NIS2 Compliance
Practical support for organisations in scope of the NIS2 Directive under Irish law.
NIS2 is the European Union’s updated cybersecurity directive, replacing the original 2016 NIS Directive. Transposed into Irish law with the National Cyber Security Centre (NCSC) as the competent authority, it brings a much wider range of organisations into regulated cybersecurity scope—with meaningful obligations and significant penalties for non-compliance.
If you’re operating in one of the directive’s eighteen sectors and meet the size thresholds, you’re likely in scope whether or not you’ve been formally notified.
What NIS2 requires
NIS2 sets out obligations across four main areas:
Risk management measures
Article 21 specifies ten minimum cybersecurity risk management measures that in-scope entities must implement, including:
- Risk analysis and information security policies
- Incident handling procedures
- Business continuity and crisis management
- Supply chain security
- Security in system acquisition, development, and maintenance
- Effectiveness assessment of cybersecurity measures
- Cyber hygiene and training
- Cryptography and encryption policies
- Human resources security and access control
- Multi-factor authentication
The directive is deliberately technology-neutral—you decide appropriate controls based on your risk profile, size, and the cost of implementation.
Incident reporting
Significant incidents must be reported to the NCSC on a strict timeline:
- Early warning within 24 hours of becoming aware of the incident
- Incident notification within 72 hours, including an initial assessment
- Final report within one month, covering root cause, mitigations, and impact
Management accountability
NIS2 makes board-level and executive management directly accountable for cybersecurity risk management. Managers must approve cybersecurity measures, oversee their implementation, and undertake regular training. Penalties can include temporary prohibition on managerial functions—a substantial personal risk.
Supply chain security
Entities must assess and manage cybersecurity risks across their supply chains, including direct suppliers and service providers. This has knock-on effects for organisations supplying entities in scope, even if they aren’t directly caught by the directive themselves.
Who’s in scope
NIS2 applies to “essential” and “important” entities across eighteen sectors:
Essential entities: energy, transport, banking, financial market infrastructures, health, drinking water, waste water, digital infrastructure (cloud, DNS, data centres, trust services, public electronic communications), ICT service management (B2B), public administration, and space.
Important entities: postal and courier services, waste management, chemicals, food, manufacturing of medical devices, computers and electronics, electrical equipment, machinery, motor vehicles and transport equipment, digital providers (online marketplaces, search engines, social networking platforms), and research.
In most cases, only medium and large organisations (50+ employees or €10M+ turnover) are captured. Certain entity types are in scope regardless of size—including DNS providers, top-level domain registries, and some trust service and communications providers.
If you’re uncertain, we can assess scope quickly based on your sector, activities, and size.
Penalties and enforcement
For essential entities, administrative fines can reach €10 million or 2% of worldwide annual turnover, whichever is higher. For important entities, the cap is €7 million or 1.4%. Competent authorities can also suspend certifications or authorisations, and temporarily prohibit individuals from exercising managerial functions—a meaningful shift toward personal accountability.
How NIS2 relates to other frameworks
NIS2 doesn’t mandate any specific framework, but several established standards map closely to its requirements:
- ISO 27001 — provides the risk management, access control, incident management, and supply chain security capabilities NIS2 expects. Many organisations use ISO 27001 as the backbone for demonstrating compliance.
- ISO 22301 — supports the business continuity and crisis management requirements explicitly called out in Article 21.
- GDPR — the personal data breach reporting regime complements NIS2’s incident reporting; many organisations align the two processes.
How we can help
Scope and applicability assessment
We’ll help you determine whether NIS2 applies to your organisation, and if so, whether you qualify as an essential or important entity. You’ll have a clear, documented position you can share with auditors, customers, and the NCSC.
Gap analysis against Article 21
We’ll assess your current cybersecurity posture against the ten minimum measures and other obligations, identifying what’s in place, what’s partially addressed, and what needs to be built. You’ll get a prioritised remediation roadmap.
Programme design and implementation
Working with your existing teams, we’ll help design and implement the policies, procedures, and controls to meet NIS2 obligations—ideally reusing or extending what you already have rather than building parallel structures.
Incident reporting readiness
We’ll help you establish the processes, decision criteria, and templates to meet the 24/72-hour/one-month reporting timelines under pressure—including tabletop exercises so the first real incident isn’t where you test the process.
Management training and board briefings
NIS2 requires management accountability, including training. We can deliver tailored board-level briefings and ongoing cybersecurity training that meets the directive’s expectations while fitting your organisation’s governance rhythm.
Supply chain risk management
Building out a proportionate supply chain cybersecurity programme—vendor due diligence, contractual requirements, ongoing oversight—aligned with NIS2 expectations and your actual risk profile.
Integration with ISO 27001 or ISMS
If you have or are considering ISO 27001, we’ll help integrate NIS2 obligations into your existing management system rather than running a separate compliance track.
What to expect
An initial scope assessment and gap analysis typically takes 3-6 weeks depending on organisation size and complexity. From there, remediation and programme implementation is scaled to your needs and starting position.
We work directly with your leadership, security, IT, legal, and business teams to make NIS2 a structured part of how you operate—not a parallel compliance overlay.
