In our previous article, we explained what the NIS2 Directive is. We talked about who’s affected and why it matters. If you haven’t read that yet, it’s worth starting there.
But if you’re already aware of the directive or you’re in one of the countries that have already adopted NIS2 into their local legislation, you found your guide.
This guide is for those ready to move from awareness to action. We’ll walk you through how to get compliant without overengineering the process. We’ll also point out a few critical things that may fly under the radar for most of the companies.
Let’s get into it.
Getting started with NIS2 compliance doesn’t mean rebuilding everything. With the little nudge from experts, you can build on what you already have.If your company already follows ISO 27001 and ISO 9001, you’re in a strong starting position for NIS2 compliance. But for many organizations, especially smaller ones that haven’t adopted these standards, meeting NIS2 requirements could mean a significant amount of work ahead.
NIS2 makes cybersecurity a board-level issue. Your leadership needs to understand the risks, approve the strategy, and oversee how well it’s being implemented.
According to Article 20, the management body — typically your CEO, board, or executive team — must approve cybersecurity risk-management measures, oversee their execution, and can be held personally liable for non-compliance. That’s a significant shift from past norms where cyber risk was considered a technical silo.
Start by raising internal awareness. Your executive team should know:
Then, appoint someone to own the process internally. This doesn’t have to be a new hire. In many companies, it’s a joint effort between IT/security, legal/compliance, and operations. The key is that someone is accountable for keeping the work moving.
Before you start writing policies or tightening controls, you need to know if and how NIS2 applies to you. This step is often skipped, but it’s crucial. This rings true especially for companies operating in multiple sectors or across borders.
The directive applies to two types of entities:
Whether you’re classified as essential or important depends on what services you provide and the size of your company. The general rule is that all medium and large companies in listed sectors fall under the directive. The old NIS model, where Member States selected which companies were critical, no longer applies — NIS2 uses a size-cap rule.
If you’re unsure, you can:
Once you’ve determined your status, document it. This will help with internal planning, risk assessments, and any future questions from regulators or partners.
Once you know NIS2 applies to your business, the next step is figuring out where you stand and where you fall short. That’s where a gap analysis comes in.
NIS2 outlines requirements under Article 21(2). These are structured expectations for how your organization should manage cyber risk. Here’s what you need to evaluate:
If your company already follows frameworks like ISO/IEC 27001, NIST CSF, or CIS Controls, many of these boxes are already ticked. They are at least partially covered. But for companies that haven’t adopted any standard, this can feel like a steep climb.
To make this manageable:
💡 Tip: ENISA.eu has published a detailed implementation guide that helps translate each requirement into practical actions. Use it to bridge the legal text with operational steps.
NIS2 introduces stricter rules around how you respond to and report cybersecurity incidents. According to Article 23, if your organization experiences a significant incident, you must:
This means you need a structured, tested incident response process. Not just for internal containment, but also for regulatory reporting.
Start by clarifying:
If, for example, you rely on a third-party data center and they suffer a breach, your services may go down. You’re still responsible for reporting — even if the root cause wasn’t under your direct control.
This one may be one of the most time-sensitive parts of NIS2. If you don’t have clarity here, start building it now before you’re under pressure to act.
One of the overlooked, and potentially high-risk, areas of NIS2 compliance is your supply chain. According to Article 21(2)(d), you’re required to address security-related aspects concerning relationships with your direct suppliers or service providers.
This means you’re not just responsible for your internal systems. You’re also expected to evaluate and manage the cybersecurity risks introduced by the vendors, platforms, and partners your operations depend on.
Start by identifying which suppliers are critical to service continuity. Think cloud hosting providers, software vendors, managed service providers, and even AI vendors. If a breach in one of their systems could affect your ability to deliver, they’re in scope for your supply chain risk management.
Here’s what you should do:
NIS2 avoids prescribing a single framework or checklist. Instead, it requires that your security measures be appropriate to the risks you face. This is known as the “risk-based approach”. Put simply, it gives you flexibility while still holding you accountable.
Under Article 21(1), the directive asks organizations to consider:
In simple terms, you don’t need to implement every possible control. You do, however, need to make informed, justified decisions about what you put in place and why.
If you already follow frameworks like:
…then you’re probably already aligned with many NIS2 expectations. But if you’re not using a formal security standard, this is the time to start organizing your efforts.
A few practical controls to prioritize:
Your national authorities will expect you to demonstrate that your cybersecurity risk management is ongoing.
This means regular reviews of your controls, procedures, and risk landscape. Here’s how to make that part of your workflow without turning it into a bureaucratic headache:
If your company is large or operates in a regulated industry, you may want to involve third-party auditors.
Technology alone won’t make you compliant. NIS2 puts a strong emphasis on people and skills, starting at the top.
Under Article 20, training is mandatory for members of the management body. That means executives need a working understanding of cyber risks and governance. They need enough to evaluate decisions and lead when it matters.
This isn’t just a box-ticking. It’s about making security a shared responsibility.
NIS2 also encourages regular training for employees, tailored to their role. A software developer needs a different kind of awareness than a finance team lead, and a customer support rep may need specific training on phishing or secure data handling.
Even after your company meets the initial requirements, compliance isn’t a one-time milestone. NIS2 is a living directive. Regulations evolve, interpretations change, and national enforcement practices will mature over time.
To stay ahead:
If you’re working across borders or in complex industries like manufacturing, digital services, or telecom, these updates can materially affect your obligations.
💡 Tip: Assign someone in legal, compliance, or IT governance to track regulatory developments and flag relevant updates. Even a quarterly email to leadership can keep awareness high and surprise audits low.
NIS2 has plenty of obvious requirements. But, here are a few important points that may slip under the radar:
These are the kinds of details that make a real difference during implementation — and the ones that often catch companies off guard if they rely only on high-level summaries.
The clock is ticking for companies to get serious about cybersecurity. It’s not just about avoiding fines. It’s about protecting your operations, your customers, and your reputation in a digital world that’s only getting riskier.
Start now. Stay informed. And when in doubt, go back to the basics: accountability, visibility, and action.
Our goal is to help take your organization to new heights of success through innovative digital solutions. Let us work together to turn your dreams into reality.