What is NIS2 Directive 2024? Regulations, compliance and framework

Reviewed by: Andrius Minkevičius (Chief Technology Officer)

I still remember the first time a client looked me in the eye and asked, “So, are we good with NIS2?” My gut twisted. Not because I didn’t know the NIS2 directive, but because I knew how much confusion surrounded it—especially for mid-sized enterprises juggling daily threats and governance demands without the luxury of in-house legal teams.

Since then, I’ve sat in countless compliance review meetings, untangled sector-specific nuances, and helped security officers translate EU-speak into operational clarity. So, if you’ve been asking yourself what is NIS2 directive, or wondering where your organization even begins, you’re in good company. Let’s walk through the essentials together—from NIS2 compliance expectations to the strategic framework, with an experience-first approach.

Understanding the NIS2 directive: A necessary evolution

After years of feedback on the original NIS Directive (2016), the European Union adopted the NIS2 legislation (Directive (EU) 2022/2555) to account for the modern threat landscape. While the first directive laid the foundation, NIS2 builds resilience into the very architecture of critical sectors—introducing broader scope, clearer obligations, and tougher penalties.

The name? NIS2 stands for “Network and Information Security Directive 2.” It covers sectors ranging from energy, health, and banking to digital infrastructure and public administration. The goal: improve NIS2 security posture through shared responsibility and enforceable norms.

This isn’t just more paperwork. With cyberattacks targeting the weakest operational links, the directive zeroes in on supply chain risks, incident reporting, and corporate accountability—requiring executive-level responsibility for cybersecurity, not just technical staff.

And the timing? Urgent. EU Member States must transpose the directive into national law by October 17, 2024.

Who must comply and what changes in scope

The expanded NIS2 applicability is one of the most critical shifts. If your organization falls into any of the covered sectors and meets size thresholds, it’s likely within scope—even if you weren’t under the original directive.

Let’s look at how the NIS2 framework broadens sectoral coverage and risk management expectations.

Sector coverage and applicability under NIS2

CategorySector examplesEntity typeApplicability criteria
Essential EntitiesEnergy, Transport, Health, BankingPublic & Private≥250 employees or €50M+ turnover
Important EntitiesPostal, Waste Management, Food, Digital ServicesMostly Private≥50 employees or €10M+ turnover
Newly Covered SectorsSpace, Manufacturing of critical goodsMixedBased on criticality + size

What’s striking is that both essential and important entities face obligations, though enforcement varies. The NIS2 standard aims to eliminate loopholes that previously left crucial services unprotected.

So, if you’re a digital service provider, water utility, or even a domain name registry, this could be your first time under the compliance spotlight.

Core NIS2 compliance requirements every entity must meet

Compliance under NIS2 regulation isn’t about box-ticking; it’s about demonstrating a maturing security culture. The directive outlines both organizational and technical safeguards that entities must implement and maintain.

Before we dive into specifics, keep in mind that accountability reaches the top: executive management is now legally responsible for ensuring risk governance, a shift that demands awareness beyond IT departments.

NIS2 directive requirements at a glance

Control categorySpecific NIS2 compliance requirements
Governance & OversightBoard-level accountability, risk management policies, supply chain scrutiny
Technical MeasuresVulnerability handling, secure systems design, encryption, multifactor authentication
Incident HandlingReporting significant incidents within 24 hours to national authorities
Business Continuity & CrisisBackup policies, disaster recovery plans, resilience testing
Supply Chain Risk ManagementThird-party evaluation processes and contractual security obligations
Human FactorsAwareness training, internal whistleblower channels
Documentation & MonitoringLogs, audit trails, regular assessments of NIS2 security requirements

For most, the NIS2 technical requirements will require investment—not only in tooling but in people and processes. This is especially true for SMBs that fall within the “important” entity category but lack mature governance.

Penalties and enforcement: Why compliance isn’t optional

Unlike the first directive, NIS2 obligations come with real teeth. Member States must designate supervisory authorities with the power to audit, investigate, and fine non-compliant entities. For essential entities, fines can reach €10 million or 2% of global turnover—whichever is higher.

More critically, national authorities may issue binding instructions, suspend operations, or publicly name non-compliant companies. These reputational hits can linger far beyond the financial impact.

Still unsure if the directive applies to your organization? The European Union Agency for Cybersecurity (ENISA) offers a comprehensive NIS2 directive summary and national contact points to help you clarify obligations.

So yes, the stakes are high. But proactive engagement now can help avoid last-minute chaos—or worse, reactionary compliance after a breach.

Building your compliance roadmap: From assessment to implementation

After navigating multiple NIS2 engagements, I’ve found that organizations making the smoothest transition share a few things in common: early assessment, cross-functional buy-in, and a clear operational roadmap.

So how do you translate what is NIS2 compliance into real-world implementation? You start with a gap analysis. Then you define controls, assign responsibilities, and train your teams.

Here’s a simple starter template I’ve used with clients looking to track progress in a structured way.

NIS2 compliance checklist template

Compliance areaCurrent statusActions neededOwnerDeadline
Executive AccountabilityNot StartedAssign board sponsor, brief execsCISOApril 30
Risk Management FrameworkIn ProgressUpdate policy, add supply chain riskRisk ManagerMay 15
Incident Reporting ProcessNot StartedDefine thresholds, test drillsIT Sec LeadMay 30
Technical Controls ReviewIn ProgressMFA rollout, log aggregationIT OpsJune 10
Training and AwarenessNot StartedCreate mandatory modulesHRJune 20
Documentation & MonitoringPlannedConfigure logging, retain logsSecOpsJuly 1

Use this table as a living document. Whether you manage it in Excel, Confluence, or a GRC tool, visibility and accountability are the name of the game.

What does NIS2 mean for your long-term security culture?

Beyond compliance, NIS2 cybersecurity strategy offers a moment of reflection. This isn’t just about satisfying regulators—it’s a chance to reassess operational resilience and mature your internal culture.

If you’ve ever dealt with post-incident cleanup or explained risk posture to the board, you know that security buy-in is a process. The NIS2 directive requirements help codify that process, making security a shared organizational goal.

As we approach the October deadline, my advice is simple: don’t wait for a perfect plan. Start with visibility, involve your leadership, and work iteratively.

Because at the end of the day, what is NIS2 directive really about? It’s about making sure we’re not blindsided by the threats we already see coming—and being ready for the ones we don’t.

Are you ready to turn compliance into competitive advantage?

By now, NIS2 regulation might seem overwhelming—but it can also be empowering. The businesses that thrive under these requirements will be the ones that turn policy into practice, and security into strategy.

Want to dig deeper? I recommend exploring ENISA’s official guidance materials for authoritative details on auditing and assessment. Or better yet, sit down with your security lead this week and review your risk map together.

What does NIS2 stand for? In the real world, it stands for a better way to secure what matters most. 

Automate Your Cybersecurity and Compliance

It's like an in-house cybersec & compliance team for a monthly subscription! No prior cybersecurity or compliance experience needed.

Related articles