{"id":8597,"date":"2025-05-12T11:41:11","date_gmt":"2025-05-12T09:41:11","guid":{"rendered":"https:\/\/ipsip.eu\/?p=8597"},"modified":"2025-07-09T12:05:50","modified_gmt":"2025-07-09T10:05:50","slug":"nis2-tpe-pme-ipsip","status":"publish","type":"post","link":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/","title":{"rendered":"NIS2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\/PME ?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8597\" class=\"elementor elementor-8597\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bda508a elementor-section-height-min-height elementor-section-content-middle elementor-section-full_width elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1bda508a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-933fbe0\" data-id=\"933fbe0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-617af8d4 animated-fast elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible\" data-id=\"617af8d4\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2627ac18 elementor-invisible\" data-id=\"2627ac18\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80e955a elementor-widget elementor-widget-heading\" data-id=\"80e955a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/ipsip.eu\/fr\/coro-ipsip-cybersecurity-tpe-pme\/\">Cybers\u00e9curit\u00e9<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25e645b elementor-widget elementor-widget-wpr-post-title\" data-id=\"25e645b\" data-element_type=\"widget\" data-widget_type=\"wpr-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"wpr-post-title\">NIS2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\/PME ?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-320966c elementor-widget elementor-widget-text-editor\" data-id=\"320966c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>IPSIP &#8211; 2025<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f944195 elementor-widget elementor-widget-heading\" data-id=\"f944195\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">NIS2 : quelles obligations pour les TPE\/PME ? <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62421e7 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"62421e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La <strong>directive NIS 2<\/strong> (en fran\u00e7ais : s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes d&rsquo;information) est une r\u00e9glementation europ\u00e9enne. Les Etats membres de l\u2019Union europ\u00e9enne (UE) sont tenus de transcrire cette directive \u00e0 l\u2019\u00e9chelle nationale depuis <strong>octobre 2024.<\/strong> Cette directive entrera en vigueur d\u00e8s que les textes de transposition (loi, d\u00e9crets, arr\u00eat\u00e9s) auront \u00e9t\u00e9 promulgu\u00e9s. Elle vise \u00e0 renforcer la cybers\u00e9curit\u00e9 des organisations publiques et priv\u00e9es op\u00e9rant dans des secteurs jug\u00e9s sensibles.<\/p><p>NIS 2 remplace la premi\u00e8re directive NIS adopt\u00e9e en 2016. Cette nouvelle version \u00e9largit le champ des entit\u00e9s concern\u00e9es, impose des exigences de s\u00e9curit\u00e9 plus strictes, et renforce les m\u00e9canismes de contr\u00f4le et de sanction.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6e4f7d elementor-widget elementor-widget-spacer\" data-id=\"d6e4f7d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-151e009 elementor-widget elementor-widget-heading\" data-id=\"151e009\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Qu'est-ce que la norme NIS2 ? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1076077 elementor-widget elementor-widget-heading\" data-id=\"1076077\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Contexte et \u00e9volution<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a017fda elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a017fda\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Depuis plusieurs ann\u00e9es, l\u2019UE est confront\u00e9e \u00e0 une multiplication des cyberattaques visant les infrastructures, les entreprises, et les citoyens.<\/p><p>La directive NIS2 vise \u00e0 am\u00e9liorer la r\u00e9silience des entreprises face aux cybermenaces. Pour cela, elle impose un ensemble d\u2019obligations dans des secteurs jug\u00e9s critiques ou importants pour le fonctionnement de nos soci\u00e9t\u00e9s.<\/p><p>Les grands objectifs :<\/p><ul><li>Am\u00e9liorer la cybers\u00e9curit\u00e9 des <strong>entit\u00e9s<\/strong> critiques<\/li><li>Harmoniser les niveaux de s\u00e9curit\u00e9 dans tous les \u00c9tats membres<\/li><li>Mieux g\u00e9rer les incidents cyber et limiter leur impact<\/li><li>Renforcer les obligations de reporting et de notification<\/li><li>Pr\u00e9voir des sanctions dissuasives<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a20dcc elementor-widget elementor-widget-spacer\" data-id=\"5a20dcc\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5006c4 elementor-widget elementor-widget-heading\" data-id=\"d5006c4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TPE et PME, \u00eates-vous concern\u00e9s par NIS 2 ?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-730cc9a elementor-widget elementor-widget-spacer\" data-id=\"730cc9a\" data-element_type=\"widget\" id=\"coro\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f19b0c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3f19b0c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>D\u2019apr\u00e8s la directive, sont concern\u00e9es les entreprises qui remplissent l\u2019un des deux crit\u00e8res suivants :<\/p><ul><li>Plus de 50 salari\u00e9s<\/li><li>Un chiffre d\u2019affaires annuel ou un total de bilan sup\u00e9rieur \u00e0 10 millions d\u2019euros\u00a0<\/li><\/ul><p>\u00a0<\/p><p>Les crit\u00e8res d\u2019\u00e9ligibilit\u00e9 ne se basent pas uniquement sur la taille de l\u2019entreprise, mais aussi sur le secteur d\u2019activit\u00e9 et le niveau de criticit\u00e9 des services fournis. Alors que la premi\u00e8re directive NIS visait principalement les grandes entreprises et les infrastructures critiques, NIS 2 \u00e9largit son champ d\u2019application aux entreprises de taille moyenne, voire aux petites entreprises dans certains cas.<\/p><p>Cependant, il existe une exception notable : certaines microentreprises et petites entreprises (moins de 50 salari\u00e9s et &lt; 10 M\u20ac de chiffre d\u2019affaires) sont aussi concern\u00e9es si elles op\u00e8rent dans un secteur critique.<\/p><p>Faites le test pour savoir si votre entit\u00e9 est concern\u00e9e sur le site du gouvernement : <a href=\"https:\/\/monespacenis2.cyber.gouv.fr\/simulateur\">https:\/\/monespacenis2.cyber.gouv.fr\/simulateur<\/a><\/p><p>\u00a0<\/p><p>En tant que dirigeant de TPE ou PME, il est essentiel de comprendre que :<\/p><ul><li>Vous \u00eates tout aussi expos\u00e9s aux risques que les grandes entreprises. Une attaque sur vos syst\u00e8mes d\u2019information pourrait entra\u00eener des co\u00fbts \u00e9lev\u00e9s, des sanctions, ou des pertes irr\u00e9parables.<\/li><li>La conformit\u00e9 \u00e0 la directive NIS2 n\u2019est pas une option, mais une n\u00e9cessit\u00e9 pour \u00e9viter des sanctions financi\u00e8res.<\/li><li>Se pr\u00e9parer \u00e0 la directive <strong>NIS2<\/strong> vous permet \u00e9galement de renforcer la confiance de vos clients. Les entreprises conformes \u00e0 la r\u00e9glementation sont per\u00e7ues comme plus fiables et s\u00e9curis\u00e9es.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efdd92e elementor-widget elementor-widget-spacer\" data-id=\"efdd92e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-712a3ed elementor-widget elementor-widget-heading\" data-id=\"712a3ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implications pour les entreprises : plus de d\u00e9tails<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f026cc6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"f026cc6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a85b603\" data-id=\"a85b603\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9064d27 elementor-widget elementor-widget-heading\" data-id=\"9064d27\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Secteurs concern\u00e9s<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8d2459 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e8d2459\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La directive identifie 18 secteurs sensibles, r\u00e9partis en deux grandes cat\u00e9gories : les secteurs dits \u201cessentiels\u201d, et les secteurs \u201cimportants\u201d.<\/p><p>Les secteurs \u00ab\u00a0essentiels\u00a0\u00bb :\u00a0<\/p><ul><li>\u00c9nergie (\u00e9lectricit\u00e9, gaz, p\u00e9trole)\u00a0<\/li><li>Transports<\/li><li>Sant\u00e9<\/li><li>Eau potable et eaux us\u00e9es<\/li><li>Infrastructures num\u00e9riques\u00a0<\/li><li>Administrations publiques<\/li><li>A\u00e9rospatiale \/ A\u00e9ronautique\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-beb4de2\" data-id=\"beb4de2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-628ee34 elementor-widget elementor-widget-spacer\" data-id=\"628ee34\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2692ecd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2692ecd\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c80f069\" data-id=\"c80f069\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e70a2c4 elementor-widget elementor-widget-spacer\" data-id=\"e70a2c4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0290b45 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0290b45\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les secteurs \u00ab\u00a0importants\u00a0\u00bb :\u00a0<\/p><ul><li>Services postaux et de messagerie<\/li><li>Gestion des d\u00e9chets<\/li><li>Production et distribution de produits chimiques<\/li><li>Alimentation<\/li><li>Fabrication de certains \u00e9quipements (m\u00e9dicaux, informatiques\u2026)<\/li><li>Recherche<\/li><li>Fournisseurs de services num\u00e9riques (plateformes, cloud, data centers, etc.)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-8165aef elementor-alert-info elementor-widget elementor-widget-alert\" data-id=\"8165aef\" data-element_type=\"widget\" data-widget_type=\"alert.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-alert\" role=\"alert\">\n\n\t\t\t\t\t\t<span class=\"elementor-alert-title\">Exemple d'application :<\/span>\n\t\t\t\n\t\t\t\t\t\t<span class=\"elementor-alert-description\">Une PME de 35 salari\u00e9s proposant des services d\u2019h\u00e9bergement cloud est consid\u00e9r\u00e9e comme une entit\u00e9 importante et doit appliquer la directive NIS 2, m\u00eame si elle n\u2019atteint pas les seuils classiques de taille.<\/span>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4a9264 elementor-widget elementor-widget-heading\" data-id=\"a4a9264\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Quelle obligations pour les entreprises concern\u00e9es ?<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9c815c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b9c815c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les structures vis\u00e9es par la directive doivent engager une vraie d\u00e9marche de s\u00e9curisation de leurs syst\u00e8mes d\u2019<strong>information<\/strong>. Cela implique d\u2019\u00e9valuer les risques, de mettre en place des dispositifs techniques (comme la protection r\u00e9seau, les sauvegardes r\u00e9guli\u00e8res, ou l\u2019authentification forte), mais aussi d\u2019instaurer des processus organisationnels (comme un plan de d\u00e9claration d\u2019incidents significatifs en 24 \u00e0 72h). Il faudra \u00e9galement nommer un responsable d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9.<\/p><p>Il s\u2019agit aussi de sensibiliser les \u00e9quipes : la <strong>cybers\u00e9curit\u00e9<\/strong> ne repose pas uniquement sur la technique, mais aussi sur les comportements humains. Une formation r\u00e9guli\u00e8re et adapt\u00e9e de vos collaborateurs peut faire une vraie diff\u00e9rence en cas de tentative d\u2019attaque<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2904ded elementor-widget elementor-widget-heading\" data-id=\"2904ded\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Quelles sont les sanctions de non-conformit\u00e9 \u00e0 NIS2 ?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10f8fbc elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"10f8fbc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ne pas se conformer \u00e0 la directive NIS2 peut entra\u00eener des sanctions s\u00e9v\u00e8res. En cas de non-respect des exigences de cybers\u00e9curit\u00e9, les <strong>entreprises<\/strong> peuvent se voir infliger des amendes pouvant atteindre jusqu\u2019\u00e0 10 millions d\u2019euros ou 2 % de leur chiffre d\u2019affaires mondial. Ces sanctions sont con\u00e7ues pour inciter les entreprises \u00e0 prendre au s\u00e9rieux les exigences de cybers\u00e9curit\u00e9, car les cons\u00e9quences d\u2019une cyberattaque peuvent \u00eatre bien plus co\u00fbteuses, tant en termes financiers que de r\u00e9putation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d8da7f elementor-widget elementor-widget-spacer\" data-id=\"4d8da7f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50873b1 elementor-widget elementor-widget-heading\" data-id=\"50873b1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Envie d\u2019y voir plus clair sur la cybers\u00e9curit\u00e9 ? Discutons-en ! <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bced13 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"8bced13\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/research.typeform.com\/to\/m4wHaZQN\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Rencontrer notre \u00e9quipe IPSIP<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5fc06d elementor-widget elementor-widget-spacer\" data-id=\"a5fc06d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5559c2 elementor-widget elementor-widget-heading\" data-id=\"e5559c2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NIS 2 : Transformer une obligation en avantage concurrentiel<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-775063e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"775063e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Chaque nouvelle r\u00e9glementation peut sembler \u00eatre une contrainte de plus. Pourtant, la directive NIS 2 ne doit pas \u00eatre per\u00e7ue uniquement comme une obligation \u00e0 subir. Elle peut devenir un vrai levier de croissance et de diff\u00e9renciation.<br \/><br \/>Mettre en place une strat\u00e9gie de cybers\u00e9curit\u00e9, m\u00eame simple, c\u2019est avant tout se prot\u00e9ger contre des menaces bien r\u00e9elles. C\u2019est aussi rassurer ses clients, partenaires et prestataires. Dans de nombreux cas, afficher sa conformit\u00e9 peut devenir un crit\u00e8re de s\u00e9lection dans les appels d\u2019offres, ou m\u00eame dans des n\u00e9gociations commerciales sensibles.<br \/><br \/>En s\u2019engageant dans une d\u00e9marche proactive, les dirigeants envoient un signal fort : celui d\u2019une entreprise moderne, responsable, capable d\u2019assurer la <strong>s\u00e9curit\u00e9<\/strong> des donn\u00e9es, la continuit\u00e9 de service, et de r\u00e9pondre aux nouvelles exigences du march\u00e9. La cybers\u00e9curit\u00e9 devient alors un avantage concurrentiel et un moteur de confiance pour l\u2019avenir.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc32e8c elementor-widget elementor-widget-heading\" data-id=\"dc32e8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Bonne pratiques pour se pr\u00e9parer ! <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5f363e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d5f363e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si vous \u00eates dirigeant d\u2019une <strong>TPE<\/strong> ou <strong>PME<\/strong>, la premi\u00e8re \u00e9tape est d\u2019\u00e9valuer si vous \u00eates concern\u00e9. Comme \u00e9voqu\u00e9 plus haut, le gouvernement met \u00e0 disposition un test en ligne pour le v\u00e9rifier rapidement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f257116 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"f257116\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/monespacenis2.cyber.gouv.fr\/directive\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Tester mon \u00e9ligibilit\u00e9<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09d5b2 elementor-alert-info elementor-widget elementor-widget-alert\" data-id=\"b09d5b2\" data-element_type=\"widget\" data-widget_type=\"alert.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-alert\" role=\"alert\">\n\n\t\t\t\t\t\t<span class=\"elementor-alert-title\">\ud83d\udca1 Adoptez une d\u00e9marche pragmatique<\/span>\n\t\t\t\n\t\t\t\t\t\t<span class=\"elementor-alert-description\">Commencez par un \u00e9tat des lieux de votre maturit\u00e9 en cybers\u00e9curit\u00e9. Identifiez les points critiques, mettez en place des mesures simples (comme les sauvegardes automatiques, les mises \u00e0 jour r\u00e9guli\u00e8res ou des mots de passe robustes), et formalisez un plan d\u2019action. Enfin, impliquez vos collaborateurs : m\u00eame une \u00e9quipe restreinte doit comprendre les enjeux et savoir comment r\u00e9agir face \u00e0 un incident.<\/span>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c634939 elementor-widget elementor-widget-spacer\" data-id=\"c634939\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b2bb7b elementor-widget elementor-widget-heading\" data-id=\"5b2bb7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TPE \/ PME : comment se mettre en conformit\u00e9 sans se ruiner ? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-015013d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"015013d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Vous pouvez avoir l\u2019impression que la cybers\u00e9curit\u00e9 est r\u00e9serv\u00e9e aux grands groupes avec d\u2019importants moyens. C\u2019est faux. Aujourd\u2019hui, il existe des solutions pens\u00e9es pour les petites structures : simples, abordables, efficaces comme <\/span><b>FlexSecure360<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ac48fb elementor-widget elementor-widget-image\" data-id=\"6ac48fb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"483\" src=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/04\/coro-product-screen-3-1-2048x1236-1-1024x618.webp\" class=\"attachment-large size-large wp-image-8421\" alt=\"PLATEFORME CORO\" srcset=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/04\/coro-product-screen-3-1-2048x1236-1-1024x618.webp 1024w, https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/04\/coro-product-screen-3-1-2048x1236-1-300x181.webp 300w, https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/04\/coro-product-screen-3-1-2048x1236-1-768x464.webp 768w, https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/04\/coro-product-screen-3-1-2048x1236-1-1536x927.webp 1536w, https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/04\/coro-product-screen-3-1-2048x1236-1-18x12.webp 18w, https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/04\/coro-product-screen-3-1-2048x1236-1.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecbcb95 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"ecbcb95\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/security.ipsip.eu\/plateforme-cybersecurite-saas-tpe-pme\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">D\u00e9couvrir notre solution de cybers\u00e9curit\u00e9 con\u00e7ue pour les TPE\/PME <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9aee1d6 elementor-widget elementor-widget-spacer\" data-id=\"9aee1d6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a3c6b8 elementor-widget elementor-widget-heading\" data-id=\"8a3c6b8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Besoin d'un accompagnement pour votre mise en conformit\u00e9 ? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-026bd81 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"026bd81\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nous comprenons que vous manquez de temps et de ressources pour v\u00e9rifier votre conformit\u00e9 et vous mettre \u00e0 jour. C\u2019est pourquoi nous vous proposons une solution adapt\u00e9e \u00e0 votre taille et \u00e0 vos ressources. Nous vous guidons de l\u2019audit \u00e0 la mise en place pour vous assurer que vous \u00eates en conformit\u00e9 sans perturber votre activit\u00e9.<\/p><p>FlexSecure360 est une solution de cybers\u00e9curit\u00e9 pens\u00e9e pour les petites et moyennes entreprises. Elle vous permet de renforcer la s\u00e9curit\u00e9 de vos syst\u00e8mes d\u2019information, de mettre en \u0153uvre des mesures simples et efficaces, et de garantir votre conformit\u00e9 \u00e0 la directive NIS 2, le tout sans complexit\u00e9 technique.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0c0895 elementor-widget elementor-widget-spacer\" data-id=\"a0c0895\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd8a732 elementor-widget elementor-widget-heading\" data-id=\"fd8a732\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Pourquoi agir d\u00e8s maintenant ? <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a5a5ba elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7a5a5ba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les entreprises doivent prendre au s\u00e9rieux la directive NIS2. Se pr\u00e9parer aujourd\u2019hui est essentiel pour \u00e9viter des sanctions et vous prot\u00e9ger des cyberattaques. Gr\u00e2ce \u00e0 notre solution de cybers\u00e9curit\u00e9 FlexSecure360, vous pouvez facilement r\u00e9pondre aux exigences de cette directive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8cf763 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"f8cf763\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/research.typeform.com\/to\/m4wHaZQN\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">\u00catre accompagn\u00e9 par nos experts<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>NIS2 : conna\u00eetre la directive NIS2, ses obligations, et comment \u00eatre en conformit\u00e9 avec un accompagnement complet.<\/p>\n","protected":false},"author":4,"featured_media":8619,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[14],"class_list":["post-8597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","tag-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\/PME ?<\/title>\n<meta name=\"description\" content=\"NIS2 : d\u00e9couvrez si vous \u00eates concern\u00e9s par la directive NIS2, ses obligations, et comment \u00eatre en conformit\u00e9 avec un accompagnement complet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS 2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\/PME ?\" \/>\n<meta property=\"og:description\" content=\"NIS2 : conna\u00eetre la directive NIS2, ses obligations, et comment \u00eatre en conformit\u00e9 avec un accompagnement complet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/\" \/>\n<meta property=\"og:site_name\" content=\"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-12T09:41:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-09T10:05:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/05\/IPSIP-CORO-Partenariat-_1_.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Lucie Cazanave Pin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucie Cazanave Pin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/\"},\"author\":{\"name\":\"Lucie Cazanave Pin\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\"},\"headline\":\"NIS2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\\\/PME ?\",\"datePublished\":\"2025-05-12T09:41:11+00:00\",\"dateModified\":\"2025-07-09T10:05:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/\"},\"wordCount\":1420,\"image\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/IPSIP-CORO-Partenariat-_1_.webp\",\"keywords\":[\"blog\"],\"articleSection\":[\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/\",\"name\":\"NIS2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\\\/PME ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/IPSIP-CORO-Partenariat-_1_.webp\",\"datePublished\":\"2025-05-12T09:41:11+00:00\",\"dateModified\":\"2025-07-09T10:05:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\"},\"description\":\"NIS2 : d\u00e9couvrez si vous \u00eates concern\u00e9s par la directive NIS2, ses obligations, et comment \u00eatre en conformit\u00e9 avec un accompagnement complet.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/fr\\\/nis2-tpe-pme-ipsip\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/IPSIP-CORO-Partenariat-_1_.webp\",\"contentUrl\":\"https:\\\/\\\/ipsip.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/IPSIP-CORO-Partenariat-_1_.webp\",\"width\":1920,\"height\":1080,\"caption\":\"IPSIP-CORO-NIS2\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#website\",\"url\":\"https:\\\/\\\/ipsip.eu\\\/\",\"name\":\"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\\\/7, solutions IT\",\"description\":\"Make IT Easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ipsip.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ipsip.eu\\\/#\\\/schema\\\/person\\\/018bf1ff3342010b31fef317fb455b3a\",\"name\":\"Lucie Cazanave Pin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g\",\"caption\":\"Lucie Cazanave Pin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\/PME ?","description":"NIS2 : d\u00e9couvrez si vous \u00eates concern\u00e9s par la directive NIS2, ses obligations, et comment \u00eatre en conformit\u00e9 avec un accompagnement complet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/","og_locale":"fr_FR","og_type":"article","og_title":"NIS 2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\/PME ?","og_description":"NIS2 : conna\u00eetre la directive NIS2, ses obligations, et comment \u00eatre en conformit\u00e9 avec un accompagnement complet.","og_url":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/","og_site_name":"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","article_published_time":"2025-05-12T09:41:11+00:00","article_modified_time":"2025-07-09T10:05:50+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/05\/IPSIP-CORO-Partenariat-_1_.webp","type":"image\/webp"}],"author":"Lucie Cazanave Pin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lucie Cazanave Pin","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/#article","isPartOf":{"@id":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/"},"author":{"name":"Lucie Cazanave Pin","@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a"},"headline":"NIS2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\/PME ?","datePublished":"2025-05-12T09:41:11+00:00","dateModified":"2025-07-09T10:05:50+00:00","mainEntityOfPage":{"@id":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/"},"wordCount":1420,"image":{"@id":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/#primaryimage"},"thumbnailUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/05\/IPSIP-CORO-Partenariat-_1_.webp","keywords":["blog"],"articleSection":["Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/","url":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/","name":"NIS2 : \u00eates-vous concern\u00e9 si vous \u00eates une TPE\/PME ?","isPartOf":{"@id":"https:\/\/ipsip.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/#primaryimage"},"image":{"@id":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/#primaryimage"},"thumbnailUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/05\/IPSIP-CORO-Partenariat-_1_.webp","datePublished":"2025-05-12T09:41:11+00:00","dateModified":"2025-07-09T10:05:50+00:00","author":{"@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a"},"description":"NIS2 : d\u00e9couvrez si vous \u00eates concern\u00e9s par la directive NIS2, ses obligations, et comment \u00eatre en conformit\u00e9 avec un accompagnement complet.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ipsip.eu\/fr\/nis2-tpe-pme-ipsip\/#primaryimage","url":"https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/05\/IPSIP-CORO-Partenariat-_1_.webp","contentUrl":"https:\/\/ipsip.eu\/wp-content\/uploads\/2025\/05\/IPSIP-CORO-Partenariat-_1_.webp","width":1920,"height":1080,"caption":"IPSIP-CORO-NIS2"},{"@type":"WebSite","@id":"https:\/\/ipsip.eu\/#website","url":"https:\/\/ipsip.eu\/","name":"Ipsip Group - Expert en Cybers\u00e9curit\u00e9, SOC 24\/7, solutions IT","description":"Make IT Easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsip.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/ipsip.eu\/#\/schema\/person\/018bf1ff3342010b31fef317fb455b3a","name":"Lucie Cazanave Pin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d6838a38e00982772ca2691ddb9c9a8e2b79908d2105766735445c4933160fd?s=96&d=mm&r=g","caption":"Lucie Cazanave Pin"}}]}},"_links":{"self":[{"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/posts\/8597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/comments?post=8597"}],"version-history":[{"count":49,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/posts\/8597\/revisions"}],"predecessor-version":[{"id":8853,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/posts\/8597\/revisions\/8853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/media\/8619"}],"wp:attachment":[{"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/media?parent=8597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/categories?post=8597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipsip.eu\/fr\/wp-json\/wp\/v2\/tags?post=8597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}