<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>m2apartners.cz</provider_name><provider_url>https://m2apartners.cz/en/</provider_url><author_name>Alexandra Posp&#xED;&#x161;ilov&#xE1;</author_name><author_url>https://m2apartners.cz/en/author/pospisilova/</author_url><title>Amendment to the Cybersecurity Act - m2apartners.cz</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="F0r9GDFHBv"&gt;&lt;a href="https://m2apartners.cz/en/amendment-to-the-cybersecurity-act/"&gt;Amendment to the Cybersecurity Act&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://m2apartners.cz/en/amendment-to-the-cybersecurity-act/embed/#?secret=F0r9GDFHBv" width="600" height="338" title="&#x201C;Amendment to the Cybersecurity Act&#x201D; &#x2014; m2apartners.cz" data-secret="F0r9GDFHBv" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://m2apartners.cz/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://m2apartners.cz/wp-content/uploads/2025/12/Novela-kybernetickeho-zakona-vizual-web.png</thumbnail_url><thumbnail_width>945</thumbnail_width><thumbnail_height>1181</thumbnail_height><description>Since 1 November, a new law on cyber security has been in force, which implements the changes introduced by the NIS Directive2. Who is affected by the law The legislation will affect entities that provide any of the regulated services. A list of these services and other criteria is set out in the Annex to [&hellip;]</description></oembed>
