Who needs NIS 2 compliance?
NIS 2 applies to medium and large organizations in 18 sectors:Essential entities
Energy, transport, banking, financial market infrastructure, health, drinking water, digital infrastructure, ICT service management, public administration, and space.
Important entities
Postal services, waste management, chemicals, food production, manufacturing, digital providers, and research.
Key requirements
| Requirement | Description |
|---|---|
| Risk Management | Implement technical, operational, and organizational cybersecurity measures |
| Incident Reporting | 24-hour early warning, 72-hour notification, 1-month final report |
| Supply Chain Security | Assess and manage cybersecurity risks in your supply chain |
| Governance | Senior management must approve and oversee cybersecurity measures |
| Business Continuity | Backup management, disaster recovery, and crisis management |
| Training | Regular cybersecurity training for management and staff |
How DSALTA helps
- NIS 2 controls mapped to all directive requirements
- Incident response documentation and reporting templates
- Supply chain risk management through vendor scoring
- Governance documentation for management accountability
- Cross-framework mapping — ~80% overlap with ISO 27001, significant overlap with DORA
Frequently asked questions
Does NIS 2 apply outside the EU?
Does NIS 2 apply outside the EU?
NIS 2 applies to organizations providing services or conducting activities within the EU, regardless of where they are headquartered. If you serve EU customers in covered sectors, you may be in scope.
How does NIS 2 relate to ISO 27001?
How does NIS 2 relate to ISO 27001?
There is approximately 80% overlap. Organizations with ISO 27001 certification have a strong foundation for NIS 2 compliance, but need to address additional requirements like incident reporting timelines and supply chain security.
Can management be personally liable?
Can management be personally liable?
Yes. NIS 2 allows member states to hold management personally liable for gross negligence in cybersecurity oversight.
.png?fit=max&auto=format&n=tsMQJyneJ1xquFUo&q=85&s=4d401cc03b547d99b6f75a6bd170c334)