cybersecurity October 24, 2024 0

NIS2 Directive Compliance Deadline

By October 17, 2024, relevant EU organizations must comply with the Network and Information Systems Directive 2 (NIS2) directive and publish measures taken to fulfill its obligations.

The directive:

• Expands the number of entities required to comply
• Holds top management liable for non-compliance
• Mandates prompt cyber incident reporting and organizational measures for managing cyber risks.

Summary of NIS2:

Key Deadlines

  • October 17, 2024: EU Member States must transpose NIS2 into national law
  • October 18, 2024: Implementation of measures begins
  • Many EU states are expected to miss the implementation deadline

Core Requirements

  • Mandatory incident reporting within specific timeframes (24h, 72h, 1 month)
  • Risk management measures implementation
  • Supply chain security assessments
  • Cybersecurity incident response procedures
  • Management accountability for compliance

Penalties

Essential Entities:

  • Up to €10 million or 2% of annual global turnover

Important Entities:

  • Up to €7 million or 1.4% of annual global turnover

Scope

Applies to organizations that are:

  • Medium-sized (50+ employees, €10M+ turnover)
  • Large (250+ employees, €50M+ turnover)
  • Operating in critical sectors like healthcare, utilities, space, public administration

Impact

  • Expands cybersecurity obligations across more sectors
  • Strengthens incident reporting requirements
  • Introduces stricter enforcement measures
  • Affects organizations globally through EU partnerships

How to implement NIS2 in a medium-sized enterprise

Initial Assessment

  • Conduct a comprehensive risk assessment to identify critical services and vulnerabilities
  • Document your organization’s network and information systems
  • Evaluate current security measures against NIS2 requirements
  • Determine if you’re classified as “Essential” or “Important” entity

Key Implementation Steps

Security Measures

  • Implement access control and asset management systems
  • Deploy multi-factor authentication
  • Establish encryption protocols
  • Create incident handling procedures
  • Develop business continuity plans

Documentation & Policies

  • Create comprehensive information security policies
  • Establish risk management procedures
  • Document all cybersecurity measures
  • Develop incident reporting protocols (24h/72h/1month timeline)

Management & Training

  • Secure management approval for cybersecurity measures
  • Train employees on cybersecurity practices
  • Establish clear roles and responsibilities
  • Document all training and awareness programs

Supply Chain Security

  • Assess vulnerabilities of direct suppliers
  • Evaluate cybersecurity practices of service providers
  • Implement secure development procedures

Monitoring & Compliance

  • Set up continuous monitoring systems
  • Prepare for potential audits
  • Establish incident reporting mechanisms
  • Keep documentation updated for compliance evidence

In conclusion, it is crucial to maintain proportionality in your measures based on your organization’s specific risk profile and sector. This tailored approach will ensure that your risk management strategies are effective and appropriate for your business needs.

The NIS2 Directive Explained