The Clock Has Already Started
The NIS2 Directive (EU 2022/2555) required all EU Member States to transpose its requirements into national law by October 17, 2024. That deadline has passed. As of February 2026, approximately 20 of the 27 Member States have completed transposition. The European Commission opened infringement procedures against 23 Member States on November 28, 2024, and escalated to reasoned opinions against 19 states on May 7, 2025 — the final formal step before referral to the Court of Justice of the EU. For organizations that have not yet achieved compliance, enforcement is no longer theoretical.
This is not a distant regulatory concern. National authorities are standing up supervisory frameworks, entities are being registered, and penalties are now enforceable. The question is no longer whether NIS2 applies to you, but how quickly you can close the gap.
This article provides a structured, month-by-month roadmap for organizations that need to move from assessment to compliance within six months.
Are You in Scope?
NIS2 dramatically expanded the scope of EU cybersecurity obligations compared to the original NIS Directive. The European Commission estimates that over 160,000 entities now fall within scope across the EU, covering 18 critical sectors.
Entity Classification
NIS2 divides in-scope organizations into two categories, each with different supervisory regimes and penalty ceilings:
Essential entities operate in sectors listed in Annex I of the Directive:
- Energy (electricity, oil, gas, hydrogen, district heating)
- Transport (air, rail, water, road)
- Banking and financial market infrastructures
- Health (hospitals, laboratories, pharmaceutical manufacturing, medical device manufacturers)
- Drinking water supply and distribution
- Waste water collection, disposal, and treatment
- Digital infrastructure (IXPs, DNS providers, TLD registries, cloud computing, data centres, CDNs, trust service providers, electronic communications)
- ICT service management (managed service providers, managed security service providers)
- Public administration (central government)
- Space
Important entities operate in sectors listed in Annex II:
- Postal and courier services
- Waste management
- Chemicals (manufacturing, production, distribution)
- Food (production, processing, distribution)
- Manufacturing (medical devices, computers, electronics, machinery, motor vehicles)
- Digital providers (online marketplaces, search engines, social networking platforms)
- Research organizations
Size Thresholds
Scope is determined by both sector and organizational size, based on the EU SME definition (Commission Recommendation 2003/361/EC):
| Classification | Employees | Annual Turnover | Annual Balance Sheet |
|---|---|---|---|
| Medium enterprise (minimum threshold for NIS2) | 50 or more | EUR 10 million or more | EUR 10 million or more |
| Large enterprise | 250 or more | EUR 50 million or more | EUR 43 million or more |
Organizations meeting the medium enterprise threshold or above, operating in any of the 18 sectors, are in scope. Certain entities are in scope regardless of size, including qualified trust service providers, TLD registries, DNS service providers, and sole providers of essential services in a Member State.
What NIS2 Requires: The 10 Core Measures
Article 21 of the Directive prescribes ten minimum cybersecurity risk-management measures. These are not suggestions. National laws implementing NIS2 make them legally binding obligations:
- Risk analysis and information system security policies - Documented policies covering the security of network and information systems, including risk assessment methodologies
- Incident handling - Procedures for preventing, detecting, and responding to cybersecurity incidents
- Business continuity and crisis management - Including backup management, disaster recovery, and crisis management procedures
- Supply chain security - Security measures for relationships with direct suppliers and service providers, including vulnerability handling and secure development
- Security in acquisition, development, and maintenance - Security in network and information systems acquisition, development, and maintenance, including vulnerability handling and disclosure
- Effectiveness assessment - Policies and procedures to assess the effectiveness of cybersecurity risk-management measures
- Basic cyber hygiene and training - Cybersecurity hygiene practices and cybersecurity training for staff
- Cryptography and encryption - Policies and procedures regarding the use of cryptography and, where appropriate, encryption
- Human resources security and access control - Including access control policies, asset management, and human resources security
- Multi-factor authentication - Use of multi-factor authentication or continuous authentication solutions, secured voice, video, and text communications, and secured emergency communication systems
The European Commission adopted an Implementing Regulation (EU 2024/2690) in October 2024 that provides further technical and methodological details on these requirements for specific types of entities, particularly digital infrastructure providers.
The Penalty Framework
Non-compliance carries material financial and personal consequences.
Administrative Fines
| Entity Type | Maximum Fine |
|---|---|
| Essential entities | EUR 10 million or 2% of total worldwide annual turnover, whichever is higher |
| Important entities | EUR 7 million or 1.4% of total worldwide annual turnover, whichever is higher |
Personal Liability
Article 20 introduces a fundamental shift: management bodies are directly accountable for cybersecurity. Specifically:
- Management bodies must approve the cybersecurity risk-management measures and oversee their implementation
- Management bodies can be held liable for infringements of Article 21 requirements
- Members of management bodies are required to follow cybersecurity training, and entities are encouraged to offer similar training to employees regularly
- For essential entities, authorities can impose a temporary ban on individuals holding management positions if compliance failures persist
This means board members and senior executives who fail to take cybersecurity governance seriously face personal consequences, including potential disqualification from leadership roles.
Incident Reporting Obligations
Article 23 establishes a structured, multi-stage incident reporting framework for significant incidents:
| Stage | Deadline | Content |
|---|---|---|
| Early warning | Within 24 hours of becoming aware | Initial notification indicating whether the incident is suspected of being caused by unlawful or malicious acts, or could have cross-border impact |
| Incident notification | Within 72 hours of becoming aware | Updated assessment of the incident, its severity and impact, and indicators of compromise where available |
| Final report | Within one month of the incident notification | Detailed description including root cause analysis, mitigation measures applied, and cross-border impact where applicable |
A significant incident is defined as one that has caused or is capable of causing severe operational disruption of the services or financial loss for the entity, or has affected or is capable of affecting other natural or legal persons by causing considerable material or non-material damage.
Where Organizations Stand Today
The ENISA NIS Investments 2025 report, based on survey data from entities across the EU, reveals concerning readiness gaps:
- 50% of organizations report difficulty with patching and vulnerability management
- 49% struggle with business continuity requirements
- 37% find supply chain risk management the most challenging area
- 30% have not conducted a cybersecurity assessment (penetration test or audit) in the past 12 months
- 28% take more than three months to patch critical vulnerabilities
- 70% cite NIS2 compliance as the primary driver behind cybersecurity investment decisions
- 76% struggle to attract cybersecurity professionals; 71% struggle to retain them
Separately, Aon's NIS2 readiness analysis among EMEA clients found an average readiness score of only 58% across nine key cybersecurity measures and reporting obligations.
The ENISA report also highlights a deficit of approximately 299,000 skilled cybersecurity professionals across the EU, driving organizations to shift investment from staffing toward technology platforms and managed services.
Separately, a January 2025 ECSO white paper on NIS2 implementation found that 34% of SMEs report no ability to secure additional budget for compliance — a structural barrier that won't resolve itself without strategic intervention.
These numbers reflect the reality: most organizations know they need to comply but have significant operational gaps to close.
Your 6-Month Compliance Roadmap
The following roadmap assumes your organization is in scope and has not yet achieved full compliance. Adapt the timeline to your specific gaps and national requirements.
Month 1: Gap Assessment and Entity Classification
Objective: Understand exactly where you stand and what applies to you.
- Confirm your entity classification (essential vs. important) based on sector and size thresholds
- Determine which national law applies to you (especially relevant for organizations operating across multiple Member States)
- Complete registration requirements with your national competent authority (deadlines vary by country)
- Conduct a gap assessment against all 10 Article 21 measures
- Document your current cybersecurity posture, including existing certifications (ISO 27001, SOC 2) and their coverage relative to NIS2 requirements
- Identify your organization's CSIRT contact point and establish communication channels
Deliverables: Entity classification memo, gap assessment report, registration confirmation
Month 2: Risk Management Framework
Objective: Establish the documented risk management foundation that NIS2 requires.
- Develop or update your information security risk assessment methodology
- Create a risk register covering all critical network and information systems
- Define risk acceptance criteria aligned with your organization's risk appetite
- Document risk analysis and information system security policies (Measure 1)
- Map your critical assets, data flows, and system dependencies
- Begin board/management briefing on NIS2 governance obligations (Article 20)
Deliverables: Risk assessment methodology, risk register, asset inventory, updated security policies
Month 3: Incident Response and Reporting
Objective: Build the incident handling capability and reporting workflows that meet the 24/72-hour timelines.
- Develop or update incident response procedures (Measure 2)
- Establish the multi-stage reporting workflow (24-hour early warning, 72-hour notification, 1-month final report)
- Identify your national CSIRT and establish reporting channels
- Define incident classification criteria aligned with the "significant incident" definition
- Conduct a tabletop exercise to validate your incident response capability
- Establish roles and responsibilities for incident handling and reporting
Deliverables: Incident response plan, reporting procedures, tabletop exercise report, CSIRT contact registration
Month 4: Supply Chain Security and Third-Party Risk
Objective: Address the supply chain security obligations that organizations find most challenging.
- Inventory your direct suppliers and critical service providers
- Assess supply chain security practices (Measure 4)
- Review and update contracts with critical suppliers to include cybersecurity requirements
- Establish vulnerability handling and disclosure processes for your supply chain
- Define criteria for evaluating the security posture of new suppliers
- Implement monitoring for supplier security changes and incidents
Deliverables: Supplier security inventory, updated contract templates, TPRM policy, vendor assessment criteria
Month 5: Governance, Training, and Access Controls
Objective: Put the management accountability framework in place and address human security.
- Formalize board/management approval of cybersecurity risk-management measures (Article 20 requirement)
- Schedule and deliver cybersecurity training for management body members (mandatory under Article 20)
- Implement or verify multi-factor authentication across critical systems (Measure 10)
- Review and update access control policies (Measure 9)
- Establish cybersecurity hygiene practices and regular staff training programs (Measure 7)
- Document cryptography and encryption policies (Measure 8)
- Implement human resources security procedures (onboarding, offboarding, role changes)
Deliverables: Board approval documentation, management training records, MFA deployment report, updated access control and HR security policies
Month 6: Testing, Documentation, and Audit Readiness
Objective: Validate your controls work and prepare for supervisory engagement.
- Conduct a security assessment (penetration test or technical audit) to validate control effectiveness
- Implement business continuity and disaster recovery testing (Measure 3)
- Assess the effectiveness of all cybersecurity risk-management measures (Measure 6)
- Compile evidence packages for each of the 10 Article 21 measures
- Prepare for supervisory inspections: ensure documentation is current, accessible, and defensible
- Identify residual gaps and create a remediation plan with timelines
- Conduct a management review and obtain formal sign-off on the compliance status
Deliverables: Security assessment report, BCP/DR test results, effectiveness assessment, evidence packages, management sign-off
National Implementation: Key Differences
While NIS2 sets the floor, national transposition laws may add requirements. Here is the status of key Member States as of February 2026:
| Country | National Law | Status | Effective Date |
|---|---|---|---|
| Belgium | Law of 26 April 2024 (Loi NIS2) | Enacted | October 18, 2024 |
| Italy | Legislative Decree 138/2024 | Enacted | October 16, 2024 |
| Finland | Cybersecurity Act 124/2025 | Enacted | April 8, 2025 |
| Germany | NIS2UmsuCG | Enacted | December 6, 2025 |
| Netherlands | Cyberbeveiligingswet (Cbw) | Pending — plenary debate March 23, 2026 | Est. Q2 2026 |
| France | Loi relative a la resilience des infrastructures critiques | Final legislative stages | Est. Q1 2026 |
| Spain | Draft Law on Cybersecurity Coordination and Governance | Parliamentary processing; infringement proceedings | TBD |
| Poland | Amendment to KSC Act (Ustawa o KSC) | Draft sent to Sejm Nov 2025; stalled over budget dispute | TBD |
Belgium and Italy were among the few Member States to meet the original October 2024 deadline. Germany enacted its law in December 2025 after significant delay, immediately expanding the number of regulated entities from approximately 4,500 to 29,000. Italy notably added additional annexes (III and IV) expanding scope beyond the EU minimum. The Netherlands estimates approximately 8,000 organizations will be in scope nationally; France estimates approximately 15,000.
Organizations operating across multiple Member States should verify requirements in each jurisdiction, as supervisory authorities, registration obligations, and enforcement timelines differ.
Making Compliance Sustainable
A six-month sprint gets you to baseline compliance. Sustaining it requires ongoing operational discipline:
- Continuous monitoring: Cybersecurity risk management is not a one-time project. Measure 6 requires ongoing assessment of control effectiveness.
- Regular training: Article 20 mandates management training. Make it recurring, not a checkbox.
- Supplier oversight: Supply chain security requires continuous monitoring, not annual questionnaire exercises.
- Incident preparedness: Test your reporting workflows regularly. The 24-hour early warning window leaves no room for improvisation.
- Regulatory tracking: National implementations continue to evolve. Stay current with your competent authority's guidance and enforcement priorities.
The organizations that treat NIS2 as an opportunity to build genuine resilience, rather than a compliance exercise, will be the ones that navigate enforcement successfully. The regulatory framework is clear. The deadlines are here. The question is whether your organization is ready to act.
Sources
Official EU Sources
- NIS2 Directive (EU 2022/2555) — EUR-Lex
- NIS2 Implementing Regulation (EU 2024/2690) — EUR-Lex
- European Commission — NIS2 transposition in EU countries
- European Commission — Infringement proceedings against 23 Member States (Nov 2024)
- ENISA — NIS Investments 2025 Report
National Transposition
- Belgium — Centre for Cybersecurity Belgium NIS2
- Italy — Digital Policy Alert, Decree 138/2024
- Finland — Traficom, Cybersecurity Act 124/2025
- Germany — Reed Smith, NIS2UmsuCG enacted
- Germany — Bird & Bird, Bundestag passes NIS2
- Netherlands — Nestor Security, Cyberbeveiligingswet submitted to Tweede Kamer
Analysis and Industry Reports