NIS2 is certainly receiving a lot of attention these days. The new directive has been mentioned in a great many studies, articles and speeches recently. Are you wondering how to get caught up with it, and how you can easily and quickly find out what is important from an IT perspective? Here you will find everything you need to plan and implement the new regulations in your organisation.
The NIS2 Directive (Network and Information Systems Directive 2) is the EU-wide legislation that sets general standards for cyber security. The directive covers institutions and companies that are essential to society’s functioning.
NIS2 is an update of the 2016 NIS Directive. The directive was enacted as a response to changes in the digital landscape and increasingly sophisticated cyber-attacks. All European Union countries must transpose the new directive into their national law, and the law interpretation must be published in each member state by October 2024.
NIS2 sets out new security rules for providers of essential services in key sectors. The NIS2 provisions cover both public institutions and private companies. Examples of their business areas include energy, banking, and healthcare.
NIS2 expands the scope of entities and covers more sectors of the economy.
The directive imposes new obligations on entities, such as:
implementation of risk analysis and management solutions,
introduction of a systems security policy,
securing supply chains,
developing a Business Continuity Plan.
The NIS2 Directive tightens incident reporting requirements and increases sanctions for non-compliance.
The new directive takes into account medium and large companies in selected industries and may also cover entities that are subcontractors or suppliers to these companies.
Predictions indicate that NIS2 will cover some tens of thousands of organisations than its predecessor. The new directive expands the catalogue to include the following entities, which are categorised as medium and large companies*:
Energy
Transport
Financial Market Infrastructures
Health
Drinking Water
Waste Water
Digital Infrastructure
ICT Service Management (business-to-business)
Space
Postal and courier services
Waste management
Digital providers
Research
NIS2 also imposes obligations related to monitoring and checking supply chain security. This category includes:
the process of detecting and responding to security incidents, and supporting technologies
cyclic pentesting and security audits
vulnerability management
security control of the supplier's software development process
Therefore, a company that isn’t directly covered by NIS2, but provides services to an organisation that is covered, may still have to comply with the directive.
Each UE membered country’s entity shall adopt and publish measures necessary to comply with this directive by 17 October 2024. They shall apply those measures from 18 October 2024.
However, all regulations should be based on the general provisions od the NIS2 Directive and achieve its goals and requirements.
UE countries have some leeway in interpreting the provisions - some countries' proposals include a change in the amount of penalties or even a change in the entities covered.
Essential Entities:
The maximum penalty can be EUR 10 million or 2% of the company's total annual worldwide turnover from the previous financial year, whichever is higher.
Important Entities:
The maximum penalty can be EUR 7 million or 1.4% of the company's total annual worldwide turnover from the previous financial year, whichever is higher.
Meet a tool that addresses many of the key challenges of the new directive - the IT management software Axence nVision®. Find out how we can support you in preparing for the entry into force of the new regulations and learn more about areas in which we are happy to help you.
Get to know the Inventory module in Axence nVision®. It allows you to carry out an inventory control easily and quickly. With its help, you can classify both physical resources, such as hardware or network infrastructure elements, and intangible resources, such as information collections. The inventory of resources is crucial in the risk analysis process. It allows you to properly identify key assets, such as IT infrastructure elements and the threats that affect them. This is the basis for implementing an integrated information security system.
The HelpDesk module in Axence nVision® allows you to:
Fill out the form to receive a recording of the webinar, during which the presenters will talk in detail and demonstrate in practice how to prepare for the new directive.
Supplying data is voluntary, but it is required by Axence in for contact purposes by. The personal data of the website users are administered by the service provider, within the scope of email address or phone number and other submitted information so that Axence may perform direct marketing Sp. by email or over the phone. The consent is voluntary and may be withdrawn at any moment, which shall not affect the legal compliance of the processing that has taken place on the basis of the consent prior to its withdrawal. The consent may be withdrawn by sending a relevant request to the following email address: dane.osobowe@axence.net. See more
Axence shall be understood as Axence INC (Tax Id. No. 30-0859649) for United States of America and Canada - and Axence Sp. z o.o. Sp. j. (Tax ID PL 6751399589) for the European Union and other countries. More:Privacy Policy. See more: Privacy Policyi.
Piotr Adamczyk
Technical Account Manager w Axence
Iva Tasheva
Co-founder and cybersecurity lead at CYEN