{"id":34495,"date":"2025-08-11T04:00:26","date_gmt":"2025-08-11T08:00:26","guid":{"rendered":"https:\/\/www.rsa.com\/?p=34495"},"modified":"2026-03-24T17:10:25","modified_gmt":"2026-03-24T21:10:25","slug":"nis2-identity-it-and-ot-stay-operational-stay-resilient","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/","title":{"rendered":"NIS2, Identit\u00e9, IT et OT : rester op\u00e9rationnel, rester r\u00e9silient"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":34532,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-34495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient - RSA<\/title>\n<meta name=\"description\" content=\"Learn why passwordless enables Zero Trust and why critical services need the modern authentication technique to secure OT and meet NIS2 requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient | RSA Blog\" \/>\n<meta property=\"og:description\" content=\"Learn why passwordless enables Zero Trust and why critical services need the modern authentication technique to secure OT and meet NIS2 requirements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-11T08:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T21:10:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-social.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ben Lebeaux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient | RSA Blog\" \/>\n<meta name=\"twitter:description\" content=\"Learn why passwordless enables Zero Trust and why critical services need the modern authentication technique to secure OT and meet NIS2 requirements.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-social.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@bcomroe@logical-inc.com\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/\"},\"author\":{\"name\":\"Ben Lebeaux\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\"},\"headline\":\"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient\",\"datePublished\":\"2025-08-11T08:00:26+00:00\",\"dateModified\":\"2026-03-24T21:10:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/\"},\"wordCount\":9,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-blog.webp\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/\",\"name\":\"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-blog.webp\",\"datePublished\":\"2025-08-11T08:00:26+00:00\",\"dateModified\":\"2026-03-24T21:10:25+00:00\",\"description\":\"Learn why passwordless enables Zero Trust and why critical services need the modern authentication technique to secure OT and meet NIS2 requirements.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-blog.webp\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-blog.webp\",\"width\":1200,\"height\":741,\"caption\":\"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/zero-trust\\\/nis2-identity-it-and-ot-stay-operational-stay-resilient\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/597f5b8f2d9eb8876c9be212f4dcdce9\",\"name\":\"Ben Lebeaux\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/bcomroe@logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2, identit\u00e9, IT et OT : rester op\u00e9rationnel, rester r\u00e9silient - RSA","description":"D\u00e9couvrez pourquoi l'absence de mot de passe permet une confiance z\u00e9ro et pourquoi les services critiques ont besoin d'une technique d'authentification moderne pour s\u00e9curiser OT et r\u00e9pondre aux exigences de NIS2.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/","og_locale":"fr_CA","og_type":"article","og_title":"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient | RSA Blog","og_description":"Learn why passwordless enables Zero Trust and why critical services need the modern authentication technique to secure OT and meet NIS2 requirements.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/","og_site_name":"RSA","article_published_time":"2025-08-11T08:00:26+00:00","article_modified_time":"2026-03-24T21:10:25+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-social.webp","type":"image\/webp"}],"author":"Ben Lebeaux","twitter_card":"summary_large_image","twitter_title":"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient | RSA Blog","twitter_description":"Learn why passwordless enables Zero Trust and why critical services need the modern authentication technique to secure OT and meet NIS2 requirements.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-social.webp","twitter_creator":"@bcomroe@logical-inc.com","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/"},"author":{"name":"Ben Lebeaux","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9"},"headline":"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient","datePublished":"2025-08-11T08:00:26+00:00","dateModified":"2026-03-24T21:10:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/"},"wordCount":9,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-blog.webp","articleSection":["Zero Trust"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/","url":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/","name":"NIS2, identit\u00e9, IT et OT : rester op\u00e9rationnel, rester r\u00e9silient - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-blog.webp","datePublished":"2025-08-11T08:00:26+00:00","dateModified":"2026-03-24T21:10:25+00:00","description":"D\u00e9couvrez pourquoi l'absence de mot de passe permet une confiance z\u00e9ro et pourquoi les services critiques ont besoin d'une technique d'authentification moderne pour s\u00e9curiser OT et r\u00e9pondre aux exigences de NIS2.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-blog.webp","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/nis2-identity-it-and-ot-stay-operational-stay-resilient-rsa-blog.webp","width":1200,"height":741,"caption":"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/zero-trust\/nis2-identity-it-and-ot-stay-operational-stay-resilient\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"NIS2, Identity, IT, and OT: Stay Operational, Stay Resilient"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/597f5b8f2d9eb8876c9be212f4dcdce9","name":"Ben Lebeaux","sameAs":["https:\/\/x.com\/bcomroe@logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/34495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=34495"}],"version-history":[{"count":9,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/34495\/revisions"}],"predecessor-version":[{"id":37432,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/34495\/revisions\/37432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/34532"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=34495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories?post=34495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/tags?post=34495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}