Back to Home
ASSA Abloy Cliq

Building Resilience: What Every Critical Entity Needs to Know About the CER Directive


Building Resilience: What Every Critical Entity Needs to Know About the CER Directive (Part 10 of our CER Series)

 

The Critical Entities Resilience (CER) Directive is transforming how critical infrastructure organizations across Europe prepare for, respond to, and recover from threats. Whether you’re operating in energy, transport, water, or digital services, CER demands a shift from isolated risk management to an integrated, all-hazards resilience strategy.

Over the past weeks, we’ve published a series of in-depth articles, use cases, and infographics to help critical entities understand and implement the directive. Here is your complete guide:

 


 

πŸ”Ž  1. The Impact of the CER Directive

We started with a comprehensive overview of what the CER Directive requires: from mandatory risk assessments and incident reporting to physical and cyber access controls.

πŸ‘‰ Read: The Impact of the Critical Entities Resilience (CER) Directive on Key Systems

 


 

πŸ› οΈ  2. Adapting to the CER Directive

We explored how the directive is driving operational change in Facility Management and ICT, particularly in the way physical and logical access are managed.

πŸ‘‰ Read: Adapting to the CER Directive: Organizational Changes in Facility Management and ICT

 


 

βš–οΈ  3. Accountability and Legal Liability

Our legal deep-dive examined the personal and organizational consequences of non-compliance β€” including civil and criminal liability for directors.

πŸ‘‰ Read: Accountability and Legal Liability Under the CER Directive

 


 

⚑  4. Legal Risk in the Energy Sector

Focusing on one of the most regulated sectors, this article outlines how the energy industry must respond to CER’s resilience and reporting demands.

πŸ‘‰ Read: Legal Accountability in the Energy Sector Under the CER Directive

 


 

πŸ”  5. Use Case: Contractor Access & Keycard Sabotage

A fictional incident shows what happens when a contractor’s keycard is cloned and used for sabotage. The use-case illustrates the serious financial and business impact not only on the organization but also on its supply chain.

πŸ‘‰ Read: Use Case: Contractor Access & Keycard Sabotage

 


 

πŸ‘€  6. The Rise of the CRO

The CER Directive demands strong executive leadership. We outlined the emerging role of the Chief Resilience Officer (CRO) and how it supports compliance.

πŸ‘‰ Read: The Rise of the Chief Resilience Officer: How the CER Directive Forces Organizational Change

 


 

🚨  7. Case Study: How the CRO Averted Disaster

A deeper case scenario illustrates how the CRO’s leadership structure enables fast incident response and smooth coordination with national authorities.

πŸ‘‰ Read: Case Study: How the CRO Averted Escalation During a National Grid Sabotage Attempt

 


 

🧠  8. CRO vs CISO: Who Does What?

This infographic breaks down the distinct (but connected) responsibilities of the CRO and CISO β€” both essential for CER compliance.

πŸ‘‰ Read: CRO vs. CISO Under the CER Directive

 


 

🌊  9. Use Case: Combined Crisis in Rail Infrastructure

We simulated a dual crisis β€” a flood and cyber sabotage of switching systems β€” to show how a CRO and CISO work together under real-world CER pressure.

πŸ‘‰ Read: Use Case: Flooding and Sabotage in Rail and the Role of the CRO and CISO

 


 

πŸ“˜  Free Download: CER Implementation Plan

We’ve compiled all insights into a 10-page CER Implementation Plan designed for critical infrastructure operators. It includes:

  • Organizational structure

  • Legal preparation

  • Technology & cybersecurity

  • Business continuity & procurement

  • Timeline and budget framework

πŸ‘‰ Download our CER Implementation Plan

 


 

Get Ready for Resilience

The CER Directive is no longer optional β€” it’s law. Now is the time to assess, align, and act. Whether you’re just getting started or refining your approach, this blog series and downloadable plan will help your organization build structured, defensible, and auditable resilience.

Do you want a customized version of this plan for your sector? Let us know at info@key2xs.com 

 

πŸ‡³πŸ‡± Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

πŸ‡¬πŸ‡§ Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.