Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.
An integrated resilience workspace that seamlessly integrates 10 core solutions into one, easy-to-use software platform.
The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.
Explore Noggin's integrated resilience software, purpose-built for any industry.
Security Management Software
Published November 24, 2025
The European Union, like every other major economic bloc, has experienced a precipitous rise in cyberattacks particularly on its critical infrastructure assets. Indeed, the Commission of the European Union was one of the first regulators to promulgate legislation specifically designed to improve the security and resilience of its critical services.
Passed into law in 2016, the NIS1 (Network and Information Security) Directive sought to enhance cybersecurity cooperation among EU Member States and harmonise approaches across the Bloc.
Intended to bolster the ability of critical infrastructure entities to withstand attack, NIS1 attempted to mitigate the threats to network and information systems used to provide essential services in key sectors, thereby ensuring the continuity of such services and contributing to the security and effective functioning of the EU’s economy and society.
The cyber risk environment, as we all know, has only deteriorated since 2016. The Covid period, by most accounts, represented a watershed moment for the acceleration of the cyber threat.
Meanwhile, implementation of the Directive, left up to the individual Member States, lagged far behind the risks it was intended to mitigate – NIS1 itself was written to leave wide latitude to Member States to regulate their own critical infrastructure sectors.
Incident reporting obligations, for instance, were implemented in significantly different ways across the Bloc. Divergences in supervision and enforcement also abounded. As a result, fragmentation of the internal market persisted, while cyber vulnerabilities increased.
In the final count, NIS1, despite some successes, was not able to effectively address the Bloc’s current and emerging cybersecurity challenges.
Major reforms were, therefore, in order. And they soon came in the form of NIS2, the successor to NIS1. NIS2 was passed into law in November 2022, coming into full force in 2023.
What are some of the major changes from NIS1?
Under NIS1, Member States themselves were responsible for identifying critical infrastructure entities qualifying as operators of essential services.
That’s not the case with NIS2. The current Directive establishes a uniform criterion for determining qualifying entities via the application of a size-cap rule. Now, all medium-sized enterprises or larger operating within the following sectors (many of which are additions from NIS1) are subject to the new Directive:
Besides essential entities, important entities now fall under the scope of the Directive, as well. These organisations must also comply with the stringent new cybersecurity risk-management measures and reporting obligations that we’ll detail later.
Important entities, however, will have a different supervisory authority (than essential entities) to enforce their obligations as well as a different penalty regime for non-compliance.
That being said, the heart of NIS2 compliance for both essential and important entities is the requirement to adopt cybersecurity risk-management measures. These are measures that will apply to all operations and services of the entity concerned, not only to specific information technology IT assets or critical services that the entity provides.
What are the prescribed measures?
In subsequent guidance, the EU clarifies that these entities must “take appropriate and proportionate technical, operational[,] and organisational measures to manage the risks posed to the security of network and information systems which those entities use for their operations or for the provision of their services.” Network and information systems, here, refer to the following:
Add to that, the measures, covering hardware, firmware, and software used in the activities of an entity, should be risk-based and able to prevent or minimise the impact of incidents.
In the Directive, the EU also points out that network and information systems’ security threats can have different points of origins, with any type of event having a negative impact on the network information systems of the entity potentially leading to an incident. On these grounds, the Directive requires compliant measures to be based on “an all-hazard approach.” To comply with the terms of the Directive, such an approach must address the physical and environmental security of network and information systems from systems’ failure, human error, malicious acts, or natural phenomena.
Compliant measures should, therefore, protect both the entity’s network and information systems and the physical environment of those systems from any event, including sabotage, theft, fire, flood, telecommunication or power failures, and/or unauthorised physical access that is capable of compromising the availability, authenticity, integrity, or confidentiality of stored, transmitted, or processed data or of the services offered by, or accessible via, network and information systems.
Per the Directive, entities should at least take the following measures:
Another important aspect of NIS2 is its incident reporting obligations. The Directive compels essential and important entities to notify, without undue delay, their CSIRT (computer security incident response teams) or, where applicable, their competent authority, of any significant incident.
What qualifies as an incident? Per the Directive, an incident represents a broad category, defined as any event compromising the availability, authenticity, integrity, or confidentiality of stored, transmitted, or processed data or of the services offered by, or accessible via, network and information systems.
A subset of such events, significant incidents are those that go one step further in impact. They are events that have caused or can cause severe operational disruption of the services or financial loss for the entity concerned or have affected or can affect other natural or legal persons by causing considerable material or non-material damage.
To respond to significant incidents, entities must follow a multiple-stage approach, entailing early warning, incident notification, and a final report. If that’s not enough, these three elements may have to be supplemented by intermediate reports and a progress report.
As the Guidance notes, here, this multi-stage approach “aims at striking the right balance between, on one hand, swift reporting that helps mitigate the potential spread of significant incidents and allows essential and important entities to seek assistance, and, on the other, in-depth reporting that draws valuable lessons from individual incidents and improves over time the cyber resilience of individual entities and entire sectors.”
So, what’s the multi-stage approach in its entirety? Entities must:
Submit an early warning, without undue delay and in any event within 24 hours of becoming aware of the significant incident, to the competent CSIRT or authority.
That early warning must include, where applicable, an indication whether the significant incident is suspected of being caused by unlawful or malicious acts or if it could have (in terms of whether it is likely to have) a cross-border impact.
What’s more, an initial assessment should consider the affected network and information systems, in particular their importance in the provision of the entity’s services, the severity and technical characteristics of a cyber threat, and any underlying vulnerabilities that are being exploited, as well as the entity’s experience with similar incidents.
Indicators such as the extent to which the functioning of the service is affected, the duration of an incident, or the number of affected recipients of services may play an important role in identifying whether the operational disruption of the service is severe.
Submit an incident notification, without undue delay and in any event within 72 hours of becoming aware of the significant incident. Thereafter, an intermediate report may be requested by a competent CSIRT or authority. In case an intermediate report is requested, it must include relevant status updates.
Submit a final report to the competent CSIRT or authority not later than one month after the submission of the incident notification, unless the incident is still ongoing at that time, in which case a progress report must be provided and the final report within one month of the handling of the incident.
That final report must include a detailed description of the incident, including its severity and impact, the type of threat or root cause that is likely to have triggered the incident, the applied and ongoing mitigation measures, and, where applicable, the cross-border impact of the incident.
Beyond requirements for entities themselves, NIS2 includes mandates for Member States. Each Member State must adopt a national cybersecurity strategy, inclusive of policies touching on supply-chain security, vulnerability management, and cybersecurity education and awareness. The Member States must also produce and regularly update a list of operators of essential services, ensuring that entities within their borders comply with requirements.
The date by which Member States were required to adopt and publish the national measures necessary to ensure compliance with the Directive was set for 17 October 2024, with enforcement set to begin the day after. As of this writing, though, only four EU Member States (Belgium, Croatia, Italy, and Lithuania) fully transposed the Directive into national law.
As a result, the Commission opened infringement procedures, sending letters of formal notice to the remaining 23 Member States. The Commission, as a matter of law, has further leverage. The Commission may issue a reasoned opinion, i.e., a formal request to comply with EU law. Continued non-compliance on part of a Member State could then lead to its referral to the Court of Justice of the European Union, introducing the specter of financial sanction.
The clock is, therefore, ticking for critical infrastructure entities, many of whom were already identified by NIS1. What’s more, although the majority of Member States have yet to complete transposition of the Directive into national law, many have already begun, including the EU’s largest economy, Germany.
So, whether NIS2 is national law or not, it’s EU law. Accordingly, critical infrastructure entities should be prepared.
How can they? Well, Noggin can help if you’re looking for an integrated resilience workspace that helps your teams work together to anticipate and manage threats, conduct preparedness activities, effectively respond to disruptions, and continually learn from insights to strengthen resilience.
Don’t take our word for it, though. Request a demonstration to see Noggin in action for yourself.