NIS2 solutions

Europe's most comprehensive cybersecurity directive to date, the Network and Information Systems Directive (NIS2), will come into effect in 2024. It introduces stricter regulations for risk management and incident reporting, and expands its scope to cover a wider range of industries.

these businesses trust in benchmarked to stay secure, compliant, and in control

15

Number of sectors covered by NIS2 Directive. If your company works in the sector defined, it needs to be NIS2 Compliant

€10MM

Maximum fine for NIS2 non-compliance for all companies that are audited per year per company

160K+

Estimated companies that will be affected by NIS2 and will have to become compliant

What is the NIS2 directive?

The NIS2 Directive, an updated EU cybersecurity rule introduced to address gaps from its predecessor, the NIS, has a wider scope, encompassing more sectors than before. It aims to unify cybersecurity standards across the EU and introduce stricter penalties for those who don’t comply.

The directive emphasizes a risk-based approach, meaning organizations should protect their systems based on potential threats. Collaboration is key, as NIS2 encourages information sharing among stakeholders. Moreover, it requires comprehensive incident reporting to help understand and counter emerging threats.

Is your company impacted?

The NIS2 directive expands coverage from the original 7 sectors under the NIS directive, adding 8 more for a total of 15 sectors. To access sector-specific NIS2 information, simply click on one of the sectors listed below.

NIS2 classifies organizations as either “Essential Entities” (EE) or “Important Entities” (IE). Public or private entities in these sectors with over 50 employees and an annual turnover above 10M have to determine their group and follow the related rules.

Sectors list

NIS 2 classifies organizations as either “Essential Entities” (EE) or “Important Entities” (IE). Public or private entities in these sectors with over 50 employees and an annual turnover above 10M have to determine their group and follow the related rules.
List of Essentials Entities (250 employees, annual turnover of 50M EUR

Energy

Covers the crucial energy sectors of electricity, oil, and gas, underscoring their importance in everyday functions and the need for cybersecurity.

 

Transport

Focuses on the major modes of transport: air, rail, sea, and road, highlighting their role in connecting people and places.

 

Healthcare

Prioritizes the protection of healthcare settings, encompassing both public hospitals and private clinics, given their role in public welfare.

 

Public Administration

Emphasizes the protection of public services, reflecting the directive’s commitment to ensure uninterrupted and secure administrative functions.

 

Banking & Financial Market Infrastructure

Addresses the backbone of our financial system, spotlighting areas like payment services that facilitate economic activities.

 

Digital Infrastructures

Targets foundational digital services, such as those providing DNS and TLD registries, acknowledging their role in the digital ecosystem.

 

Water Supply

Focuses on the preservation and security of both drinking water and wastewater systems, which are vital for public health.

 

Space

Illuminates the strategic significance of the space sector, ensuring it meets high cybersecurity standards given its impact on various technologies and services.

List of Important Entities (50 employees, annual turnover of 10M EUR)

Public telecom & ISP providers

Those offering publicly available communication networks and services, such as telecom companies and internet service providers.

Trust service providers

Entities that offer digital trust services, ensuring the authenticity of electronic transactions and communications.

Sole providers of a critical service

Unique entities that are the only sources of specific, vital services critical to daily operations or infrastructure.

TLD registries & DNS providers

Organizations managing top-level domain listings and the systems directing internet traffic to the correct addresses.

Domain name registrars

Businesses that oversee the reservation of internet domain names, ensuring each is unique and correctly assigned.

Entities crucial for safety, security, or health

Vital organizations whose disruption could jeopardize public safety, security measures, or health outcomes.

Central or regional public administration entities

Main governmental bodies at central or regional levels, playing a pivotal role in public governance and administration.

All other entities if:

The entity is the sole provider in a Member State of a service which is essential for the maintenance of critical societal or economic activities;
Disruption of the service provided by the entity could have a significant impact on public safety, public security or public health;
Disruption of the service provided by the entity could induce a significant systemic risk, in particular for sectors where such disruption could have a cross-border impact;
The entity is critical because of its specific importance at national or regional level for the particular sector or type of service, or for other interdependent sectors in the Member State;”

If a Member State has defined that entity as a “critical entity” according to Critical Entities Resilience (CER) Directive (EU) 2022/2557

Other Entities, regardless of their size

Digital Providers

Encompassing a broad array of digital services such as search engines, online marketplaces, and social networks, this sector is pivotal in today’s interconnected world.

 

Food

Covering the full spectrum from farm to fork, this sector ensures that every stage—from farming and processing to retail—is secure and robust.

 

Postal & Courier Services

As the lifeline for communications and goods delivery, this sector must uphold a fortified digital defense, ensuring consistent and safe operations.

 

Research organizations

As a hub of innovation and progress, this sector is pivotal, driving forward scientific breakthroughs while being a potential target for cyber threats.

 

Chemicals

This sector, vital for Europe’s industrial competitiveness, spans from the creation to the distribution of chemicals, serving as a bedrock for innovative solutions.

 

Manufacturing

A broad field that includes the making of items like medical devices, electronics, machinery, vehicles, and transport equipment, it’s at the heart of Europe’s production capabilities.

Get the detailed checklist to become NIS 2 compliant

Understand the Minumum Cybersecurity measures for NIS 2 Compliance

Understand the NIS 2 building blocks and requirements

Risk Management

Organizations under NIS 2 must proactively implement policies and measures to minimize cybersecurity threats.

This includes a core set of measures encompassing risk analysis, incident response, encryption, improved access control, and addressing vulnerabilities in their ICT supply chain. Moreover, entities should undertake vulnerability assessments to ensure that measures align with the entity’s exposure to potential risks and the potential societal and economic impacts of such threats.

Corporate Accountability

NIS2 emphasizes that management bodies of in-scope entities are responsible for overseeing and approving cybersecurity risk management measures. They are expected to undergo regular training to identify and assess cybersecurity risks and their potential impact on services. Moreover, breaches might lead to management being held liable, which underscores the heightened corporate responsibility under this directive.

 

Management training program

Introduce mandatory cybersecurity training for corporate management to increase awareness of cyber risks, best practices, and organizational cybersecurity policies.

 

Cybersecurity oversight committee

Form an executive-level committee to oversee cybersecurity measures, develop policies, and manage cybersecurity budgets.

 

Risk reporting & mitigation

Develop a structured mechanism for management to regularly report on cybersecurity risks, vulnerabilities, and mitigation strategies.

 

Penalties & incentives

Establish a framework of penalties for non-compliance and incentives for proactive cybersecurity risk management.

 

Cybersecurity compliance audits

Regularly conduct audits to evaluate management’s adherence to cybersecurity policies and identify areas for enhancement.

Reporting obligations

In-scope entities are mandated to promptly report significant incidents. This includes an “early warning” within 24 hours of awareness, followed by a comprehensive incident notification within 72 hours to competent national authorities. Affected users should also be notified promptly, ensuring a robust and transparent communication process during cybersecurity incidents.

Incident reporting platform

Utilize systems enabling suppliers, vendors, and customers to efficiently report all kinds of cybersecurity incidents.

Automated incident notifications

Set up an automated system for escalating alerts and notifications to relevant stakeholders, including regulatory bodies, within prescribed timeframes.

Incident classification guidelines

Develop clear guidelines for categorizing incidents based on severity and impact to ensure consistent reporting and effective response protocols.

Incident documentation & reporting process

Establish a detailed process for documenting incident details, responses, and post-incident analysis to enhance organizational learning and response improvement.

Incident response teams

Form specialized teams equipped with the necessary tools and expertise for prompt handling and containment of cybersecurity incidents.

Business continuity

In the face of major cyber incidents, organizations are expected to have a business continuity plan. This entails strategies for system recovery, emergency procedures, and the establishment of a crisis response team. The emphasis is on ensuring uninterrupted business operations and quick recovery after significant cybersecurity events.

Redundancy & backup

Implement data redundancy and backup strategies to maintain data availability and system resilience during and post-cyber incidents.

Business impact assessment

Conduct thorough assessments to identify key systems and processes critical for operations during cyber incidents.

Cyber incident response plan

Develop a comprehensive plan detailing step-by-step procedures for cyber incident management, including communication strategies, recovery tactics, and roles of crisis response teams.

Cybersecurity awareness training

Provide organization-wide training on the business continuity plan and employee roles in minimizing disruptions during cyber incidents.

Regular plan testing & drills

Periodically test and conduct simulated drills of the business continuity plan to identify gaps, enhance response efficiency, and ensure the plan’s ongoing effectiveness.

Why choose us

Secure Your Cloud with Our Modular Services

Best fit solutions + licences

Stop Overpaying for Security Tools: Most small businesses already pay for Microsoft 365 but still invest in third-party security tools. Why pay twice when Microsoft has everything you need?

Benchmarked experts and implementation

Visibility & risk prioritization that proactively reduces the attack surface

Done-for-you

Get the support that you need. At a fixed cost, without unpredictable – everrising costs in IT.

Case studies.
Hear what others have say.

4.9

All chances are you'll impressed too.

5.0

Many thanks Mat. Really appreciate your team's hard work over the last few months. This has not been an easy task.

Dr. S.Iyabo Tinubu-Karch
CEO Sidra Medicine

4.5

RMI being ISO 27001 and 14001 certified. These certifications are a testament to the hard work, dedication, and collaborative efforts of everyone.

Claire Todd
QHSE Manager, RMI

4.3

Thank you for your outsdanding work without any setbacks.

Devid Palcic
CEO Robotina

Learn

Benchmarked Learn is a treasure trove of our best technical tips and expert knowledge. Here you will discover all the valuable secrets and trends on cybersecurity, compliance and beyond.

Announcement: We are launching Quantum Cybersecurity R&D department

At benchmarked, we believe the future will be shaped—not merely inherited. Today, we’re proud to unveil Cryptera, a new research and development company dedicated...

PCI DSS 4.0: Overview and Guide
Full payment standard guide (PCI DSS 4.0)...
SOC II
What is a SOC 2 audit?
There is no one-size-fits-all method for strengthening your organization’s information security, but almost every business will eventually need to prove its security to stakeholders...

Start your NIS 2 journey

Identifying Gaps According to NIS 2 Directive and ZInfV-1 Draft Law. The GAP analysis will provide a detailed assessment of your current security practices and information systems, identifying any gaps compared to the requirements of NIS 2.

From

4.889,00

What's included
Introductory meeting
NIS 2 assessment, review of policies and procedures, and gap analysis
Preparation of a report and presentation with recommendations
Customized roadmap and plan: Our solutions address IT optimization, risk and compliance, and cybersecurity, providing a comprehensive plan for your business.
Compliance is not a cost. It's a shield.
Assess your risk and maturity
Get a tailored compliance roadmap
Automate evidence collection + policies
Work with vetted auditors
No lock-in. Fixed fee. Zero risk.