Essential and important entities registration
By April 17, 2025, the Member States must identify the essential and important entities in scope for the NIS2 Directive. Member States can enable entities to register themselves. Therefore, entities will have to determine if their services fall within the scope of NIS2, identify the list of Member States where they provide “in-scope” services and register before the deadline in each Member State. The registration will require entities to provide at least the following:
- Their name, address and registration number
- The sector or sub-sector in NIS2 scope under which they fall
- Their updated contact details
- Member states in which they operate
- The list of their assigned IP addresses
The final registration process and list of information required will be defined as part of the transposition of the Directive into law.
Improved cooperation (CSIRT platform)
Another important element of the new Directive is the intention to improve the cooperation of the EU Member States regarding cyber incidents and threats. The European Union Agency for Cybersecurity (ENISA) will be mandated to establish a European Vulnerability disclosure database to facilitate knowledge sharing between the Member States.
Incident reporting
As already established for NIS1, every Member State will have a central point of contact for compliance with the Directive and a coordinating CSIRT (Computer Security Incident Response Teams) for incident reporting or a competent authority. In Belgium, for example, this will be the role of the CCB (Centre for Cyber Security Belgium).
NIS2 has designed a new timeline for reporting incidents. Every incident with significant impact should be notified by the essential and important entities without undue delay. Within 24 hours, an early warning should be communicated, as well as some first presumptions regarding the kind of incident to the competent authority or CSIRT. After 72 hours, a full notification report must be communicated, containing the assessment of the incident, severity and impact and indicators of compromise. After 1 month, a final report must be communicated.
In that regard, the Directive encourages Member States to simplify the incident reporting process by implementing a single entry point for incidents to reduce the administrative burden, including for cross-Member State incidents.
The CSIRT, or where applicable the competent authority, has to report to ENISA on the incidents every three months, using anonymized information. With all this information, ENISA will then in turn report every six months on the EU incidents. This reporting will help organizations and the Member States to learn from other incidents and is a crucial change in the new NIS2 Directive.
Focus on key supply chains
Recent incidents all over the world have proven the importance of continuity within critical supply chains, which is why NIS2 has introduced it as one of the key focus points. Individual enterprises will be responsible for addressing cybersecurity risks in their own supply chains, as well as within supplier relationships.
This requirement might indirectly influence many suppliers who are not in the scope of the new NIS2 Directive, but they might deliver services or products to an in-scope NIS2 entity. Hence, their customer might impose a minimal cybersecurity maturity on the supplier. The supplier will not be supervised by the national authorities regarding NIS2, but by their customer. So, even if your organization is not in scope, it might still have an impact depending on the services and sector.
Accountability of the management
Another important addition to NIS1 is the accountability the new Directive assigns to the management of organizations in scope. It will be obligatory for management to take responsibility regarding their cybersecurity maturity. This will include having risk assessments conducted and approving risk treatment plans to be implemented, among other tasks. In order to perform these actions, management must follow cybersecurity training. The Directive even suggests not only to train management, but also employees, for more in-depth knowledge of cybersecurity.
Jurisdictional complexity
Under the NIS2 Directive, essential and important entities are deemed to be under the jurisdiction of the Member State where they provide their services.
If the entity provides services in more than one Member State, it should fall under the jurisdiction of each of these Member States. For entities where the service is provided or is dependent on operations outside the EU, they should ensure the continuity of their EU services in case of disruption of their non-EU operations.
Penalties
NIS1 provided penalties for non-compliance by OES and DSPs, while NIS2 introduces stricter penalties for non-compliance, including fines of up to 10% of an entity's annual turnover.
- For essential entities: administrative fines of up to €10,000,000 or at least 2% of the total annual worldwide turnover in the previous fiscal year of the company to which the essential entity belongs, whichever amount is higher.
- For important entities: administrative fines of up to €7,000,000 or at least 1.4% of the total annual worldwide turnover in the previous fiscal year of the company to which the important entity belongs, whichever amount is higher.