How ready is your company for NIS2?
The EU’s latest cybersecurity legislation raises the stakes for enterprises and IT leaders - and ensuring compliance can be a daunting task


Set to come into effect on 17 October 2024, the Network and Information Systems Directive (NIS2) is the European Union’s latest cybersecurity legislation aimed at enhancing security capabilities across the union and creating a more cohesive, aligned approach to mitigating emerging threats.
The legislation has been long in the making, and while organizations have had ample time to prepare, some have encountered difficulties in ensuring they are compliant.
Research from SailPoint in October 2023 found that a majority of UK firms were yet to introduce changes to adhere to key requirements outlined in the legislation.
The study, which was based on a survey of 1,500 IT decision-makers in the UK, Germany, and France, noted that a concerning number hadn’t even begun preparations.
Around 80% of respondents said they were still to properly assess and secure supply chains, while over three-quarters (76%) were yet to assess the efficiency of existing cybersecurity practices.
Three-quarters of organizations had also neglected to add new risk management processes (74%) while a similar number (72%) revealed they had made no efforts to bolster cybersecurity training for staff.
Speaking at the time, Stephen Bradford, senior vice president for EMEA at SailPoint, warned that the sluggish efforts from organizations raised parallels with GDPR.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“The threat landscape has been growing in volume and sophistication over recent years meaning the stakes have never been higher. Operational downtime, reputational damage, customer loss, and system restoration that follow any breach can cause a real headache for businesses,” he said.
“Organizations must learn from GDPR and use the next twelve months wisely to make sure cyber resilience is at the core of their business models.”
What is NIS2?
The directive is an updated version of the previous Network and Information Systems Directive (NIS) introduced by EU lawmakers in 2016, with new rules and requirements to enable organizations to contend with emerging security threats.
As part of this sweeping update, NIS2 will expand the number of protected critical sectors to 15 compared to its previous iteration, which saw just seven sectors identified as critical.
A key factor in this expansion lies in the potential material impact of a cyber attack on broader society if an organization in one of these industries was compromised.
Under NIS2, organizations will be graded as ‘essential’ or ‘important’ entities depending on the area they operate in.
Essential entities include:
- Energy providers
- Transport companies
- Banking and financial institutions
- Healthcare organizations
- Pharmaceutical manufacturers
- Water companies
- Public services
- Digital infrastructure organizations
- ICT services
Meanwhile, ‘important entities’ include:
- Postal and courier services
- Waste management firms
- Chemical manufacturers
- Food production and processing companies
- Electronics, machinery, and vehicle manufacturers
- Online marketplaces
- Higher education and research institutions
With this in mind, NIS2 not only expands the scope of the legislation to a broader array of industries, but also means stricter requirements for organizations, placing greater emphasis on proactive cybersecurity capabilities and operational resilience, as well as tightened supply chain security.
Under the legislation, organizations will be required to adhere to strict risk assessment and management rules, as well as new rules on incident reporting.
The latter of these is a particular key focus of the new legislation. Unlike its predecessor, NIS2 will require that every cybersecurity incident be reported regardless of whether it affected operations.
The goal of this is to help EU-based security authorities improve broader monitoring and response capabilities and create an aligned approach to cybersecurity across the union. As part of this approach, every EU member state will designate a Computer Security Incident Response Team (CSIRT) for incident reporting.
Reporting requirements in the event of an incident come in three key stages, starting with an initial disclosure - or ‘early warning’ - within 24 hours.
A second, more detailed report must be submitted within 72 hours containing an assessment of the incident, including its potential severity, impact, and indicators of compromise. A third, final, and comprehensive report must then be submitted within one month under the legislation.
Harsher penalties for those found in breach of the directive will also come into effect, raising the stakes for non-compliant organizations. Fines can reach up to €10 million for non-compliant organizations or 2% of global annual revenue, or whichever is higher.
Notably, under Article 31 of the legislation, senior management figures can be held accountable in the event of a breach that authorities deem to have been due to a lack of oversight or appropriate safeguards.
According to EU lawmakers, the addition of liabilities for senior management is aimed at emphasizing the importance of the legislation while relieving the burden placed on IT teams.
“In an attempt to lower the pressure put on IT departments to single-handedly ensure the security of the organization and to change the sentiment of whose responsibility cybersecurity is, NIS2 includes new measures to hold top management personally liable and responsible for gross negligence in the event of a security incident,” according to official NIS2 learning materials..
“Specifically, NIS2 allows Member State authorities to hold organization managers personally liable if gross negligence is proven after a cyber incident.”
This raises the stakes for the C-suite and security leaders and means senior management must take steps to ensure compliance. But what steps can organizations take to comply?
How can organizations prepare for NIS2?
First and foremost, it’s critical for organizations to realize that NIS2 does not apply specifically to European entities, but also to any that operate within the union, even if they are headquartered outside the EU. This widens the scope of the legislation significantly and underlines the wider implications of the new rules for enterprises.
Organizations that fall under the scope of the regulation can start by assessing their risk profile to establish any potential weak points within their internal cybersecurity processes.
Risk assessments can be carried out by in-house staff. However, in some circumstances, organizations may not have the capabilities or financial resources to conduct such an extensive audit. In these scenarios, employing the services of a third-party provider to conduct this on your behalf could be an option.
Audits of external risk are also advised given the strong emphasis NIS2 places on supply chain security. According to research from Gartner, almost half (45%) of organizations are expected to have experienced a software supply chain attack by 2025.
With NIS2 set to be in effect by then, organizations must ensure they assess any risks posed by managed services providers and third-party vendors.
In preparation for NIS2, organizations must also assess how they intend to ensure business continuity in the event of a serious cybersecurity incident. Best practice tips from the EU include formulating plans on emergency procedures and system recovery in the event of an incident.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Data sovereignty a growing priority for UK enterprises
News Many firms view data sovereignty as simply a compliance issue
By Emma Woollacott Published
-
Elevating compliance standards for MSPs in 2025
Industry Insights The security landscape is set to change significantly in the years to come with new regulations coming into effect next year, here's how the channel needs to adapt
By Ross Brewer Published
-
Five ways cyber criminals target healthcare and how to stop them
Supported content Medical institutions are among the top targets for threat actors, here five major threats facing the healthcare sector and what organizations can do to stay secure
By Solomon Klappholz Published
-
Where will AI take security, and are we ready?
whitepaper Steer through the risks and capitalise on the benefits of AI in cyber security
By ITPro Published
-
Does every business need zero trust?
Supported content ‘Never trust, always verify’ and your business might reap more than just the security benefits
By Bobby Hellard Published
-
In-house skills and co-management, what is the balance to optimize security skills needed for cyber resilience
Supported Content Balancing in-house cybersecurity skills with co-management is key to achieving robust cyber resilience, ensuring businesses are equipped to counter evolving threats effectively
By Rene Millman Published
-
Securing a multi-cloud environment
Supported Content With businesses increasingly opting to use a variety of cloud providers, ensuring complete security is more important than ever
By George Fitzmaurice Published
-
How to balance your understanding of threats and how you respond to them
Supported Content Learn how to effectively balance deep threat comprehension with timely response strategies to protect your organization from evolving cybersecurity risks
By Rene Millman Published