{"id":7739,"date":"2026-02-04T15:40:06","date_gmt":"2026-02-04T15:40:06","guid":{"rendered":"https:\/\/verso.de\/blog\/nis-2-in-the-supply-chain\/"},"modified":"2026-03-09T09:06:04","modified_gmt":"2026-03-09T09:06:04","slug":"nis-2-in-the-supply-chain","status":"publish","type":"post","link":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/","title":{"rendered":"NIS-2 in the supply chain"},"content":{"rendered":"\t<section class=\"snk-articleStage snk-section snk-bg_1\">\n\t\t<div class=\"container\">\n\t\t\t<div class=\"row\">\n\n\t\t\t\t<div class=\"col-12 col-md-6 snk-articleStage-imgCol\">\n\t\t\t\t\t<div class=\"snk-articleStage-image\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp\" alt=\"Bild von einem Cyber-Angriff mit Computer und Code.\" title=\"2149101207\" \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t<div class=\"col-12 col-md-6 snk-articleStage-contentCol\">\n\t\t\t\t\t<div class=\"snk-articleStage-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"snk-articleStage-date\">04.02.2026<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h1 class=\"snk-h2\">What does the NIS-2 cyber security directive mean for the supply chain?<\/h1>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t\tNIS-2 tightens the requirements for cyber security &#8211; for the first time, the entire supply chain is in focus, from your service providers to cloud providers. Find out which companies are affected and how you can build effective risk management for your supply chain and NIS-2 compliance step by step. \t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/section>\n\t\n\n\n\t<section class=\"snk-section snk-section_noBtn\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\">What is the NIS 2 Directive and what does it mean for the supply chain?<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p>With the NIS 2 Directive, the EU is tightening the requirements for companies&#8217; cyber resilience. The focus is not only on a company&#8217;s own IT, but also on the entire supply chain: service providers, suppliers and IT or cloud providers are increasingly becoming a gateway for attacks. Companies must therefore be aware of their dependencies, systematically assess <a href=\"https:\/\/verso.de\/en\/supplier-risk-management-solution\/\" target=\"_blank\" rel=\"noopener\">risks<\/a> and implement suitable security measures for partners and service providers. The supply chain is thus becoming a central lever for compliance with the directive and for the company&#8217;s digital resilience.<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section class=\"snk-section snk-section_noBtn\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\">Which institutions and companies are affected by NIS-2?<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p>This no longer only affects traditional operators of critical infrastructure, but also numerous so-called &#8220;<strong>particularly important<\/strong>&#8221; and &#8220;<strong>important<\/strong>&#8221; facilities &#8211; including many companies from industry, production, IT, logistics, energy, healthcare and digital services with 50 or more employees or a turnover of EUR 10 million or more. The &#8220;particularly important&#8221; facilities, shown in the table, have to implement the strictest requirements. <\/p>\n<table style=\"font-size: 9pt; width: 100%; table-layout: fixed; border-collapse: separate; border-spacing: 0;\">\n<tbody>\n<tr style=\"color: #faf6f9;\">\n<th style=\"background-color: #006569; font-weight: normal; padding: 10px; width: 35%; text-align: left; border-right: 2px solid #ffffff; border-bottom: 2px solid #ffffff;\">\n Particularly important facilities\n <\/th>\n<th style=\"background-color: #006569; font-weight: normal; padding: 10px; width: 65%; text-align: left; border-bottom: 2px solid #ffffff;\">\n Facilities \/ Examples\n <\/th>\n<\/tr>\n<tr>\n<td style=\"background-color: #ede9e8; padding: 10px; vertical-align: top; border-right: 2px solid #ffffff; border-bottom: 2px solid #ffffff;\">\n Energy\n <\/td>\n<td style=\"background-color: #ffffff; padding: 10px; vertical-align: top; border-bottom: 2px solid #ffffff;\">\n Electricity, gas, oil, district heating\/cooling, water supply, charging infrastructure for electric vehicles\n <\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ede9e8; padding: 10px; vertical-align: top; border-right: 2px solid #ffffff; border-bottom: 2px solid #ffffff;\">\n Transportation &amp; Logistics\n <\/td>\n<td style=\"background-color: #ffffff; padding: 10px; vertical-align: top; border-bottom: 2px solid #ffffff;\">\n Air, rail, road and shipping transportation, including shipping companies and port operators\n <\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ede9e8; padding: 10px; vertical-align: top; border-right: 2px solid #ffffff; border-bottom: 2px solid #ffffff;\">\n Finance\n <\/td>\n<td style=\"background-color: #ffffff; padding: 10px; vertical-align: top; border-bottom: 2px solid #ffffff;\">\n Banks, trading platforms, market infrastructures, insurance companies\n <\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ede9e8; padding: 10px; vertical-align: top; border-right: 2px solid #ffffff; border-bottom: 2px solid #ffffff;\">\n Healthcare\n <\/td>\n<td style=\"background-color: #ffffff; padding: 10px; vertical-align: top; border-bottom: 2px solid #ffffff;\">\n Hospitals, research institutions, pharmaceutical companies, medical technology\n <\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ede9e8; padding: 10px; vertical-align: top; border-right: 2px solid #ffffff; border-bottom: 2px solid #ffffff;\">\n Water supply\n <\/td>\n<td style=\"background-color: #ffffff; padding: 10px; vertical-align: top; border-bottom: 2px solid #ffffff;\">\n Drinking water and wastewater management\n <\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ede9e8; padding: 10px; vertical-align: top; border-right: 2px solid #ffffff; border-bottom: 2px solid #ffffff;\">\n Digital infrastructure\n <\/td>\n<td style=\"background-color: #ffffff; padding: 10px; vertical-align: top; border-bottom: 2px solid #ffffff;\">\n DNS services, operators of top-level domains\n <\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #ede9e8; padding: 10px; vertical-align: top; border-right: 2px solid #ffffff;\">\n Public administration\n <\/td>\n<td style=\"background-color: #ffffff; padding: 10px; vertical-align: top;\">\n Authorities and other state institutions\n <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Although the &#8220;<strong>important<\/strong>&#8221; facilities &#8211; depending on their size and sector &#8211; do not have quite as far-reaching obligations and are not classified as critical per se, they must nevertheless act in a NIS-compliant manner. These include: <\/p>\n<ul>\n<li>Food production<\/li>\n<li>Postal and courier services<\/li>\n<li>Chemical industry<\/li>\n<li>Manufacturing industry<\/li>\n<li>Digital services<\/li>\n<li>Research facilities<\/li>\n<li>Waste management<\/li>\n<\/ul>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section class=\"snk-section snk-section_noBtn\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\">When does NIS-2 apply to companies and their supply chains?<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p>All EU member states should have transposed the NIS-2 Directive into national law by October 17, 2024, but many, including Germany, missed the deadline. In Germany, NIS-2 has therefore only been law since December 2025. <\/p>\n<p>Whether in one country sooner or later, the fact is: companies in the EU must now adapt their security measures in the company and in the supply chain to NIS-2. And they need to be careful: NIS-2 affects significantly more companies than its predecessor, NIS-1. In Germany, around 30,000 organizations are covered by NIS-2, while fewer than 2,000 were affected by NIS-2. <\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section class=\"snk-section snk-section_noBtn\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\">The difference between NIS-2 and ISO-27001<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p>In contrast to established information security standards such as ISO\/IEC 27001, NIS-2 goes much further: the focus is not only on securing the company&#8217;s own IT, but also on holistic risk management that includes the entire corporate environment, including the supply chain.<\/p>\n<table style=\"font-size:9pt; width:100%; table-layout:fixed; border-collapse:separate; border-spacing:0;\">\n<tbody>\n<tr style=\"color:#faf6f9;\">\n<th style=\"background-color:#006569; padding:10px; text-align:left; width:30%; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">\n Aspect\n <\/th>\n<th style=\"background-color:#006569; padding:10px; text-align:left; width:35%; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">\n ISO 27001\n <\/th>\n<th style=\"background-color:#006569; padding:10px; text-align:left; width:35%; border-bottom:2px solid #ffffff;\">\n NIS-2\n <\/th>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Regulatory status<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">International standard (voluntary)<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">EU directive (mandatory)<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Area of application<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">Industry-independent, for organizations of all sizes<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">Specific sectors and companies<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Objective<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">Establishment and operation of an information security management system (ISMS)<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">Increasing the cyber security level of critical and important infrastructures in the EU<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Information protection<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">Protection of all types of information (digital, physical, cloud)<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">Focus on IT, OT and network security with critical importance<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Risk management<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">Systematic information security risk management<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">Extended and deeper requirements for cyber and information security risks<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Asset Management<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">Part of the ISMS<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">Significantly expanded and explicitly required<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Supply chain &amp; procurement security<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">Generally addressed<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">Explicit and central requirement (suppliers &amp; partners)<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Awareness &amp; training<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">Employee training recommended<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">Training courses planned, especially mandatory for management and the Executive Board<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\"><strong>Management involvement<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff; border-bottom:2px solid #ffffff;\">Responsibility defined, but limited personal liability<\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-bottom:2px solid #ffffff;\">Strong involvement of top management including personal liability <\/td>\n<\/tr>\n<tr>\n<td style=\"background-color:#ede9e8; padding:10px; border-right:2px solid #ffffff;\"><strong>Degree of coverage<\/strong><\/td>\n<td style=\"background-color:#ffffff; padding:10px; border-right:2px solid #ffffff;\">Covers approx. 70% of NIS 2 requirements<\/td>\n<td style=\"background-color:#ffffff; padding:10px;\">Goes well beyond ISO 27001<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section class=\"snk-section snk-section_noBtn\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\">What does NIS-2 require of companies and supply chains?  <\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p>The NIS 2 directive takes cyber security to a new level &#8211; organizationally, technically and strategically. Essentially, the requirements can be divided into three central fields of action: <\/p>\n<p><strong>1. establish systematic risk management: <\/strong>Use of technical protective measures such as multi-factor authentication (MFA), documented cryptography guidelines, established incident response and emergency plans, regular training to raise employee awareness<\/p>\n<p><strong>2. clear responsibilities at management level:<\/strong> active co-design and approval of cybersecurity measures, mandatory further training, personal liability in the event of gross breaches of duty<\/p>\n<p><strong>3. binding reporting obligations &amp; business continuity: <\/strong>early warning report within 24 hours in the event of serious incidents, detailed report after 72 hours with root cause analysis and initial countermeasures, final report within one month including long-term preventive measures<\/p>\n<h3>NIS-2 requirements for supply chain management<\/h3>\n<p>What is particularly relevant with NIS-2 is that the requirements extend into the supply chain. Companies must be able to clearly demonstrate which suppliers and service providers have access to systems, data or critical processes &#8211; and how the associated risks are managed. This applies in particular to IT and cloud service providers, software providers, external service providers with system or data access and suppliers with digitally connected processes.  <\/p>\n<p>The specific requirements for supply chain management:<\/p>\n<h4><strong>Risk management for third parties<\/strong><\/h4>\n<p>Companies must identify risks arising from collaboration with suppliers and service providers &#8211; especially where external partners have access to systems, data or critical processes.<\/p>\n<ul>\n<li><strong>Example<\/strong>: An external IT service provider has remote access to productive systems or administers cloud infrastructures. Companies must assess what impact a failure, a security incident or inadequate protective measures at this service provider would have. <\/li>\n<\/ul>\n<h4><strong>Evaluation of security measures at suppliers<\/strong><\/h4>\n<p>It is not enough to rely on contractual assurances. Companies must be able to understand which security measures are actually in place at relevant suppliers and whether they match their own risk profile. <\/p>\n<ul>\n<li><strong>Example<\/strong>: A software provider confirms &#8220;appropriate security measures&#8221;. NIS-2 compliance is only achieved when it is clear whether, for example, access controls, patch management, incident response processes or certifications are in place &#8211; and how up-to-date they are. <\/li>\n<\/ul>\n<h4><strong>Documentation and verifiability<\/strong><\/h4>\n<p>Assessments, decisions and measures must be documented in a structured manner. In the event of an audit or incident, it is not just what has been implemented that counts, but that risks have been systematically assessed, decisions justified and measures recorded in a comprehensible manner. <\/p>\n<ul>\n<li><strong>Example<\/strong>: Why a certain supplier was classified as an &#8220;acceptable risk&#8221; &#8211; or why additional measures are required &#8211; must be explained transparently even months later.<\/li>\n<\/ul>\n<h4><strong>Regular checks instead of one-off queries<\/strong><\/h4>\n<p>NIS-2 understands cyber security as an ongoing process. Information from the supply chain must therefore not be collected once, but must be checked and updated regularly. <\/p>\n<ul>\n<li><strong>Example<\/strong>: The risk assessment must be adjusted in the event of contract extensions, new system access, changed services or security-relevant incidents &#8211; not just at the next audit.<\/li>\n<\/ul>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section class=\"snk-section snk-section_noBtn\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\">How companies ensure NIS 2 compliance (also in the supply chain)<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p>NIS-2 can seem complex at first glance, but with a clear roadmap, the requirements can be systematically implemented. This step-by-step guide shows which measures companies should take now &#8211; from risk assessment to audit preparation. <\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section class=\"snk-section snk-section_noPadding\">\n\t\t\t\t\t\t\t<div class=\"snk-mediaSlider \">\n\n\t\t\t\t\n\t\t\t\t\t<div class=\"snk-mediaSlider-slide\">\n\t\t\t\t\t\t<div class=\"snk-mediaSlider-container container \">\n\n\t\t\t\t\t\t\t<img decoding=\"async\" class=\"snk-mediaSlider-img\" src=\"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/NIS2_EN-scaled.webp\" alt=\"Step-by-step guide to NIS-2 compliance: what measures companies should take now \u2014 from risk assessment to audit readiness.\" title=\"Step-by-step guide to NIS-2 compliance\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/section>\n\t\n\n\n\t<section class=\"snk-section snk-section_noBtn\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\"> <\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3>1. clarify NIS-2 affectedness<\/h3>\n<p>To begin with, you should check whether your company is affected by the scope of the directive. Anyone who is part of the supply chain may also fall under the requirements. <\/p>\n<h3>2. carry out a gap analysis<\/h3>\n<p>Check risk management and incident response in particular: Are there clear processes for detecting and reporting incidents? Have access rights, encryption and MFA been implemented? How well are your service providers secured and are emergency and recovery plans up to date?  <\/p>\n<h3>3. develop a risk management strategy<\/h3>\n<p>Effective risk management forms the basis of every NIS 2 strategy.<br \/>\nThe core components are:<\/p>\n<ul>\n<li>Regular risk assessments for early identification of weak points<\/li>\n<li>Strong access controls (incl. MFA)<\/li>\n<li>Encryption<\/li>\n<li>Consistent patch management<\/li>\n<li>Regular penetration tests<\/li>\n<li>Establish a structured incident response plan and reporting process<\/li>\n<\/ul>\n<p>Those who proactively implement these measures reduce risks in the long term and strengthen cyber security throughout the company.<\/p>\n<h3>4. clarify and strengthen governance and responsibilities<\/h3>\n<p>NIS-2 clearly makes cybersecurity a management task. Management is responsible for actively designing, adopting and regularly reviewing security guidelines. <\/p>\n<p>The central elements are:<\/p>\n<ul>\n<li>Mandatory training for managers<\/li>\n<li>Clearly defined responsibilities (e.g. a designated security officer)<\/li>\n<li>a systematic review of the entire security strategy<\/li>\n<li>continuously maintained and complete safety documentation<\/li>\n<\/ul>\n<p>Strong governance not only ensures fewer security risks, but also reduces personal liability risks for management.<\/p>\n<h3>5. secure the supply chain<\/h3>\n<p>Third-party providers and service providers are increasingly becoming a central cyber risk factor &#8211; and with NIS-2, they also have a clear responsibility.<\/p>\n<p>To secure your supply chain, you should in particular:<\/p>\n<ul>\n<li>Systematically check the security level and protective measures of your service providers<\/li>\n<li>Make NIS 2 and compliance requirements binding in contracts<\/li>\n<li>Establish ongoing monitoring and control mechanisms to identify risks at an early stage<\/li>\n<\/ul>\n<p>This turns the supply chain into an effective protective shield: your company reduces both the real attack surface and the regulatory risk.<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section class=\"snk-section\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\">Conclusion: NIS-2 does not start in IT, but in the supply chain<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p>NIS-2 makes it clear that cyber risks cannot be managed in isolation in IT. Transparency in the supply chain, uniform assessments and the ability to <a href=\"https:\/\/verso.de\/en\/supplier-risk-management-solution\/\" target=\"_blank\" rel=\"noopener\">monitor and verify risks on an ongoing basis<\/a> are crucial. This is precisely where many companies fail due to manual processes and a lack of structure.<\/p>\n<p>With the <a href=\"https:\/\/verso.de\/en\/supply-chain-hub\/\" target=\"_blank\" rel=\"noopener\">VERSO Supply Chain Hub<\/a>, the NIS-2 guideline and cyber security in the supply chain can be mapped centrally: from structured risk queries with suppliers and a uniform assessment of third parties to the ongoing updating and central documentation of all evidence. In this way, NIS-2 is not only implemented in the supply chain in compliance with regulations, but also in a practicable and scalable manner.<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"snk-buttons snk-buttons_noGap\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"snk-btn-secondary\" href=\"https:\/\/verso.de\/en\/demo\/\"  target=\"_blank\">\n\t\t\t\t\t\t\t<svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M17.3423 12.5673H5.0673C4.90208 12.5673 4.76623 12.5141 4.65975 12.4076C4.55325 12.301 4.5 12.1651 4.5 11.9999C4.5 11.8346 4.55325 11.6988 4.65975 11.5924C4.76623 11.486 4.90208 11.4327 5.0673 11.4327H17.3423L11.6 5.70004C11.4949 5.58734 11.4391 5.45533 11.4327 5.30399C11.4263 5.15266 11.482 5.01941 11.6 4.90425C11.7179 4.78351 11.8513 4.72314 12 4.72314C12.1487 4.72314 12.282 4.78212 12.4 4.90007L18.9963 11.4964C19.0718 11.5719 19.1278 11.6502 19.1644 11.7311C19.2009 11.8121 19.2192 11.9022 19.2192 12.0013C19.2192 12.1005 19.2009 12.1901 19.1644 12.2702C19.1278 12.3504 19.0718 12.4282 18.9963 12.5037L12.4 19.1C12.2884 19.2116 12.1573 19.2689 12.0067 19.2721C11.8561 19.2753 11.7205 19.218 11.6 19.1C11.482 18.9795 11.4231 18.8455 11.4231 18.6981C11.4231 18.5507 11.482 18.4212 11.6 18.3096L17.3423 12.5673Z\" \/><\/svg>\n\t\t\t\t\t\t\t<span>Talk to us<\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section class=\"snk-section snk-section_noBtn\">\n\t\t<div class=\"container\">\t\n\t\t\t\n\t\t\t<div class=\"snk-textBlock\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"snk-section-headline\"> <\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5><em>* This information is summarized editorial content and should not be construed as legal advice. VERSO accepts no liability. <\/em><\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/section>\n\n\t\n\n\n\t<section >\n\t\t<div class=\"container\">\n\n\t\t\t\t\t\t<div class=\"snk-section snk-section_noBtn\">\n\t\t\t\t<div class=\"row snk-section-headline\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-12 col-md\">\n\t\t\t\t\t\t\t<h2>This might be also interesting for you:<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"snk-section\">\n\t\t\t\t\t<div class=\"snk-highlightTeasers\">\n\t\t\t\t\t\n\t\t\t\t\t\t<a href=\"https:\/\/verso.de\/en\/blog\/decarbonizing-the-supply-chain-how-companies-achieve-their-climate-targets-along-the-supply-chain\/\" class=\"snk-teaser snk-teaser_highlight\">\n\t\t\t\t\t\t\t<div class=\"snk-teaser-image\"><img decoding=\"async\" width=\"1500\" height=\"1000\" src=\"https:\/\/verso.de\/wp-content\/uploads\/2024\/03\/Lieferkette-dekarbonisieren.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"LKW-Fahrer mit Klemmbrett \u2013 Symbolbild f\u00fcr die Dekarbonisierung der Lieferkette\" srcset=\"https:\/\/verso.de\/wp-content\/uploads\/2024\/03\/Lieferkette-dekarbonisieren.webp 1500w, https:\/\/verso.de\/wp-content\/uploads\/2024\/03\/Lieferkette-dekarbonisieren-300x200.webp 300w, https:\/\/verso.de\/wp-content\/uploads\/2024\/03\/Lieferkette-dekarbonisieren-1024x683.webp 1024w, https:\/\/verso.de\/wp-content\/uploads\/2024\/03\/Lieferkette-dekarbonisieren-768x512.webp 768w\" sizes=\"(max-width: 1500px) 100vw, 1500px\" \/><\/div>\n\t\t\t\t\t\t\t<div class=\"snk-teaser-content snk-bg_2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"snk-teaser-date\">02.12.2025<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"snk-teaser-headline\">Decarbonizing the Supply Chain: How To Achieve Climate Goals Along the Supply Chain<\/h4>\n\n\t\t\t\t\t\t\t\t<div class=\"snk-btn-link\"><span><\/span>\n\t\t\t\t\t\t\t\t\tRead article\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<a href=\"https:\/\/verso.de\/en\/blog\/pcf-automation-in-6-steps\/\" class=\"snk-teaser snk-teaser_highlight\">\n\t\t\t\t\t\t\t<div class=\"snk-teaser-image\"><img decoding=\"async\" width=\"866\" height=\"611\" src=\"https:\/\/verso.de\/wp-content\/uploads\/2025\/11\/4111-1-1.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Product\" srcset=\"https:\/\/verso.de\/wp-content\/uploads\/2025\/11\/4111-1-1.webp 866w, https:\/\/verso.de\/wp-content\/uploads\/2025\/11\/4111-1-1-300x212.webp 300w, https:\/\/verso.de\/wp-content\/uploads\/2025\/11\/4111-1-1-768x542.webp 768w\" sizes=\"(max-width: 866px) 100vw, 866px\" \/><\/div>\n\t\t\t\t\t\t\t<div class=\"snk-teaser-content snk-bg_3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"snk-teaser-date\">18.11.2025<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"snk-teaser-headline\">PCF Automation in 6 Steps<\/h4>\n\n\t\t\t\t\t\t\t\t<div class=\"snk-btn-link\"><span><\/span>\n\t\t\t\t\t\t\t\t\tRead article\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t<\/section>\n\t\n\n\n\t<section class=\"snk-section snk-formComponent snk-bg_1 snk-formComponent_regular\">\n\t\t<div class=\"container\">\n\t\t\t<div class=\"row\">\n\t\t\t\t<div class=\"col-md-5\">\n\t\t\t\t\t<div class=\"snk-formComponent-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"snk-h1\">Subscribe to our newsletter!<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Sign up and receive regular news about:<\/p>\n<ul>\n<li>Current ESG topics and legislative changes<\/li>\n<li>Individual advice from the VERSO experts<\/li>\n<li>News about VERSO<\/li>\n<li>Sustainability Events and more<\/li>\n<\/ul>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t<div class=\" col-md-5 offset-md-1\">\n\t\t\t\t\t<div class=\"snk-formComponent-formWrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"hbspt-form js-hbspt-form\" data-formid=\"1dcf5b3a-176e-44f2-8aa7-14cfbfdb64bc\" data-region=\"na1\" data-portalid=\"6394926\"><\/div>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/section>\n\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":7286,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[101,1],"tags":[],"class_list":["post-7739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-supply-chain-en","category-unkategorisiert"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIS-2 in the supply chain - VERSO<\/title>\n<meta name=\"description\" content=\"What does NIS-2 mean for your supply chain? Find out who is affected and how you can manage cyber risks with service providers and partners.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS-2 in the supply chain\" \/>\n<meta property=\"og:description\" content=\"What does NIS-2 mean for your supply chain? Find out who is affected and how you can manage cyber risks with service providers and partners.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"VERSO\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/VersoGmbH\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-04T15:40:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T09:06:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Simone Hauser\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@VersoGmbH\" \/>\n<meta name=\"twitter:site\" content=\"@VersoGmbH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simone Hauser\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/\"},\"author\":{\"name\":\"Simone Hauser\",\"@id\":\"https:\/\/verso.de\/en\/#\/schema\/person\/3c56398b4abd0b04e9f227fce44b4ec9\"},\"headline\":\"NIS-2 in the supply chain\",\"datePublished\":\"2026-02-04T15:40:06+00:00\",\"dateModified\":\"2026-03-09T09:06:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/\"},\"wordCount\":5,\"publisher\":{\"@id\":\"https:\/\/verso.de\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp\",\"articleSection\":[\"Supply Chain\",\"Unkategorisiert\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/\",\"url\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/\",\"name\":\"NIS-2 in the supply chain - VERSO\",\"isPartOf\":{\"@id\":\"https:\/\/verso.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp\",\"datePublished\":\"2026-02-04T15:40:06+00:00\",\"dateModified\":\"2026-03-09T09:06:04+00:00\",\"description\":\"What does NIS-2 mean for your supply chain? Find out who is affected and how you can manage cyber risks with service providers and partners.\",\"breadcrumb\":{\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#primaryimage\",\"url\":\"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp\",\"contentUrl\":\"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp\",\"width\":1000,\"height\":667,\"caption\":\"Bild von einem Cyber-Angriff mit Computer und Code.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/verso.de\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS-2 in the supply chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/verso.de\/en\/#website\",\"url\":\"https:\/\/verso.de\/en\/\",\"name\":\"VERSO\",\"description\":\"We guide you through Sustainability. ESG, Supply Chain &amp; Climate\",\"publisher\":{\"@id\":\"https:\/\/verso.de\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/verso.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/verso.de\/en\/#organization\",\"name\":\"Verso\",\"alternateName\":\"VERSO GmbH\",\"url\":\"https:\/\/verso.de\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/verso.de\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/verso.de\/wp-content\/uploads\/2023\/11\/verso-logo.svg\",\"contentUrl\":\"https:\/\/verso.de\/wp-content\/uploads\/2023\/11\/verso-logo.svg\",\"width\":172,\"height\":42,\"caption\":\"Verso\"},\"image\":{\"@id\":\"https:\/\/verso.de\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/VersoGmbH\",\"https:\/\/x.com\/VersoGmbH\",\"https:\/\/www.linkedin.com\/company\/versogmbh\/?originalSubdomain=de\",\"https:\/\/www.youtube.com\/channel\/UC5dDxYuGCX4VzklbtqLV8SQ\",\"https:\/\/www.xing.com\/pages\/versogmbh\"],\"email\":\"kontakt@verso.de\",\"telephone\":\"+49 89 520 389 84\",\"legalName\":\"VERSO GmbH\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/verso.de\/en\/#\/schema\/person\/3c56398b4abd0b04e9f227fce44b4ec9\",\"name\":\"Simone Hauser\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/verso.de\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ca455c0d53fce6843871a359b4827fc8fd32096b2f074b374baab3b239d3ef61?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ca455c0d53fce6843871a359b4827fc8fd32096b2f074b374baab3b239d3ef61?s=96&d=mm&r=g\",\"caption\":\"Simone Hauser\"},\"url\":\"https:\/\/verso.de\/en\/blog\/author\/simi\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIS-2 in the supply chain - VERSO","description":"What does NIS-2 mean for your supply chain? Find out who is affected and how you can manage cyber risks with service providers and partners.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/","og_locale":"en_US","og_type":"article","og_title":"NIS-2 in the supply chain","og_description":"What does NIS-2 mean for your supply chain? Find out who is affected and how you can manage cyber risks with service providers and partners.","og_url":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/","og_site_name":"VERSO","article_publisher":"https:\/\/www.facebook.com\/VersoGmbH","article_published_time":"2026-02-04T15:40:06+00:00","article_modified_time":"2026-03-09T09:06:04+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp","type":"image\/webp"}],"author":"Simone Hauser","twitter_card":"summary_large_image","twitter_creator":"@VersoGmbH","twitter_site":"@VersoGmbH","twitter_misc":{"Written by":"Simone Hauser","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#article","isPartOf":{"@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/"},"author":{"name":"Simone Hauser","@id":"https:\/\/verso.de\/en\/#\/schema\/person\/3c56398b4abd0b04e9f227fce44b4ec9"},"headline":"NIS-2 in the supply chain","datePublished":"2026-02-04T15:40:06+00:00","dateModified":"2026-03-09T09:06:04+00:00","mainEntityOfPage":{"@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/"},"wordCount":5,"publisher":{"@id":"https:\/\/verso.de\/en\/#organization"},"image":{"@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp","articleSection":["Supply Chain","Unkategorisiert"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/","url":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/","name":"NIS-2 in the supply chain - VERSO","isPartOf":{"@id":"https:\/\/verso.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#primaryimage"},"image":{"@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp","datePublished":"2026-02-04T15:40:06+00:00","dateModified":"2026-03-09T09:06:04+00:00","description":"What does NIS-2 mean for your supply chain? Find out who is affected and how you can manage cyber risks with service providers and partners.","breadcrumb":{"@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#primaryimage","url":"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp","contentUrl":"https:\/\/verso.de\/wp-content\/uploads\/2026\/02\/2149101207.webp","width":1000,"height":667,"caption":"Bild von einem Cyber-Angriff mit Computer und Code."},{"@type":"BreadcrumbList","@id":"https:\/\/verso.de\/en\/blog\/nis-2-in-the-supply-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/verso.de\/en\/"},{"@type":"ListItem","position":2,"name":"NIS-2 in the supply chain"}]},{"@type":"WebSite","@id":"https:\/\/verso.de\/en\/#website","url":"https:\/\/verso.de\/en\/","name":"VERSO","description":"We guide you through Sustainability. ESG, Supply Chain &amp; Climate","publisher":{"@id":"https:\/\/verso.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/verso.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/verso.de\/en\/#organization","name":"Verso","alternateName":"VERSO GmbH","url":"https:\/\/verso.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verso.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/verso.de\/wp-content\/uploads\/2023\/11\/verso-logo.svg","contentUrl":"https:\/\/verso.de\/wp-content\/uploads\/2023\/11\/verso-logo.svg","width":172,"height":42,"caption":"Verso"},"image":{"@id":"https:\/\/verso.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/VersoGmbH","https:\/\/x.com\/VersoGmbH","https:\/\/www.linkedin.com\/company\/versogmbh\/?originalSubdomain=de","https:\/\/www.youtube.com\/channel\/UC5dDxYuGCX4VzklbtqLV8SQ","https:\/\/www.xing.com\/pages\/versogmbh"],"email":"kontakt@verso.de","telephone":"+49 89 520 389 84","legalName":"VERSO GmbH"},{"@type":"Person","@id":"https:\/\/verso.de\/en\/#\/schema\/person\/3c56398b4abd0b04e9f227fce44b4ec9","name":"Simone Hauser","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verso.de\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ca455c0d53fce6843871a359b4827fc8fd32096b2f074b374baab3b239d3ef61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ca455c0d53fce6843871a359b4827fc8fd32096b2f074b374baab3b239d3ef61?s=96&d=mm&r=g","caption":"Simone Hauser"},"url":"https:\/\/verso.de\/en\/blog\/author\/simi\/"}]}},"_links":{"self":[{"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/posts\/7739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/comments?post=7739"}],"version-history":[{"count":5,"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/posts\/7739\/revisions"}],"predecessor-version":[{"id":7962,"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/posts\/7739\/revisions\/7962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/media\/7286"}],"wp:attachment":[{"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/media?parent=7739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/categories?post=7739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/verso.de\/en\/wp-json\/wp\/v2\/tags?post=7739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}