation management systems\u2014these capabilities are crucial to service delivery.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"700\" src=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/2151877167-1024x700.jpg\" alt=\"\" class=\"wp-image-35249\" srcset=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/2151877167-1024x700.jpg 1024w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/2151877167-300x205.jpg 300w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/2151877167-768x525.jpg 768w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/2151877167.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Whats_the_Connection_Between_NIS2_and_Business_Continuity\"><\/span><strong>What\u2019s the Connection Between NIS2 and Business Continuity?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In a business environment where IT systems, data, and digital services are no longer support functions but business foundations, and where cyber threats are increasingly complex and frequent, resilience to disruption is a top priority. The NIS2 Directive is about strengthening digital resilience\u2014on an EU level, this means safeguarding the economy and critical services.<\/p>\n\n\n\n<p>Although it may not seem that way, NIS2 compliance is in companies\u2019 best interest\u2014not just to avoid steep penalties, but also because implementing the directive\u2019s measures offers the best protection for their business. Importantly, compliance isn\u2019t a one-time project, but a continuous process of monitoring, prevention, and reporting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Where_to_Start\"><\/span><strong>Where to Start?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If your organization is subject to NIS2 (and even if it\u2019s not, cyber risk should not be underestimated), it\u2019s essential to address business continuity management. Depending on whether you already have some BCM processes in place or are starting from scratch, your journey to compliance will involve different steps.<\/p>\n\n\n\n<p><strong>1. Assemble Internal Stakeholders<\/strong><\/p>\n\n\n\n<p>Identify subject-matter experts and owners of critical data and infrastructure, and ensure they understand the importance of NIS2 and the actions required.<\/p>\n\n\n\n<p><strong>2. Conduct a Business Impact Analysis (BIA)<\/strong><\/p>\n\n\n\n<p>Perform a detailed assessment of how incidents or risk events could affect your core operations. This analysis serves as the foundation for implementing protection measures for critical business functions.<\/p>\n\n\n\n<p><strong>3. Create Backup and Disaster Recovery Plans<\/strong><\/p>\n\n\n\n<p>Your plans should go beyond IT infrastructure to include physical locations and third-party services. To stay effective, they must be reviewed regularly to reflect evolving technology, threat landscapes, and organizational changes.<\/p>\n\n\n\n<p><strong>4. Implement Tailored Solutions<\/strong><\/p>\n\n\n\n<p>Backup and disaster recovery solutions must align with your specific business needs\u2014for example, the timeframe within which a function must be restored (Recovery Time Objective, RTO).<\/p>\n\n\n\n<p><strong>5. Conduct Regular Training and Simulations<\/strong><\/p>\n\n\n\n<p>Effective business continuity requires realistic scenario testing to identify weaknesses early. Training key personnel and clearly defining responsibilities are just as essential.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Business_Continuity_and_NIS2_Critical_Areas_to_Address\"><\/span><strong>Business Continuity and NIS2: Critical Areas to Address<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>Cyber Risk Management<\/strong><\/p>\n\n\n\n<p>Business continuity includes many components, with cybersecurity being a major one\u2014especially under NIS2. Consider implementing security measures such as encryption and access control protocols.<\/p>\n\n\n\n<p><strong>Vendors and Partners<\/strong><\/p>\n\n\n\n<p>Evaluate how incidents affecting vendors and critical service providers could impact your business, and develop appropriate strategies such as vendor diversification or alternative partnerships.<\/p>\n\n\n\n<p><strong>Data Protection<\/strong><\/p>\n\n\n\n<p>Identify critical data assets in your ecosystem. Evaluate potential consequences of data loss or theft, reduce risks by limiting access, revoking unused permissions, applying the least privilege principle, and introducing continuous monitoring.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/11444-1024x546.jpg\" alt=\"\" class=\"wp-image-35254\" srcset=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/11444-1024x546.jpg 1024w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/11444-300x160.jpg 300w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/11444-768x410.jpg 768w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/11444.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Make_Progress_Toward_NIS2_Compliance_and_a_More_Resilient_Business\"><\/span><strong>Make Progress Toward NIS2 Compliance (and a More Resilient Business)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To emphasize once more: NIS2 compliance is not just about regulation. The benefits of robust business continuity are significant, and the risks of neglect are potentially devastating\u2014loss of revenue, customers, and reputation.<\/p>\n\n\n\n<p>If you&#8217;re looking to take a key step on your NIS2 journey, explore our Disaster Recovery and Backup solutions built on the cloud, designed to meet the demands of companies operating in the European Union.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article explores how organizations can ensure business continuity and build resilience through backup, disaster recovery, and cyber risk management to comply with the stringent requirements of the NIS2 Directive.<\/p>\n","protected":false},"author":4,"featured_media":35162,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[215,311,305],"tags":[309],"class_list":["post-35247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bezbednost","category-data-en","category-security-en","tag-cloud-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents - Mainstream<\/title>\n<meta name=\"description\" content=\"This article explores how organizations can ensure business continuity and build resilience through backup, disaster recovery, and cyber risk management to comply with the stringent requirements of the NIS2 Directive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents - Mainstream\" \/>\n<meta property=\"og:description\" content=\"This article explores how organizations can ensure business continuity and build resilience through backup, disaster recovery, and cyber risk management to comply with the stringent requirements of the NIS2 Directive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/\" \/>\n<meta property=\"og:site_name\" content=\"Mainstream\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-10T12:58:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T12:25:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/shutterstock_2499859677.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mainstream\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mainstream\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/\"},\"author\":{\"name\":\"Mainstream\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\"},\"headline\":\"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents\",\"datePublished\":\"2025-11-10T12:58:20+00:00\",\"dateModified\":\"2026-01-29T12:25:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/\"},\"wordCount\":705,\"image\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/shutterstock_2499859677.jpg\",\"keywords\":[\"cloud\"],\"articleSection\":[\"Bezbednost\",\"Data\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/\",\"name\":\"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents - Mainstream\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/shutterstock_2499859677.jpg\",\"datePublished\":\"2025-11-10T12:58:20+00:00\",\"dateModified\":\"2026-01-29T12:25:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\"},\"description\":\"This article explores how organizations can ensure business continuity and build resilience through backup, disaster recovery, and cyber risk management to comply with the stringent requirements of the NIS2 Directive.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/shutterstock_2499859677.jpg\",\"contentUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/shutterstock_2499859677.jpg\",\"width\":1200,\"height\":1200,\"caption\":\"i want Europe with stars and cybersecurity NIS2 the main subject\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive-business-continuity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#website\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/\",\"name\":\"Mainstream\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\",\"name\":\"Mainstream\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"caption\":\"Mainstream\"},\"url\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/author\\\/mainstream\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents - Mainstream","description":"This article explores how organizations can ensure business continuity and build resilience through backup, disaster recovery, and cyber risk management to comply with the stringent requirements of the NIS2 Directive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/","og_locale":"en_US","og_type":"article","og_title":"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents - Mainstream","og_description":"This article explores how organizations can ensure business continuity and build resilience through backup, disaster recovery, and cyber risk management to comply with the stringent requirements of the NIS2 Directive.","og_url":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/","og_site_name":"Mainstream","article_published_time":"2025-11-10T12:58:20+00:00","article_modified_time":"2026-01-29T12:25:17+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/shutterstock_2499859677.jpg","type":"image\/jpeg"}],"author":"Mainstream","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mainstream","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#article","isPartOf":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/"},"author":{"name":"Mainstream","@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3"},"headline":"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents","datePublished":"2025-11-10T12:58:20+00:00","dateModified":"2026-01-29T12:25:17+00:00","mainEntityOfPage":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/"},"wordCount":705,"image":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#primaryimage"},"thumbnailUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/shutterstock_2499859677.jpg","keywords":["cloud"],"articleSection":["Bezbednost","Data","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/","url":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/","name":"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents - Mainstream","isPartOf":{"@id":"https:\/\/mainstream.eu\/sr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#primaryimage"},"image":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#primaryimage"},"thumbnailUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/shutterstock_2499859677.jpg","datePublished":"2025-11-10T12:58:20+00:00","dateModified":"2026-01-29T12:25:17+00:00","author":{"@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3"},"description":"This article explores how organizations can ensure business continuity and build resilience through backup, disaster recovery, and cyber risk management to comply with the stringent requirements of the NIS2 Directive.","breadcrumb":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#primaryimage","url":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/shutterstock_2499859677.jpg","contentUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/06\/shutterstock_2499859677.jpg","width":1200,"height":1200,"caption":"i want Europe with stars and cybersecurity NIS2 the main subject"},{"@type":"BreadcrumbList","@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive-business-continuity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mainstream.eu\/en\/"},{"@type":"ListItem","position":2,"name":"NIS2 Directive: How to Ensure Business Continuity in the Face of Unexpected Incidents"}]},{"@type":"WebSite","@id":"https:\/\/mainstream.eu\/sr\/#website","url":"https:\/\/mainstream.eu\/sr\/","name":"Mainstream","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mainstream.eu\/sr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3","name":"Mainstream","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","caption":"Mainstream"},"url":"https:\/\/mainstream.eu\/en\/author\/mainstream\/"}]}},"_links":{"self":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts\/35247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/comments?post=35247"}],"version-history":[{"count":0,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts\/35247\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/media\/35162"}],"wp:attachment":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/media?parent=35247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/categories?post=35247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/tags?post=35247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}