{"id":58800,"date":"2025-07-24T07:46:57","date_gmt":"2025-07-24T14:46:57","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=glossary&#038;p=58800"},"modified":"2025-07-28T02:25:14","modified_gmt":"2025-07-28T09:25:14","slug":"what-is-nis2","status":"publish","type":"glossary","link":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2","title":{"rendered":"What Is NIS2?"},"content":{"rendered":"\n<p>The NIS2 Directive is a major step forward in strengthening cybersecurity across critical EU sectors. In this post, you\u2019ll find a simple definition of NIS2, a breakdown of how it differs from the original NIS Directive, and a summary of the steps your organization must take to achieve compliance.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">NIS2 in a nutshell<\/h2>\n\n\n\n<p><a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\/oj\/eng\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a>, or Directive (EU) 2022\/2555, was created to improve the level of cybersecurity across the European Union. It was adopted on December 14, 2022, and took effect on January 16, 2023. Although each EU Member State was required to transpose the Directive into its own national law by October 17, 2024, <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/news\/commission-calls-23-member-states-fully-transpose-nis2-directive\" target=\"_blank\" rel=\"noreferrer noopener\">as of November 2024<\/a>, twenty-three Member States had still not done so.<\/p>\n\n\n\n<p>NIS2 builds on the original NIS Directive adopted in 2016 and aims to raise the standard of cybersecurity posture for both public and private entities that play a crucial role in the EU&#8217;s economy and society.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How NIS2 differs from the original NIS Directive<\/h2>\n\n\n\n<p>While the original NIS Directive focused on a limited number of <strong>operators of essential services<\/strong> and <strong>digital service providers<\/strong>, NIS2 has a broader scope. It introduces two new classifications: <strong>essential entities<\/strong> and <strong>important entities<\/strong>.&nbsp;<\/p>\n\n\n\n<p>The NIS2 Directive applies to a <strong>wider range of sectors<\/strong> than the original Directive. The new Directive also automatically applies to the majority of medium and large enterprises within the covered sectors, reducing gaps and inconsistencies across the EU.<\/p>\n\n\n\n\t\t<div  class=\"block-01814afe-c656-45f4-b3fe-f711b75dade3 areoi-element container template-4 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-37f687a5-4d79-4bb5-b798-c5847efcdcc5 areoi-element p-3 table-head\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Comparison between the scope of the NIS Directive (2016) and the NIS2 Directive (2022)<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f9ae7675-6f5b-4754-9a07-90e2f5a46e0c areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-28b3d633-1691-4973-8d7b-d2c1838773fc row areoi-element row-cols-1 row-cols-md-3\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-1765243f-d41b-4e37-8d4d-7c7bde2c1da0 col areoi-element px-0 col-12 col-sm-6 col-md-6 col-lg-6 col-xl-6 col-xxl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-1e8a9f72-6e48-4e74-8935-f42123d57b46 areoi-element sub-header\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(214, 222, 226,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-3\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\">NIS<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-de422b30-c5c8-48dc-9722-2c154852c8e4 row areoi-element mx-0 row-cols-1\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-26a4b938-4e6e-4cb5-9d7a-dfb16edb7f4c col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><strong>Covered entities: <\/strong>Operators of essential services and digital service providers\u00a0<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cef73172-c910-4307-bfd1-613079ad3bcc col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><strong>Sectors covered:<\/strong> Energy, transport, banking, financial market infrastructure, health, drinking water, digital infrastructure, digital services<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-559b2b87-1152-49d9-8863-c8a2dff46657 col areoi-element px-0 col-12 col-sm-6 col-md-6 col-lg-6 col-xl-6 col-xxl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-9cab978a-ad7c-4526-b607-49bd2557c5e3 areoi-element sub-header\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(214, 222, 226,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-3\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\">NIS2<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d2c36afe-d5c2-43d8-83c2-77d70f3e8632 row areoi-element mx-0 row-cols-1\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><strong>Covered entities<\/strong>: Essential entities and important entities\u00a0<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-286e6d3f-5937-4575-bf0a-078bcf17a9d3 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><strong>Sectors covered<\/strong>: Energy, transport, banking, financial market infrastructure, health, drinking water, waste water, ICT service management (B2B), public administration, postal and courier services, waste management, chemical industry, food, manufacturing, digital providers, research<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p>NIS2 also introduces <strong>stricter <\/strong><a href=\"https:\/\/www.syteca.com\/en\/blog\/true-cost-of-nis2-non-compliance\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>penalties for non-compliance<\/strong><\/a>. Unlike the original Directive, which effectively left enforcement up to individual Member States, NIS2 sets EU-wide minimum standards for supervision and sanctions. Penalties for failure to comply include administrative fines of up to \u20ac10 million (~$11.33 million) or 2% of total annual worldwide turnover, whichever is higher, as well as personal accountability for executive management in cases of repeated or severe violations.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Four key focus areas of NIS2<\/h2>\n\n\n\n<p>The Directive outlines several core NIS2 requirements that organizations operating in the EU must meet to strengthen their cybersecurity posture:<\/p>\n\n\n\n\t\t<div  class=\"block-1bc3e284-aa01-4b26-b0e9-9aaadd3f9587 areoi-element container template-16 px-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center text-26-22 p-poppins\" style=\"font-style:normal;font-weight:600\">Core focus areas in the NIS2 Directive<\/p>\n\n\n\n\t\t<div  class=\"block-82a80c63-67e6-47ad-b0bc-aec84fc0549b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-50cc948d-8398-4e88-8053-521874815a45 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5dcf9cb4-a50d-4935-817c-d526f996b1ee areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4022e4d9-f2d8-4e6f-81e2-9b027e7adec8 row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-47af660c-01c1-4f57-a16a-ed7622789879 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">01<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-113de618-d816-4dcb-ace7-c9211674a8c2 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Risk management<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-eb0d1df7-b98a-4b4f-8512-ac14885739fa col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e47e8c0-fe0a-47c7-9166-d40171c64882 areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-73fc59e5-3d7f-4c9f-b64f-042dbe690338 row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-a1f82fc9-5502-4dce-a4d7-9a387a360328 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">02<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4fa6114a-9ce3-4f3b-95a0-3b432dfcb44c col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Corporate accountability<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-10fe056a-7e7c-44e9-aba9-9f83e5a90e1a col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d38d511-c6da-4e19-a2b7-8831b29da7ad areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-18a9a1ce-aeb0-4413-be29-f4fec1f1f0ce row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-28b65d60-204d-4a65-8f63-87a7e22b28e0 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">03<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2d734441-aaa7-44c3-a11c-0752154d012d col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Reporting obligations<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e2789fee-cdd2-4e54-b827-d7304e2a75bc col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-33424547-4882-4dca-903f-67e64be58ebd areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4a9eb362-4312-4550-a696-a4755ae9bf9e row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-3db486bf-2ffd-4663-9e79-99d7dacef426 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">04<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cdfcca69-6197-48e1-9cf6-b09c254d1f54 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Business continuity<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h3 class=\"wp-block-heading\">Risk management<\/h3>\n\n\n\n<p>NIS2 requires entities to adopt appropriate technical and organizational measures to minimize cybersecurity risks. They include incident management processes, supply chain security, network protection, access controls, and encryption of sensitive data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Corporate accountability<\/h3>\n\n\n\n<p>Senior management is responsible for understanding, overseeing, and approving cybersecurity practices within the organization. Failure to comply can result in management&#8217;s personal liability, fines, or even temporary leadership bans.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reporting obligations<\/h3>\n\n\n\n<p>The Directive mandates that essential and important entities promptly report incidents that impact their services. It also introduces specific deadlines for reports:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Early warning (within 24 hours) \u2014 A high-level alert with basic facts and potential cross-border impact.<\/li>\n\n\n\n<li>Incident notification (within 72 hours) \u2014 A more complete review, including initial impact assessment.<\/li>\n\n\n\n<li>Final report (within 1 month) \u2014 Root cause analysis, mitigation steps, and lessons learned.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Business continuity<\/h3>\n\n\n\n<p>The NIS2 regulation requires organizations to develop and maintain resilience and incident recovery plans in order to be permitted to continue operating during and after cyber incidents. These plans should include system recovery strategies, emergency response procedures, and the members of crisis management teams.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How to comply with NIS2: 10 cybersecurity measures<\/h2>\n\n\n\n<p>NIS2 lays out ten mandatory cybersecurity practices for organizations. Here are the measures you need to implement for compliance:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"626\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24072720\/1-what-is-nis2-1024x626.png\" alt=\"Security measures required by NIS2\" class=\"wp-image-58802\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24072720\/1-what-is-nis2-1024x626.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24072720\/1-what-is-nis2-300x183.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24072720\/1-what-is-nis2-768x469.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24072720\/1-what-is-nis2-1536x938.png 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24072720\/1-what-is-nis2-2048x1251.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>1. Risk analysis and security policies<\/strong><\/p>\n\n\n\n<p>Regularly assess cybersecurity risks that could impact your organization&#8217;s network and information systems. Based on these assessments, adopt and maintain up-to-date security policies designed to address and mitigate identified risks.<\/p>\n\n\n\n<p><strong>2. Incident handling<\/strong><\/p>\n\n\n\n<p>Establish formal procedures for detecting, managing, and responding to cybersecurity incidents. These should include early threat identification, timely containment, recovery processes, and communication strategies for internal and external stakeholders.<\/p>\n\n\n\n<p><strong>3. Business continuity and disaster recovery<\/strong><\/p>\n\n\n\n<p>Develop and maintain business continuity plans to ensure the resilience of critical operations during and after a cybersecurity incident. Regularly back up important data and have recovery strategies and predefined emergency response protocols in place.<\/p>\n\n\n\n<p><strong>4. Supply chain security<\/strong><\/p>\n\n\n\n<p>You must also manage risks that arise from your third-party service providers and suppliers. Assess the security posture of your vendors, require all third parties to adhere to cybersecurity standards while working with your systems and data, and ensure they follow appropriate risk management practices within their IT environments.<\/p>\n\n\n\n<p><strong>5. Secure network and information systems acquisition, development, and maintenance<\/strong><\/p>\n\n\n\n<p>Security must be embedded throughout the whole lifecycle of your network and information systems. Adhere to secure design principles, conduct security tests, and ensure that software updates and patches are properly managed.<\/p>\n\n\n\n<p><strong>6. Testing for the efficacy of cybersecurity measures&nbsp;<\/strong><\/p>\n\n\n\n<p>NIS2 compliance requires regular monitoring, testing, and evaluation of security controls to verify their efficacy. Develop and document procedures for audits, vulnerability assessments, penetration testing, and security performance reviews.<\/p>\n\n\n\n<p><strong>7. Cyber hygiene and training<\/strong><\/p>\n\n\n\n<p>Promote a strong security culture by providing ongoing cybersecurity training for employees, contractors, and third-party users. Educate them on effective cyber hygiene practices, such as using secure passwords and recognizing phishing attempts and other threats.<\/p>\n\n\n\n<p><strong>8. Cryptography and data protection<\/strong><\/p>\n\n\n\n<p>Protect your organization\u2019s sensitive data with robust cryptographic techniques. Encryption should be applied to data at rest and in transit to prevent unauthorized access, manipulation, or theft.<\/p>\n\n\n\n<p><strong>9. Access control and asset management<\/strong><\/p>\n\n\n\n<p>Ensure that access to internal systems and data is granted only to authorized individuals based on their roles and responsibilities. Develop asset management policies to keep track of all hardware and software and maintain oversight of your organization&#8217;s digital environment.<\/p>\n\n\n\n<p><strong>10. Multi-factor authentication<\/strong><\/p>\n\n\n\n<p>Implement multi-factor authentication (MFA) to protect access to internal networks and systems. MFA adds an extra layer of defense against unauthorized access and account compromise.<\/p>\n\n\n\n<p>To gain a full understanding of how to comply with all NIS2 requirements, download our comprehensive ebook:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.syteca.com\/en\/resources\/ebooks\/ultimate-guide-to-nis2-compliance\" target=\"_blank\" rel=\" noreferrer noopener\"><img decoding=\"async\" width=\"768\" height=\"337\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24073121\/ebook-banner-nis2-compliance-guide-768x337-1.png\" alt=\"\" class=\"wp-image-58809\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24073121\/ebook-banner-nis2-compliance-guide-768x337-1.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24073121\/ebook-banner-nis2-compliance-guide-768x337-1-300x132.png 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.syteca.com\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca Privileged Access Management<\/a> helps organizations authenticate users securely and manage access to sensitive internal systems with ease. From <a href=\"https:\/\/www.syteca.com\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a> to granular access controls to <a href=\"https:\/\/www.syteca.com\/en\/product\/workforce-password-management\" target=\"_blank\" rel=\"noreferrer noopener\">password management<\/a>, Syteca PAM provides the necessary tools to help you reduce risk, enhance accountability, and stay compliant with NIS2 and other <a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity requirements<\/a>. <a href=\"https:\/\/www.syteca.com\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca User Activity Monitoring<\/a> also supports your NIS2 compliance efforts by <a href=\"https:\/\/www.syteca.com\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">monitoring and recording user sessions<\/a>, providing a variety of <a href=\"https:\/\/www.syteca.com\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">user activity reports<\/a>, and helping you <a href=\"https:\/\/www.syteca.com\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">mitigate security threats<\/a>.<\/p>\n\n\n\n\t\t<div  class=\"block-737dec9c-e8f9-407d-b144-7c3467a40b49 areoi-element container pattern-request-demo-2 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 235,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-6fbb4dad-3a55-4080-9304-e4614e95b1bb row areoi-element align-items-center row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9e962fe6-f77f-40f9-898c-abaef3f48ccb col areoi-element d-flex flex-wrap flex-column align-items-center align-items-md-start col-md-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-left p-poppins pt-3 text-center text-md-start lh-sm has-text-color\" style=\"color:#1a3b4e;font-size:1.75rem;font-style:normal;font-weight:600\">Want to try Syteca? Request access<br>to the online demo!<\/p>\n\n\n\n<p class=\"has-text-align-left p-poppins pb-3 text-center text-md-start\" style=\"font-style:normal;font-weight:500\">See why clients from 70+ countries already use Syteca.<\/p>\n\n\n\n\t\t\t\t\n\t\t<button data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-9170fdac-8fec-4c73-a86c-338093dbf9d9 btn areoi-has-url position-relative me-lg-2  me-md-2 me-sm-2 me-lg-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/button>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f840f051-f300-4ade-9e70-68d6c65e619d col areoi-element col-md-6 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"369\" height=\"248\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png\" alt=\"\" class=\"wp-image-24868\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png 369w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584-300x202.png 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":58816,"menu_order":0,"template":"","class_list":["post-58800","glossary","type-glossary","status-publish","has-post-thumbnail","hentry","glossary_category-compliance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is NIS2? Key Facts and Requirements | Syteca<\/title>\n<meta name=\"description\" content=\"Learn about the NIS2 Directive, its key requirements, and what EU businesses must do to demonstrate compliance with this cybersecurity framework.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is NIS2? Key Facts and Requirements | Syteca\" \/>\n<meta property=\"og:description\" content=\"Learn about the NIS2 Directive, its key requirements, and what EU businesses must do to demonstrate compliance with this cybersecurity framework.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T09:25:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074304\/OG-what-is-nis2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074258\/OG-TW-what-is-nis2.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2\",\"url\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2\",\"name\":\"What Is NIS2? Key Facts and Requirements | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074254\/banner-what-is-nis2.png\",\"datePublished\":\"2025-07-24T14:46:57+00:00\",\"dateModified\":\"2025-07-28T09:25:14+00:00\",\"description\":\"Learn about the NIS2 Directive, its key requirements, and what EU businesses must do to demonstrate compliance with this cybersecurity framework.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074254\/banner-what-is-nis2.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074254\/banner-what-is-nis2.png\",\"width\":1920,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Glossary\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary-category\/compliance\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is NIS2?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is NIS2? Key Facts and Requirements | Syteca","description":"Learn about the NIS2 Directive, its key requirements, and what EU businesses must do to demonstrate compliance with this cybersecurity framework.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2","og_locale":"en_US","og_type":"article","og_title":"What Is NIS2? Key Facts and Requirements | Syteca","og_description":"Learn about the NIS2 Directive, its key requirements, and what EU businesses must do to demonstrate compliance with this cybersecurity framework.","og_url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2","og_site_name":"Syteca","article_modified_time":"2025-07-28T09:25:14+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074304\/OG-what-is-nis2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074258\/OG-TW-what-is-nis2.png","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2","url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2","name":"What Is NIS2? Key Facts and Requirements | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074254\/banner-what-is-nis2.png","datePublished":"2025-07-24T14:46:57+00:00","dateModified":"2025-07-28T09:25:14+00:00","description":"Learn about the NIS2 Directive, its key requirements, and what EU businesses must do to demonstrate compliance with this cybersecurity framework.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074254\/banner-what-is-nis2.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/07\/24074254\/banner-what-is-nis2.png","width":1920,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-nis2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Glossary","item":"https:\/\/www.syteca.com\/en\/glossary"},{"@type":"ListItem","position":2,"name":"Compliance","item":"https:\/\/www.syteca.com\/en\/glossary-category\/compliance"},{"@type":"ListItem","position":3,"name":"What Is NIS2?"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary\/58800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/58816"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=58800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}