How to Meet the New Cybersecurity Requirements Effectively