{"version":"1.0","provider_name":"Phishia","provider_url":"https:\/\/phishia.fr\/de","author_name":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","author_url":"https:\/\/phishia.fr\/de\/blog\/author\/enzodebosquephishia-fr\/","title":"NIS2 & DORA : obligations UE, diff\u00e9rences cl\u00e9s, feuille de route concr\u00e8te - Phishia","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"uJnl4EeMvf\"><a href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/nis2-dora-obligations-ue\/\">NIS2 &amp; DORA: EU-Verpflichtungen, Schl\u00fcsselunterschiede, konkreter Fahrplan<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/nis2-dora-obligations-ue\/embed\/#?secret=uJnl4EeMvf\" width=\"600\" height=\"338\" title=\"\u201eNIS2 &amp; DORA: EU-Verpflichtungen, Schl\u00fcsseldifferenzen, konkreter Fahrplan\u201c \u2013 Phishia\" data-secret=\"uJnl4EeMvf\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/phishia.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/nis2-dora.png","thumbnail_width":1536,"thumbnail_height":864,"description":"Pourquoi on parle autant de NIS2 et DORA Deux textes europ\u00e9ens, deux objectifs voisins : r\u00e9duire les impacts d\u2019incidents num\u00e9riques et rendre les organisations contr\u00f4lables. NIS2 vise les secteurs \u00ab essentiels \u00bb et \u00ab importants \u00bb (\u00e9nergie, sant\u00e9, transports, eau, num\u00e9rique, administrations, etc.). DORA cible le secteur financier et ses prestataires TIC critiques. Dans les [&hellip;]"}