{"version":"1.0","provider_name":"Boost","provider_url":"https:\/\/boost.hr\/en\/","title":"Consultation on the draft of cyber security act - Boost","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"cPsTo3CnXi\"><a href=\"https:\/\/boost.hr\/en\/consultation-on-the-draft-of-cyber-security-act\/\">Consultation on the draft of cyber security act<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/boost.hr\/en\/consultation-on-the-draft-of-cyber-security-act\/embed\/#?secret=cPsTo3CnXi\" width=\"600\" height=\"338\" title=\"&#8220;Consultation on the draft of cyber security act&#8221; &#8212; Boost\" data-secret=\"cPsTo3CnXi\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/boost.hr\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/boost.hr\/wp-content\/uploads\/2023\/08\/kiberneticka-sigurnost-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1707,"description":"The NIS2 Directive sets substantially expanded requirements in relation to the NIS1 Directive, why the existing Cybersecurity Act of Essential Service Operators and Digital Service Providers (\u201eNarodne novine \u201c, number 64\/18), which transposed the NIS1 directive in the Republic of Croatia, must be repealed and a new framework must be prepared to manage the much more complex requirements of the NIS2 directive."}