About the NIS2 Directive

NIS2 stands for "Network and Information Systems Directive 2" and is a European standard aimed at improving cybersecurity across EU countries.

It is aimed at companies and organizations in critical sectors, including digital services and critical infrastructure, which can significantly impact society's functioning and security. This includes, among others, the energy, transport, healthcare, financial, and water sectors, as well as digital service providers such as cloud services and online marketplaces.

NIS2 requires these companies and organizations to implement a high level of cybersecurity, which includes identifying and managing cybersecurity risks, ensuring continuous operation, and reporting security breaches within 24 hours.

nis2-implementering

What requirements does NIS2 impose?

The NIS2 Directive introduces comprehensive requirements for governance, risk management, business continuity, and reporting to authorities:

  • The organization's management must be fully informed about the provisions of the directive and the associated risk management activities. Management is responsible for ensuring that cyber risks are identified, effectively managed, and that the requirements of the directive are met.

  • Enhanced requirements for risk management and resilience mean that the organization must implement both preventive and remedial measures to minimize risks and potential damage. Among the fundamental requirements are the management of security incidents, protection of cybersecurity in supply chains, network security, access control, and the use of encryption.

  • The organization must develop a plan to maintain business continuity in the event of a serious cyber incident. This includes system recovery, activation of emergency procedures, and establishment of a crisis management team.

  • Clear procedures must be in place to ensure proper reporting to authorities. There are specific requirements that major security incidents must be reported within 24 hours.

We help ensure your organization's NIS2 compliance.

At Leave A Mark Consulting Group, we are recognized for our expertise in security and compliance. We have extensive experience in implementing various security standards and possess in-depth knowledge of how to meet these requirements effectively.

Our approach ensures that you achieve compliance with the new requirements while highlighting the risks most critical to the entire organization. This provides management with a solid foundation for prioritizing risk management.

Would you like to read more about the implementation process of NIS2?

Click here

 

Who is covered by NIS2?

Below is an overview of essential and important entities affected by the NIS2 Directive.  

NIS2-vaesentlig-virksomheder
NIS2-vigtige-virksomheder

NIS2 Implementation Process: A Step-by-Step Guide

STEP 1 - PREPARATION AND RISK ASSESSMENT

risk assessment process
In the first phase, we analyze the requirements of the NIS2 Directive (and upcoming legislation) and examine how they specifically relate to your organization's context. This involves identifying the areas within your organization that fall under the scope of the directive.
 
We conduct a detailed Business Impact Analysis (BIA) aimed at identifying and assessing potential security threats to your organization's information systems. This analysis involves identifying critical assets, potential vulnerabilities, and the likelihood of various threat scenarios. Through the BIA, we gain an understanding of your organization's maturity and risk profile in cybersecurity.
 
The results from the BIA form the foundation for developing a customized implementation plan that addresses specific threats and vulnerabilities. This plan includes clear step-by-step goals, resource allocation, and timelines for implementing necessary security measures. By basing our efforts on this approach, we address the organization's specific challenges and needs, ensuring a targeted and effective approach to NIS2 compliance.

STEP 2 - PLANNING AND DESIGN

In this phase, we utilize the results from the previously conducted Business Impact Analysis (BIA) along with your organization's current IT security to develop an implementation plan. The implementation plan is designed to address both the technical and organizational aspects of cybersecurity.

At the technical level, the plan may involve updates to existing IT infrastructure, implementation of advanced security solutions, and configuration of network protection. This could entail installing firewall systems, intrusion detection/prevention systems, antivirus software, and other tools to safeguard against cyber threats. Additionally, we will ensure that these technical measures adhere to applicable standards and guidelines.

At the organizational level, we will focus on developing or adapting policies and procedures that are fundamental to NIS2 compliance. This may include the development of clear guidelines for handling security incidents, establishment of an emergency response plan, and training employees in security procedures and best practices.

CISO services

STEP 3 - IMPLEMENTATION

In this phase, we undertake a comprehensive implementation of the necessary policies, procedures, and controls to ensure consistent IT security in your organization. The NIS2 directive defines a series of mandatory measures that we adhere to:

  • Risk analysis and information system securityConducting risk assessments to identify and evaluate potential threats to your information systems and implementing appropriate security measures.
  • Incident management: Establishing robust procedures for handling security incidents, including reporting, analysis, and response to minimize damage and restore normal operations quickly.
  • Business continuity: Ensuring operational continuity through backup solutions, recovery procedures, and a well-defined emergency response plan.
  • Continuous assessment of security measures:Implementing processes to continually evaluate and update your security measures in line with developments in the threat landscape and your organization's needs.
  • Employee trainingDeveloping and delivering tailored training programs to ensure that all employees understand their responsibilities and roles in protecting the organization's systems and data.
  • EncryptionImplementing robust encryption solutions to ensure the confidentiality and integrity of your data, both during storage and transmission.
  • Personnel security and access controlImplementing strict access control and procedures to ensure personnel security and restrict access to sensitive information.

 

nis2 implementering

As an integral part of the implementation, a comprehensive contingency plan is developed to ensure crisis and disaster management to minimize damage and ensure rapid recovery. This plan includes responsibilities, communication procedures, and recovery strategies.

Our experience shows that implementation can vary depending on the company's resources and previous efforts in IT security. Therefore, it is crucial to start the implementation process well in advance to ensure that all necessary measures are in place before the legislation based on the NIS2 Directive comes into effect in the first quarter of 2025.

STEP 4 - Monitoring and Maintenance

We implement processes for ongoing monitoring of security measures to ensure that your organization remains protected against constant and evolving threats. As a general recommendation, we suggest evaluating the threat landscape twice a year to ensure that any new threats are identified, and appropriate measures are implemented to mitigate their impact.

It's important to understand that compliance with NIS2 is not a one-time project. Therefore, we offer regular reviews and updates of security measures to ensure that your organization remains compliant with the regulation over time.

Our primary goal is to make the implementation process as efficient as possible, ensuring that your company not only meets the legal requirements but also strengthens cybersecurity across the organization as a whole. By choosing us as your partner, you gain access to in-depth expertise and an approach tailored to your company's unique needs and challenges.

NIS2 Statement 

A NIS2 statement from Leave a Mark is proof that the company's IT infrastructure, network security, and internal procedures meet the requirements of the NIS2 directive.

The process includes an initial assessment using a GAP analysis and a final audit. 

 

 

Leave a Mark’s auditors review the company's documentation for compliance with the requirements set by the NIS2 directive.

This includes, among other things, incident management, business continuity, risk analysis, and information security, among others.

 

The benefits include increased credibility, enhanced security, and a competitive advantage. 

To read more, click below.

Read more

Call and have a non-committal talk with us on +45 535 27000