Regulatory Update 7 min read

NIS2 Directive: The CISO's Compliance Roadmap by Sector

What CISOs must implement under the EU's NIS2 Directive — sector-specific obligations, board accountability requirements, and the cost of non-compliance.

The Network and Information Security Directive 2 (NIS2) represents the most significant expansion of cybersecurity regulation in the European Union since its predecessor came into force in 2016. For CISOs operating in or selling into EU markets, the directive is no longer a compliance horizon item — it is an immediate operational and governance mandate.

What Changed from NIS1 to NIS2

NIS2 dramatically broadens scope. Where NIS1 covered seven sectors, NIS2 now covers eighteen, split between “essential” and “important” entities. Essential entities include energy, transport, banking, financial market infrastructure, health, drinking water, wastewater, digital infrastructure, ICT service management, public administration, and space. Important entities add postal services, waste management, chemicals, food, manufacturing, digital providers, and research.

Size thresholds matter: medium-sized companies with over 50 employees or €10 million in revenue in covered sectors are now in scope. This means thousands of organizations that never had to think structurally about cybersecurity regulation now face formal obligations.

The Thirteen Minimum Security Measures

Article 21 of NIS2 mandates that in-scope organizations implement measures across thirteen domains. These are not aspirational — they form the baseline that regulators will audit against:

Risk analysis and information system security policies. Organizations must have documented, regularly reviewed risk management processes. The board must approve and own these policies.

Incident handling. Defined procedures for detection, analysis, containment, and recovery. This includes assignment of responsible roles — not just technical staff but management decision-makers.

Business continuity and crisis management. Backup strategies, disaster recovery, and a tested crisis management plan. Regulators will ask how recently you ran a tabletop exercise.

Supply chain security. Assessment of direct suppliers and service providers — security practices, contractual obligations, and ongoing monitoring. This is arguably the most resource-intensive requirement for organizations with complex vendor ecosystems.

Security in network and information systems acquisition, development, and maintenance. Secure development practices, vulnerability handling, and patch management processes.

Policies and procedures to assess the effectiveness of cybersecurity risk-management measures. This means measurement — not just doing security activities, but demonstrating their effectiveness.

Basic cyber hygiene and cybersecurity training. All staff must receive baseline security awareness training. Senior executives require specific training on their roles in cyber risk governance.

Policies and procedures regarding the use of cryptography and encryption.

Human resources security, access control, and asset management.

Use of multi-factor authentication or continuous authentication.

Secured communications and emergency communication systems.

Policies for responsible vulnerability disclosure.

Physical and environmental security.

Board-Level Obligations: The Governance Shift

The most consequential aspect of NIS2 for CISOs is the personal accountability placed on management bodies. Under Article 20, the management body — meaning the board of directors or equivalent executive leadership — must approve cybersecurity risk management measures, oversee their implementation, and bear liability if violations result from a failure of governance.

Board members are now required to undergo cybersecurity training sufficient to identify risks and evaluate practices. This creates a direct reporting line that CISOs have long sought to establish by other means. The regulation essentially mandates board engagement with cybersecurity as a governance function, not just a technical one.

For CISOs, this is both an opportunity and a responsibility. You gain leverage to require board-level attention to security posture and investment. You are also now operating in an environment where inadequate reporting to the board could be characterized as a regulatory failure.

Incident Reporting: The 24-Hour Timeline

NIS2 introduces a tiered notification requirement that is operationally demanding. Upon becoming aware of a significant incident, organizations must:

  • Issue an early warning to the relevant national authority within 24 hours of becoming aware
  • Submit a formal incident notification within 72 hours
  • Provide a final report within one month of the incident notification

The 24-hour early warning is particularly challenging because it requires organizations to have detection and triage capabilities mature enough to identify significance quickly. The threshold for “significant” is an incident that has caused or is capable of causing severe operational disruption or financial loss, or affecting other natural or legal persons.

CISOs should review whether their incident response plans have been updated to reflect these timelines, including escalation paths that do not rely on confirmation of full scope — the early warning is about awareness, not complete analysis.

Sector-Specific Implementation Considerations

Healthcare. The healthcare sector faces heightened scrutiny given the volume of ransomware incidents affecting hospitals. NIS2 requires supply chain assessments that extend to medical device vendors and cloud-based clinical systems. Organizations should pay particular attention to the continuity requirements — regulators will want to see that critical care functions have offline failover capability.

Financial Services. Many financial entities are already subject to DORA (Digital Operational Resilience Act), which overlaps with NIS2. Where both apply, DORA is considered the more specific regulation and will generally take precedence, but CISOs should map obligations across both frameworks to identify any gaps.

Energy and Critical Infrastructure. Operational technology (OT) environments present the greatest compliance complexity. NIS2 applies to IT and OT systems alike, but most OT environments have security architectures that predate modern control requirements. Regulators have acknowledged this gap but expect documented remediation roadmaps.

Digital Infrastructure and ICT Service Providers. Managed service providers and cloud providers face dual obligations: their own compliance and their role in customer supply chain assessments. Expect increased contractual demands from customers who are themselves subject to NIS2.

Penalties

Non-compliance carries significant financial risk. Essential entities face maximum administrative fines of at least €10 million or 2% of total worldwide annual turnover, whichever is higher. Important entities face fines of at least €7 million or 1.4% of global annual turnover.

Beyond financial penalties, national authorities can impose temporary bans on individuals in management positions from exercising leadership responsibilities. This is the personal liability provision that focuses executive attention.

Where to Start

For most organizations, the right starting point is a gap assessment against the thirteen Article 21 requirements, mapped to existing controls. This assessment should be owned by the CISO but presented to and approved by the management body — establishing the governance trail that regulators will look for.

Prioritize incident reporting infrastructure (the 24-hour requirement will expose gaps quickly), supply chain security (the most resource-intensive to remediate), and board training (which builds the governance relationship you need for investment decisions).

NIS2 is not a one-time compliance exercise. It establishes an ongoing governance framework. Organizations that treat it as a checkbox will find regulators unsympathetic when incidents occur.