Compliance

    NIS2 Compliance

    NIS2 is the EU directive that requires essential and important organizations across 18 sectors to implement structured cybersecurity measures, report incidents within 72 hours, and prove their security works in practice.

    Navigate the EU's updated cybersecurity directive with confidence. We help you achieve and maintain NIS2 compliance through practical, risk-based security measures.

    NIS2 Directive Overview
    ScopeEU-WIDE
    18
    Sectors
    €10M
    Max Fine
    Applies to essential and important entities across critical infrastructure sectors

    Key NIS2 Requirements

    Risk Management

    Implement clear and structured measures to identify, assess, and manage cyber risks across your organisation.

    Incident Reporting

    Report significant security incidents to the relevant authorities within the required 24 to 72-hour timeframe.

    Supply Chain Security

    Identify and manage cybersecurity risks introduced by suppliers, service providers, and partners.

    Continuous Monitoring

    Continuously monitor systems and environments to detect threats and suspicious activity in a timely manner.

    Access Control

    Enforce strong authentication and manage user accounts, roles, and access rights properly.

    Documentation

    Maintain clear policies, procedures, and evidence to demonstrate compliance and support audits.

    Management is personally accountable under NIS2

    NIS2 Article 20 is one of the most significant changes from its predecessor. Cybersecurity is no longer delegable to IT alone.

    Management must approve and oversee

    Article 20 of NIS2 (Directive EU 2022/2555) requires management bodies to approve cybersecurity risk management measures and actively oversee their implementation. Delegating cybersecurity entirely to IT without board-level involvement no longer satisfies the directive.

    Personal liability for board members

    Management bodies can be held personally liable for non-compliance with NIS2 obligations. National supervisory authorities have the power to temporarily prohibit individuals from exercising management functions in cases of serious violations. This applies to directors and board members directly.

    Security training for management is required

    Article 20 also requires that management body members receive sufficient training in cybersecurity risk management. The intent is that boards make informed decisions about security investments and priorities based on genuine understanding, not just high-level briefings.

    Fines and enforcement: Article 34

    NIS2 Article 34 introduces a two-tier fine structure tied to your entity classification. Both thresholds are significantly higher than NIS1.

    Essential entities

    Administrative fines up to €10 million or 2% of global annual turnover, whichever is higher. Essential entities are subject to proactive supervision including regular audits, security assessments, and on-site inspections. Non-compliance can trigger enforcement before an incident occurs.

    Important entities

    Administrative fines up to €7 million or 1.4% of global annual turnover, whichever is higher. Important entities are subject to reactive supervision: oversight is triggered after a complaint or evidence of non-compliance rather than proactively.

    Incident reporting: three deadlines, not one

    NIS2 Article 23 introduces a structured three-stage notification process. Each stage has a different purpose and a different audience.

    Within 24 hours: early warning

    As soon as you become aware of a significant incident, send an early warning to your national CSIRT or competent authority. You confirm the incident occurred, note whether a cyberattack is suspected, and flag any cross-border impact. The purpose is to allow authorities to assist or take protective action.

    Within 72 hours: incident notification

    Within 72 hours of becoming aware, submit a more complete incident notification. This includes an initial assessment of severity, affected systems or services, and an estimate of the number of affected users. If your first notification already contained this detail, you update it.

    Within 1 month: final report

    Within one month of the incident notification, a full report is required. This must include a description of the incident, its root cause, the measures taken and planned, and an assessment of any cross-border impact. This report determines regulatory follow-up.

    How We Help

    NIS2 gap analysis and readiness assessment
    Security policy development and documentation
    Technical controls implementation
    Incident response planning
    Supply chain risk assessment
    Management reporting and board presentations
    Complete
    NIS2 compliance program
    4-12
    Weeks to readiness
    100%
    Audit support

    Frequently Asked Questions

    Start your NIS2 compliance journey

    Get a gap analysis and roadmap to compliance.