{"id":1168,"date":"2024-10-22T18:52:38","date_gmt":"2024-10-22T16:52:38","guid":{"rendered":"https:\/\/ayrilys.com\/?p=1168"},"modified":"2025-09-29T16:58:21","modified_gmt":"2025-09-29T14:58:21","slug":"les-premiers-pas-de-nis-2-sur-fond-de-transposition","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/","title":{"rendered":"Les premiers pas de NIS 2 sur fond de transposition"},"content":{"rendered":"\n<p class=\"has-large-font-size\"><strong>Les premiers pas de NIS 2 sur fond de transposition<\/strong><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>R\u00e9sum\u00e9 de l&rsquo;article :<\/strong><\/p>\n\n\n\n<p>La directive&nbsp;<strong>NIS 2<\/strong>, visant \u00e0 renforcer la cybers\u00e9curit\u00e9 de milliers d\u2019administrations et d\u2019entreprises fran\u00e7aises, entre en vigueur aujourd\u2019hui. Le projet de loi de transposition a \u00e9t\u00e9 approuv\u00e9 en conseil des ministres et sera prochainement discut\u00e9 au Parlement. Cette directive impose des obligations de s\u00e9curisation, telles que la r\u00e9alisation d\u2019analyses de risque, la notification des incidents de s\u00e9curit\u00e9 \u00e0 l\u2019Anssi, et des efforts sur la r\u00e9silience des syst\u00e8mes IT.<\/p>\n\n\n\n<p>Vincent Strubel, directeur g\u00e9n\u00e9ral de l\u2019Anssi, a indiqu\u00e9 que les entit\u00e9s concern\u00e9es auront trois ans pour se conformer \u00e0 la directive, avec des exigences minimales \u00e0 respecter d\u00e8s maintenant. Les \u00e9diteurs et fournisseurs de solutions de cybers\u00e9curit\u00e9 sont pr\u00eats \u00e0 aider les entreprises \u00e0 se conformer \u00e0 ces nouvelles obligations.<\/p>\n\n\n\n<p>Bien que le 17 octobre ne marque pas de changement imm\u00e9diat, c\u2019est le d\u00e9but d\u2019une p\u00e9riode de transition vers une cybers\u00e9curit\u00e9 renforc\u00e9e pour de nombreuses organisations.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>D\u00e9tail de l&rsquo;article :<\/strong><\/p>\n\n\n\n<p>La directive NIS 2 renfor\u00e7ant la cybers\u00e9curit\u00e9 de milliers d&rsquo;administrations et d&rsquo;entreprises fran\u00e7aises entre en vigueur aujourd&rsquo;hui. Le projet de loi de transposition du texte en droit national est pass\u00e9 hier en conseil des ministres. Pour les acteurs concern\u00e9s, il faut se pr\u00e9parer \u00e0 remonter les curseurs de s\u00e9curit\u00e9 sous l&rsquo;oeil bienveillant mais exigeant de l&rsquo;Anssi.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg\" alt=\"Vincet Strubel, directeur g\u00e9n\u00e9ral de l'Anssi laisse trois ans aux entit\u00e9s r\u00e9gul\u00e9s pour se conformer \u00e0 la directive NIS 2 avant de s\u00e9vir. (Cr\u00e9dit Photo: JC)\" title=\"Vincet Strubel, directeur g\u00e9n\u00e9ral de l'Anssi laisse trois ans aux entit\u00e9s r\u00e9gul\u00e9s pour se conformer \u00e0 la directive NIS 2 avant de s\u00e9vir. (Cr\u00e9dit Photo: JC)\"\/><figcaption class=\"wp-element-caption\">Vincet Strubel, directeur g\u00e9n\u00e9ral de l&rsquo;Anssi laisse trois ans aux entit\u00e9s r\u00e9gul\u00e9s pour se conformer \u00e0 la directive NIS 2 avant de s\u00e9vir. (Cr\u00e9dit Photo: JC)<\/figcaption><\/figure>\n\n\n\n<p>\u00ab&nbsp;Le 17 octobre il ne se passera rien&nbsp;\u00bb, a indiqu\u00e9&nbsp;<a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-l-anssi-felicite-les-acteurs-de-la-cybersecurite-des-jo-2024-94948.html\">Vincent Strubel dans son discours inaugural des Assises de la s\u00e9curit\u00e9 \u00e0 Monaco<\/a>&nbsp;la semaine derni\u00e8re. Le directeur g\u00e9n\u00e9ral de l\u2019Anssi faisait ici r\u00e9f\u00e9rence \u00e0 la date d\u2019entr\u00e9e en vigueur de la directive NIS (Network and Information System Security) 2. Cette derni\u00e8re succ\u00e8de \u00e0 la premi\u00e8re version de ce cadre qui visait \u00e0 renforcer la cybers\u00e9curit\u00e9 de certains acteurs fournissant des services jug\u00e9s essentiels. En 2022, ce texte a \u00e9t\u00e9 r\u00e9vis\u00e9 par l\u2019Union europ\u00e9enne pour accro\u00eetre les exigences de s\u00e9curisation et \u00e9largir le nombre d\u2019entit\u00e9s concern\u00e9es. Un chantier titanesque, car la France recense 15&nbsp;000 structures (soci\u00e9t\u00e9s priv\u00e9es, collectivit\u00e9s locales, centre de recherche, \u00e9tablissement de sant\u00e9,\u2026) touch\u00e9es.<\/p>\n\n\n\n<p>Comme toutes les directives, celle de NIS 2 doit \u00eatre transpos\u00e9e en droit national avant de s\u2019appliquer. L\u2019Anssi avait d\u00e9j\u00e0 fait un travail de pr\u00e9paration pour identifier les acteurs impact\u00e9s et les obligations en mati\u00e8re de cybers\u00e9curit\u00e9. En parall\u00e8le, un projet de loi a \u00e9t\u00e9 \u00e9labor\u00e9 en avril dernier, mais la dissolution de l\u2019Assembl\u00e9e nationale a perturb\u00e9 sa discussion. Ce mercredi,&nbsp;<a href=\"https:\/\/www.legifrance.gouv.fr\/contenu\/Media\/files\/autour-de-la-loi\/legislatif-et-reglementaire\/actualite-legislative\/2024\/pjl_prmd2412608l_cm_15.10.2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">le texte est pass\u00e9 en conseil des ministres<\/a>&nbsp;et devra donc \u00eatre discut\u00e9 prochainement au Parlement sans qu\u2019une date soit pour l\u2019instant fix\u00e9e.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-une-identification-des-entites-concernees-et-une-liste-d-obligations\"><strong>Une identification des entit\u00e9s concern\u00e9es et une liste d\u2019obligations<\/strong><\/h2>\n\n\n\n<p>Le projet de loi apporte des pr\u00e9cisions sur les d\u00e9finitions des entit\u00e9s essentielles et importantes. Les premi\u00e8res comprennent en autres des entreprises \u00ab&nbsp;qui emploient au moins 250 personnes ou dont le chiffre d\u2019affaires annuel exc\u00e8de 50 M\u20ac et dont le total du bilan annuel exc\u00e8de 43 M\u20ac \u00bb, des EPIC (\u00e9tablissement public \u00e0 caract\u00e8re industriel et commercial), les op\u00e9rateurs de communication \u00e9lectronique, Les r\u00e9gions, les d\u00e9partements, les communes d\u2019une population sup\u00e9rieure \u00e0 30 000 habitants,\u2026 Pour les entit\u00e9s importantes, sont notamment concern\u00e9es, les entreprises \u00ab&nbsp;qui emploient au moins 50 personnes ou dont le chiffre d\u2019affaires et le total du bilan annuel exc\u00e8dent chacun 10 M\u20ac \u00bb, les \u00e9tablissements d\u2019enseignement menant des activit\u00e9s de recherche, certaines collectivit\u00e9s, communaut\u00e9 de communes, etc.<\/p>\n\n\n\n<p>Pour ces deux entit\u00e9s, la directive NIS 2 impose des obligations de s\u00e9curisation \u00e0 plusieurs niveaux. Elles doivent ainsi r\u00e9aliser une analyse de risque pour conna\u00eetre leur faiblesse et la surface d\u2019attaque, mais aussi celles des fournisseurs et partenaires. La loi pr\u00e9voit \u00e9galement une obligation de notification des incidents de s\u00e9curit\u00e9 \u00e0 l\u2019Anssi, un d\u00e9cret doit pr\u00e9ciser les modalit\u00e9s et notamment le d\u00e9lai. Des efforts sur la r\u00e9silience des syst\u00e8mes IT sont demand\u00e9s. Les questions de sensibilisation et de la formation ne sont pas oubli\u00e9es avec un devoir d\u2019insuffler une culture de cybers\u00e9curit\u00e9 au sein de l&rsquo;organisation. Enfin et non des moindres, le texte fixe des amendes (pouvant aller jusqu\u2019\u00e0 2% du chiffre d\u2019affaires et 10 M\u20ac maximum pour les entit\u00e9s essentielles et jusqu\u2019\u00e0 1,4% du CA et 7 M\u20ac maximum pour les entit\u00e9s importantes).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-trois-ans-pour-une-conformite-minimale\"><strong>Trois ans pour une conformit\u00e9 minimale<\/strong><\/h2>\n\n\n\n<p>Sur cet aspect coercitif, Vincent Strubel pr\u00e9f\u00e8re le c\u00f4t\u00e9 p\u00e9dagogique et bienveillant en laissant une p\u00e9riode de trois ans pour se conformer \u00e0 la directive NIS 2. Mais cela ne signifie pas ne rien faire pendant ce laps de temps. Il a fix\u00e9 un minimum requis \u00e0 mettre en place sur cette p\u00e9riode, \u00e0 savoir \u00ab&nbsp;&nbsp;l\u2019enregistrement aupr\u00e8s de l\u2019Anssi de l\u2019entit\u00e9 r\u00e9gul\u00e9e sur le portail monespaceNIS 2, les notifications des incidents et de montrer les investissements dans les solutions de s\u00e9curit\u00e9&nbsp;\u00bb Un petit coup de pression sur des entit\u00e9s qui pour certaines ont d\u00e9j\u00e0 commenc\u00e9 \u00e0 travailler sur le sujet, mais qui pour une majorit\u00e9 ne savent pas par o\u00f9 commencer.<\/p>\n\n\n\n<p>Les \u00e9diteurs et les fournisseurs de solutions sont eux pr\u00eats \u00e0 les aider. Les acteurs de la sauvegarde notamment y voient une opportunit\u00e9 de business importante autour de la r\u00e9silience. Ainsi Datacore, \u00e0 l\u2019occasion de son r\u00e9cent \u00e9v\u00e8nement \u00e0 Menon a annonc\u00e9 des \u00e9volutions de ses offres pour accompagner les clients sur la conformit\u00e9 \u00e0 NIS 2. Dans les all\u00e9es des Assises de la s\u00e9curit\u00e9 \u00e0 Monaco, ils \u00e9taient nombreux \u00e0 promouvoir leurs solutions (authentification, protection de l\u2019AD, les EDR,\u2026.). Une chose est s\u00fbre, il ne se passera peut-\u00eatre rien le 17 octobre, mais c\u2019est sans conteste le d\u00e9but de quelque chose\u2026. &nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Une erreur dans l&rsquo;article?<a href=\"https:\/\/www.lemondeinformatique.fr\/divers\/formulaire_contact_lmi.php?id=1&amp;type=lmi&amp;arti=95017\">Proposez-nous une correction<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/images.itnewsinfo.com\/idg\/auteur\/moyen\/000000012990.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>Article r\u00e9dig\u00e9 par<\/p>\n\n\n\n<p><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/auteur-jacques-cheminat-572.html\">Jacques Cheminat<\/a><\/p>\n\n\n\n<p>R\u00e9dacteur en chef LMI<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les premiers pas de NIS 2 sur fond de transposition R\u00e9sum\u00e9 de l&rsquo;article : La directive&nbsp;NIS 2, visant \u00e0 renforcer la cybers\u00e9curit\u00e9 de milliers d\u2019administrations et d\u2019entreprises fran\u00e7aises, entre en vigueur aujourd\u2019hui. Le projet de loi de transposition a \u00e9t\u00e9 approuv\u00e9 en conseil des ministres et sera prochainement discut\u00e9 au Parlement. Cette directive impose des&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":true,"token":"eyJ0eHQiOiJMZXMgcHJlbWllcnMgcGFzIGRlIE5JUyAyIHN1ciBmb25kIGRlIHRyYW5zcG9zaXRpb24iLCJ0ZW1wbGF0ZSI6ImhpZ2h3YXkiLCJmb250IjoiIiwiYmxvZ19pZCI6MjM1MzM1MDIzfQ.KSs9frQRitKDiYASWunltSvLjuayy1_ODe-qFTcHDWsMQ"},"version":2,"attached_media":[{"id":1169,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/ANSSI.jpg","type":"image\/jpeg"}]}},"categories":[20,22],"tags":[],"class_list":["post-1168","post","type-post","status-publish","format-standard","hentry","category-accueil","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>ANSSI 2024 : Renforcement de la cybers\u00e9curit\u00e9 en France Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -<\/title>\r\n<meta name=\"description\" content=\"D\u00e9couvrez la directive NIS 2, qui renforce la cybers\u00e9curit\u00e9 des administrations et entreprises fran\u00e7aises. Des obligations de s\u00e9curisation et de notification d&#039;incidents \u00e0 l&#039;ANSSI.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Les premiers pas de NIS 2 sur fond de transposition\" \/>\r\n<meta property=\"og:description\" content=\"Les premiers pas de NIS 2 sur fond de transposition Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-10-22T16:52:38+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2025-09-29T14:58:21+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"Les premiers pas de NIS 2 sur fond de transposition\",\"datePublished\":\"2024-10-22T16:52:38+00:00\",\"dateModified\":\"2025-09-29T14:58:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/\"},\"wordCount\":1078,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg\",\"articleSection\":[\"Accueil\",\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/\",\"name\":\"ANSSI 2024 : Renforcement de la cybers\u00e9curit\u00e9 en France Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg\",\"datePublished\":\"2024-10-22T16:52:38+00:00\",\"dateModified\":\"2025-09-29T14:58:21+00:00\",\"description\":\"D\u00e9couvrez la directive NIS 2, qui renforce la cybers\u00e9curit\u00e9 des administrations et entreprises fran\u00e7aises. Des obligations de s\u00e9curisation et de notification d'incidents \u00e0 l'ANSSI.\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#primaryimage\",\"url\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg\",\"contentUrl\":\"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les premiers pas de NIS 2 sur fond de transposition\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ANSSI 2024 : Renforcement de la cybers\u00e9curit\u00e9 en France Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","description":"D\u00e9couvrez la directive NIS 2, qui renforce la cybers\u00e9curit\u00e9 des administrations et entreprises fran\u00e7aises. Des obligations de s\u00e9curisation et de notification d'incidents \u00e0 l'ANSSI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/","og_locale":"fr_FR","og_type":"article","og_title":"Les premiers pas de NIS 2 sur fond de transposition","og_description":"Les premiers pas de NIS 2 sur fond de transposition Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/","og_site_name":"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-10-22T16:52:38+00:00","article_modified_time":"2025-09-29T14:58:21+00:00","og_image":[{"url":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"Les premiers pas de NIS 2 sur fond de transposition","datePublished":"2024-10-22T16:52:38+00:00","dateModified":"2025-09-29T14:58:21+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/"},"wordCount":1078,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#primaryimage"},"thumbnailUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg","articleSection":["Accueil","S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/","url":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/","name":"ANSSI 2024 : Renforcement de la cybers\u00e9curit\u00e9 en France Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#primaryimage"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#primaryimage"},"thumbnailUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg","datePublished":"2024-10-22T16:52:38+00:00","dateModified":"2025-09-29T14:58:21+00:00","description":"D\u00e9couvrez la directive NIS 2, qui renforce la cybers\u00e9curit\u00e9 des administrations et entreprises fran\u00e7aises. Des obligations de s\u00e9curisation et de notification d'incidents \u00e0 l'ANSSI.","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#primaryimage","url":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg","contentUrl":"https:\/\/images.itnewsinfo.com\/lmi\/articles\/grande\/000000099343.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/les-premiers-pas-de-nis-2-sur-fond-de-transposition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Les premiers pas de NIS 2 sur fond de transposition"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=1168"}],"version-history":[{"count":1,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1168\/revisions"}],"predecessor-version":[{"id":1170,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1168\/revisions\/1170"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=1168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=1168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=1168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}