{"id":2517,"date":"2025-05-16T15:48:01","date_gmt":"2025-05-16T13:48:01","guid":{"rendered":"https:\/\/asseco-ce.cloud\/?p=2517"},"modified":"2025-07-03T14:38:17","modified_gmt":"2025-07-03T12:38:17","slug":"nis-2-nova-vyzva-pre-projektovych-manazerov","status":"publish","type":"post","link":"https:\/\/asseco-ce.cloud\/en\/nis-2-new-challenge-for-project-managers\/","title":{"rendered":"NIS 2: A new challenge for project managers"},"content":{"rendered":"<p class=\"has-primary-color has-text-color has-link-color has-primary-font-family has-m-font-size wp-elements-863f7b9f6816fd792f906b7c68519bc1\" style=\"line-height:1.8\">The NIS 2 Directive introduces a new standard of cybersecurity in the European Union, which affects not only IT departments but also project management itself. Project managers are beginning to face the need to integrate NIS 2 requirements into the planning, execution, and monitoring of projects. For this reason, we organized a professional workshop for the Chamber of Project Managers, where we presented the main challenges arising from the NIS 2 Directive in the context of project management and how to respond to them effectively.<br><br>On Wednesday, May 14, members of the <a href=\"https:\/\/www.komorapm.sk\/\"><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-highlight-color\">Chamber of Project Managers<\/mark><\/em><\/a> gathered at the premises of Asseco CE Cloud in Prague, and together we immersed ourselves in a topic that strongly resonates across various sectors today \u2013 cybersecurity and the NIS 2 Directive.<br><br>Under the title <strong>\u201cNIS 2 \u2013 What Does It Mean for Project Managers,\u201d<\/strong> a workshop was held, led by Peter Br\u0165ka, CTO of Asseco CE Cloud and an experienced expert in cybersecurity, and Helena Ulrychov\u00e1 from the Digital and Information Agency. Together, they opened the door to a reality where cybersecurity is no longer a topic exclusively for IT departments.<\/p>\n\n\n\n<p class=\"has-highlight-color has-text-color has-link-color has-primary-font-family has-l-font-size wp-elements-5c1d6e710cd7a3fc81dca10ee0de6172\" style=\"line-height:1.8\"><strong><strong>The project manager as a link in the security chain<\/strong><\/strong><\/p>\n\n\n\n<p class=\"has-primary-font-family has-m-font-size\" style=\"line-height:1.8\">The workshop clearly demonstrated that the role of the project manager must adapt to the NIS 2 Directive. In addition to their regular responsibilities, the project manager must also have an overview of the security aspects of the project.<br><br>The key recommendation is to cooperate with a cybersecurity expert. Today, no major project can function without someone who possesses specific know-how in the field of cybersecurity. However, this cooperation should not be merely formal \u2013 the project manager should understand what risks are present and what the security measures specifically mean for the project team.<br><br>We also discussed responsibility. It is important to have clarity about where the project manager\u2019s role begins and ends. If the project manager is responsible for implementing security measures, they also bear personal responsibility for them. And this is no longer just an internal matter \u2013 the NIS 2 Directive brings real consequences.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" width=\"1024\" height=\"768\" data-image-position=\"1\" data-id=\"2522\" src=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-1024x768.jpg\" alt class=\"wp-image-2522 f-content__image\" style=\"border-radius:20px\" srcset=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-1024x768.jpg 1024w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-300x225.jpg 300w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-768x576.jpg 768w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-1536x1152.jpg 1536w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-16x12.jpg 16w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-600x450.jpg 600w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-1280x960.jpg 1280w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2-800x600.jpg 800w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-2.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" fetchpriority=\"high\"><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" width=\"1024\" height=\"819\" data-id=\"2523\" src=\"data:image\/svg+xml,%3Csvg%20width%3D%221024%22%20height%3D%22819%22%20xmlns%3D%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox%3D%220%200%201024%20819%22%3E%3C\/svg%3E\" alt class=\"wp-image-2523 f-content__image f-lazy js-lazy\" style=\"border-radius:20px\" data-src=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-3-1024x819.jpg\" data-srcset=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-3-1024x819.jpg 1024w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-3-300x240.jpg 300w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-3-768x614.jpg 768w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-3-1536x1229.jpg 1536w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-3-15x12.jpg 15w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-3.jpg 1920w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" fetchpriority=\"low\"><\/figure>\n<\/figure>\n\n\n\n<p class=\"has-highlight-color has-text-color has-link-color has-primary-font-family has-l-font-size wp-elements-4ab6cb2d5d94714e90e2cff641734d88\" style=\"line-height:1.8\"><strong><strong>Cybersecurity as a part of responsible project management<\/strong><\/strong><\/p>\n\n\n\n<p class=\"has-primary-font-family has-m-font-size\" style=\"line-height:1.8\">It was also emphasized that cybersecurity is not limited to the technical layer. The project manager must have an overview of the entire supply chain. Contracts with partners and suppliers should include provisions related to cybersecurity, and these requirements must be clearly communicated.<br><br>Equally important is being prepared for change. Security requirements may evolve during the course of a project, and it is necessary to respond to this through change management. Project documentation should also include a section dedicated to cybersecurity risk management \u2013 not as a formality, but as a living management tool.<\/p>\n\n\n\n<p class=\"has-highlight-color has-text-color has-link-color has-primary-font-family has-l-font-size wp-elements-8f42b0adf4d5406af7c0b9272d2a2436\" style=\"line-height:1.8\"><strong><strong>Where does the role of the project manager end and the role of the information security manager begin?<\/strong><\/strong><\/p>\n\n\n\n<p class=\"has-primary-font-family has-m-font-size\" style=\"line-height:1.8\">The discussion about the boundaries between organizational leadership, the project manager, and the security expert sparked exceptional interest. Who is responsible for what? And where do these roles overlap?<\/p>\n\n\n\n<p class=\"has-primary-font-family has-m-font-size\" style=\"line-height:1.8\">The project manager should have a basic understanding of the NIS 2 requirements, be able to translate them into project activities, and actively cooperate with the security specialist. Neither of these roles can function in isolation \u2013 only the combination of expert knowledge, experience, and quality project management leads to a result capable of meeting the demands of new regulations.<br><br>The workshop was also enriched by a representative from the National Cyber and Information Security Agency, Radek \u0158i\u010d\u00e1nek, who shared with us specific insights from real cases and oversight of cybersecurity measures implementation. It is always highly valuable when theoretical knowledge is connected with professional practice.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" width=\"1024\" height=\"819\" data-id=\"2524\" src=\"data:image\/svg+xml,%3Csvg%20width%3D%221024%22%20height%3D%22819%22%20xmlns%3D%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox%3D%220%200%201024%20819%22%3E%3C\/svg%3E\" alt class=\"wp-image-2524 f-content__image f-lazy js-lazy\" style=\"border-radius:20px\" data-src=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-4-1024x819.jpg\" data-srcset=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-4-1024x819.jpg 1024w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-4-300x240.jpg 300w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-4-768x614.jpg 768w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-4-15x12.jpg 15w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Workshop-KPM-4.jpg 1500w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" fetchpriority=\"low\"><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" width=\"1024\" height=\"1024\" data-id=\"2525\" src=\"data:image\/svg+xml,%3Csvg%20width%3D%221024%22%20height%3D%221024%22%20xmlns%3D%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox%3D%220%200%201024%201024%22%3E%3C\/svg%3E\" alt class=\"wp-image-2525 f-content__image f-lazy js-lazy\" style=\"border-radius:20px\" data-src=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21-1024x1024.jpg\" data-srcset=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21-1024x1024.jpg 1024w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21-300x300.jpg 300w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21-150x150.jpg 150w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21-768x768.jpg 768w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21-1536x1536.jpg 1536w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21-12x12.jpg 12w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21-240x240.jpg 240w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-21.jpg 1920w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" fetchpriority=\"low\"><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large has-custom-border\"><img decoding=\"async\" width=\"1024\" height=\"1024\" data-id=\"2526\" src=\"data:image\/svg+xml,%3Csvg%20width%3D%221024%22%20height%3D%221024%22%20xmlns%3D%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox%3D%220%200%201024%201024%22%3E%3C\/svg%3E\" alt class=\"wp-image-2526 f-content__image f-lazy js-lazy\" style=\"border-radius:20px\" data-src=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20-1024x1024.jpg\" data-srcset=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20-1024x1024.jpg 1024w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20-300x300.jpg 300w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20-150x150.jpg 150w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20-768x768.jpg 768w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20-1536x1536.jpg 1536w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20-12x12.jpg 12w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20-240x240.jpg 240w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2025\/05\/Image-20.jpg 1920w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" fetchpriority=\"low\"><\/figure>\n<\/figure>","protected":false},"excerpt":{"rendered":"<p>Smernica NIS 2 predstavuje nov\u00fd \u0161tandard kybernetickej bezpe\u010dnosti v Eur\u00f3pskej \u00fanii, ktor\u00fd sa dot\u00fdka nielen IT oddelen\u00ed, ale aj samotn\u00e9ho riadenia projektov. Projektov\u00ed mana\u017e\u00e9ri za\u010d\u00ednaj\u00fa \u010deli\u0165 potrebe integrova\u0165 po\u017eiadavky NIS 2 do pl\u00e1novania, realiz\u00e1cie aj kontroly projektov. Z tohto d\u00f4vodu sme pripravili &#8230;<\/p>","protected":false},"author":2,"featured_media":2521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"NIS2: Nov\u00e1 v\u00fdzva pre projektov\u00fdch mana\u017e\u00e9rov | Asseco CE Cloud","_seopress_titles_desc":"NIS2 a Projektov\u00fd mana\u017ement \u2705 workshop v Asseco CE Cloud \u2705 Komora projektov\u00fdch mana\u017eer\u016f","_seopress_robots_index":"","inline_featured_image":false,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-2517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podujatia"],"_links":{"self":[{"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/posts\/2517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/comments?post=2517"}],"version-history":[{"count":8,"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/posts\/2517\/revisions"}],"predecessor-version":[{"id":2839,"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/posts\/2517\/revisions\/2839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/media\/2521"}],"wp:attachment":[{"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/media?parent=2517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/categories?post=2517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/asseco-ce.cloud\/en\/wp-json\/wp\/v2\/tags?post=2517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}