The NIS2 Directive, an updated EU cybersecurity rule introduced to address gaps from its predecessor, the NIS, has a wider scope, encompassing more sectors than before. It aims to unify cybersecurity standards across the EU and introduce stricter penalties for those who don’t comply.
The directive emphasizes a risk-based approach, meaning organizations should protect their systems based on potential threats. Collaboration is key, as NIS2 encourages information sharing among stakeholders. Moreover, it requires comprehensive incident reporting to help understand and counter emerging threats.
The NIS2 directive expands coverage from the original 7 sectors under the NIS directive, adding 8 more for a total of 15 sectors. To access sector-specific NIS2 information, simply click on one of the sectors listed below.
NIS2 classifies organizations as either “Essential Entities” (EE) or “Important Entities” (IE). Public or private entities in these sectors with over 50 employees and an annual turnover above 10M have to determine their group and follow the related rules.
Energy
Covers the crucial energy sectors of electricity, oil, and gas, underscoring their importance in everyday functions and the need for cybersecurity.
Transport
Focuses on the major modes of transport: air, rail, sea, and road, highlighting their role in connecting people and places.
Healthcare
Prioritizes the protection of healthcare settings, encompassing both public hospitals and private clinics, given their role in public welfare.
Public Administration
Emphasizes the protection of public services, reflecting the directive’s commitment to ensure uninterrupted and secure administrative functions.
Banking & Financial Market Infrastructure
Addresses the backbone of our financial system, spotlighting areas like payment services that facilitate economic activities.
Digital Infrastructures
Targets foundational digital services, such as those providing DNS and TLD registries, acknowledging their role in the digital ecosystem.
Water Supply
Focuses on the preservation and security of both drinking water and wastewater systems, which are vital for public health.
Space
Illuminates the strategic significance of the space sector, ensuring it meets high cybersecurity standards given its impact on various technologies and services.
Public telecom & ISP providers
Those offering publicly available communication networks and services, such as telecom companies and internet service providers.
Trust service providers
Entities that offer digital trust services, ensuring the authenticity of electronic transactions and communications.
Sole providers of a critical service
Unique entities that are the only sources of specific, vital services critical to daily operations or infrastructure.
TLD registries & DNS providers
Organizations managing top-level domain listings and the systems directing internet traffic to the correct addresses.
Domain name registrars
Businesses that oversee the reservation of internet domain names, ensuring each is unique and correctly assigned.
Entities crucial for safety, security, or health
Vital organizations whose disruption could jeopardize public safety, security measures, or health outcomes.
Central or regional public administration entities
Main governmental bodies at central or regional levels, playing a pivotal role in public governance and administration.
All other entities if:
The entity is the sole provider in a Member State of a service which is essential for the maintenance of critical societal or economic activities;
Disruption of the service provided by the entity could have a significant impact on public safety, public security or public health;
Disruption of the service provided by the entity could induce a significant systemic risk, in particular for sectors where such disruption could have a cross-border impact;
The entity is critical because of its specific importance at national or regional level for the particular sector or type of service, or for other interdependent sectors in the Member State;”
If a Member State has defined that entity as a “critical entity” according to Critical Entities Resilience (CER) Directive (EU) 2022/2557
Digital Providers
Encompassing a broad array of digital services such as search engines, online marketplaces, and social networks, this sector is pivotal in today’s interconnected world.
Food
Covering the full spectrum from farm to fork, this sector ensures that every stage—from farming and processing to retail—is secure and robust.
Postal & Courier Services
As the lifeline for communications and goods delivery, this sector must uphold a fortified digital defense, ensuring consistent and safe operations.
Research organizations
As a hub of innovation and progress, this sector is pivotal, driving forward scientific breakthroughs while being a potential target for cyber threats.
Chemicals
This sector, vital for Europe’s industrial competitiveness, spans from the creation to the distribution of chemicals, serving as a bedrock for innovative solutions.
Manufacturing
A broad field that includes the making of items like medical devices, electronics, machinery, vehicles, and transport equipment, it’s at the heart of Europe’s production capabilities.
Understand the Minumum Cybersecurity measures for NIS 2 Compliance
Organizations under NIS 2 must proactively implement policies and measures to minimize cybersecurity threats.
This includes a core set of measures encompassing risk analysis, incident response, encryption, improved access control, and addressing vulnerabilities in their ICT supply chain. Moreover, entities should undertake vulnerability assessments to ensure that measures align with the entity’s exposure to potential risks and the potential societal and economic impacts of such threats.
NIS2 emphasizes that management bodies of in-scope entities are responsible for overseeing and approving cybersecurity risk management measures. They are expected to undergo regular training to identify and assess cybersecurity risks and their potential impact on services. Moreover, breaches might lead to management being held liable, which underscores the heightened corporate responsibility under this directive.
Management training program
Introduce mandatory cybersecurity training for corporate management to increase awareness of cyber risks, best practices, and organizational cybersecurity policies.
Cybersecurity oversight committee
Form an executive-level committee to oversee cybersecurity measures, develop policies, and manage cybersecurity budgets.
Risk reporting & mitigation
Develop a structured mechanism for management to regularly report on cybersecurity risks, vulnerabilities, and mitigation strategies.
Penalties & incentives
Establish a framework of penalties for non-compliance and incentives for proactive cybersecurity risk management.
Cybersecurity compliance audits
Regularly conduct audits to evaluate management’s adherence to cybersecurity policies and identify areas for enhancement.
In-scope entities are mandated to promptly report significant incidents. This includes an “early warning” within 24 hours of awareness, followed by a comprehensive incident notification within 72 hours to competent national authorities. Affected users should also be notified promptly, ensuring a robust and transparent communication process during cybersecurity incidents.
Incident reporting platform
Utilize systems enabling suppliers, vendors, and customers to efficiently report all kinds of cybersecurity incidents.
Automated incident notifications
Set up an automated system for escalating alerts and notifications to relevant stakeholders, including regulatory bodies, within prescribed timeframes.
Incident classification guidelines
Develop clear guidelines for categorizing incidents based on severity and impact to ensure consistent reporting and effective response protocols.
Incident documentation & reporting process
Establish a detailed process for documenting incident details, responses, and post-incident analysis to enhance organizational learning and response improvement.
Incident response teams
Form specialized teams equipped with the necessary tools and expertise for prompt handling and containment of cybersecurity incidents.
In the face of major cyber incidents, organizations are expected to have a business continuity plan. This entails strategies for system recovery, emergency procedures, and the establishment of a crisis response team. The emphasis is on ensuring uninterrupted business operations and quick recovery after significant cybersecurity events.
Redundancy & backup
Implement data redundancy and backup strategies to maintain data availability and system resilience during and post-cyber incidents.
Business impact assessment
Conduct thorough assessments to identify key systems and processes critical for operations during cyber incidents.
Cyber incident response plan
Develop a comprehensive plan detailing step-by-step procedures for cyber incident management, including communication strategies, recovery tactics, and roles of crisis response teams.
Cybersecurity awareness training
Provide organization-wide training on the business continuity plan and employee roles in minimizing disruptions during cyber incidents.
Regular plan testing & drills
Periodically test and conduct simulated drills of the business continuity plan to identify gaps, enhance response efficiency, and ensure the plan’s ongoing effectiveness.
Stop Overpaying for Security Tools: Most small businesses already pay for Microsoft 365 but still invest in third-party security tools. Why pay twice when Microsoft has everything you need?
Get the support that you need. At a fixed cost, without unpredictable – everrising costs in IT.
Chief Executive Officer, Sidra Medicine
QHSE Manager
Sales Director (B2B)
Many thanks Mat. Really appreciate your team's hard work over the last few months. This has not been an easy task.
RMI being ISO 27001 and 14001 certified. These certifications are a testament to the hard work, dedication, and collaborative efforts of everyone.
Thank you for your outsdanding work without any setbacks.
Benchmarked Learn is a treasure trove of our best technical tips and expert knowledge. Here you will discover all the valuable secrets and trends on cybersecurity, compliance and beyond.
Introductory meeting
NIS 2 assessment, review of policies and procedures, and gap analysis
Preparation of a report and presentation with recommendations
Customized roadmap and plan: Our solutions address IT optimization, risk and compliance, and cybersecurity, providing a comprehensive plan for your business.
Assess your risk and maturity
Get a tailored compliance roadmap
Automate evidence collection + policies
Work with vetted auditors