{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/ad43d70d6c374b00ae1fa8c147de80a4\" frameborder=\"0\" width=\"1920\" height=\"1440\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1440,"width":1920,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1440,"thumbnail_width":1920,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/ad43d70d6c374b00ae1fa8c147de80a4-3eed105a9c38b8ce.gif","duration":301.1627,"title":"Foundations of NIS2 Directive","description":"In this video, I provide an overview of the NIS2 directive, explaining its background, reasons for implementation, and key improvements over the original NIS directive. I discuss the importance of information cyber security, the shortcomings of the original directive, and how NIS2 aims to enhance cyber resilience in vital industries. No specific action is requested from viewers in this video."}