{"id":3707,"date":"2025-10-08T13:14:59","date_gmt":"2025-10-08T11:14:59","guid":{"rendered":"https:\/\/www.cybreg.cz\/events\/from-risk-analysis-to-certainty-how-to-back-up-and-be-nis2-dora-compliant\/"},"modified":"2025-11-30T21:55:43","modified_gmt":"2025-11-30T20:55:43","slug":"from-risk-analysis-to-certainty-how-to-back-up-and-be-nis2-dora-compliant","status":"publish","type":"events","link":"https:\/\/www.cybreg.cz\/en\/events\/from-risk-analysis-to-certainty-how-to-back-up-and-be-nis2-dora-compliant\/","title":{"rendered":"From risk analysis to certainty: How to back up and be NIS2\/DORA compliant?"},"content":{"rendered":"\n<p>Cybersecurity is no longer just a&nbsp;technical issue &#8211; risk management and compliance with legislation, in particular with the requirements of the NIS2 Directive or the DORA Regulation, is a&nbsp;key component.<\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is no longer just a&nbsp;technical issue &#8211; risk management and compliance with legislation, in particular with the requirements of the NIS2 Directive or the DORA Regulation, is a&nbsp;key component.<\/p>\n","protected":false},"featured_media":3335,"template":"","event_tag":[],"class_list":["post-3707","events","type-events","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.cybreg.cz\/en\/wp-json\/wp\/v2\/events\/3707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybreg.cz\/en\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.cybreg.cz\/en\/wp-json\/wp\/v2\/types\/events"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cybreg.cz\/en\/wp-json\/wp\/v2\/media\/3335"}],"wp:attachment":[{"href":"https:\/\/www.cybreg.cz\/en\/wp-json\/wp\/v2\/media?parent=3707"}],"wp:term":[{"taxonomy":"event_tag","embeddable":true,"href":"https:\/\/www.cybreg.cz\/en\/wp-json\/wp\/v2\/event_tag?post=3707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}