Blog series on NIS2 and the Cybersecurity Act
NIS2 and the Swedish Cybersecurity Act are not just theoretical exercises. They are a reality check. They don't care how polished your policy is when the network falters, two key personnel are unavailable, and the supplier says "back after lunch". Then only one question remains: do you have capability or just binders?
That's why I've written a blog series to fill a gap I've noticed in the debate: it translates NIS2 into controls, vulnerabilities and capabilities. Not just more "compliance theatre", but what can actually be measured, practised, and demonstrated.
What's unique? Each article takes a requirement and makes it human and practical with a clear metaphor (no lists of fifteen items or buzzwords). You get a compass for what really matters: management responsibility, incident alerts, continuity, supply chain, vulnerabilities, measurable impact, cyber hygiene, authentication – the whole chain. And you get it with a vision I believe more need: that NIS2 can become a competitive advantage when we stop counting PDFs and start building muscle memory.
Read if you want NIS2 to be less of a "must" and more of a "now I get it".