
Cybersecurity must be a collective effort to successfully defend against sophisticated cyber-attacks. Modern technology networks are hyperconnected, so an attack originating in one area can quickly impact another area severely — whether that area is in a different company, industry or even country. The need to develop a collective strategy is even more urgent when the networks that countries rely on to deliver critical national infrastructure services are targeted by nation-state actors wishing to cause disruption. These essential services can include health, finance, water, transport and even the government itself.
This urgency was brought into stark focus by the recent U.S. Government announcement that the Chinese hacker group Volt Typhoon was detected infiltrating the IT environments of its transport and water systems for the past five years. The statement, co-signed by national cybersecurity agencies in Britain, Canada, Australia and New Zealand, emphasised the risk of disruptive attacks launched from within compromised networks. Protecting against such widespread and high-impact attacks will only be successful if all parts of the network are covered, and that requires a collaborative approach.
In the UK, the Law Society recently provided guidance to law firms after a service provider of managed IT services for law firms and the professional services industry experienced a cyberattack that purportedly resulted in the disruption of up to 80 law firms, with many left unable to access case files.
Examples like this provide the rationale behind the EU’s Network and Information Security (NIS2) Directive, which is set to be transposed into national law in every EU country by October 2024. NIS2 provides a list of security risk-management measures that essential and important entities should implement to protect network and information systems and seeks to achieve a higher common level of cybersecurity and cyber resilience across the EU. The aim is to increase collective preparedness, improve the ability of organisations to withstand and recover more quickly from cybersecurity incidents and generally raise cybersecurity standards in key industries and their supply chains across Europe. Prescribing and enforcing minimum levels of cybersecurity performance for in-scope organisations will lessen the likelihood of cyberattacks disrupting citizens, societies and economies, minimise the impact of the attacks that do happen and empower collective incident responses.
As the name implies, this isn’t the first attempt to collectively improve cybersecurity standards. This iteration addresses some of the shortcomings of the earlier directive and increases the number of organisations and sectors covered. It provides for greater harmonisation and international cooperation and is more prescriptive on the timeframes and content that must be included in incident reporting.
NIS2 will impact governance, risk and compliance practices for essential and important entities across 18 sectors, divided between Sectors of High Criticality and Other Critical Sectors. Examples include energy, transport, health, drinking water and waste management, health, digital infrastructure, ICT service management, postal and courier services, production, processing and distribution of food, manufacturing and digital providers.
Crucially, NIS2 also:
Organisations that fail to comply with NIS2 face a range of penalties including:
Complying with the NIS2 Directive, therefore, requires organisations to ensure they have good visibility over cybersecurity performance, with effective controls and monitoring to deliver the assurance needed by senior leaders.
From a governance perspective, this regulation also requires that the members of management bodies of essential and important entities are have NIS2 training so they can identify and prioritise cybersecurity risks and are sufficiently experienced in that area to discharge their risk management duty effectively.
Beyond the immediate organisation, enhanced levels of third-party risk management will be essential to identify and manage cybersecurity risk among key companies in the supply chain and ensure that the supply chain has implemented appropriate and proportionate technical, operational and organisational measures to manage the risks posed to the security of their network and information systems.
If you want more information on NIS2 and how to comply, look no further. Download our white paper and NIS2 checklist today for deep insights and expert advice.
Meeting the diverse requirements of the NIS2 Directive will entail a unified approach to governance, risk and compliance. Organisations will need visibility across the different areas of cybersecurity risk and third-party risk to deliver the assurance needed by management bodies.
The Diligent One Platform can help deliver that assurance. Diligent offers integrated tools covering internal controls, enterprise and third-party risk and compliance, which support risk practitioners and management bodies by offering a single source of truth. This data is vital for accurate decision-making, planning and quick action when a significant cybersecurity incident occurs.
We have also created a NIS2 Compliance Toolkit to elevate your IT compliance while saving time and conserving resources. This toolkit will help you to build and maintain a brand your customers trust by demonstrating an informed commitment to robust NIS2 compliance and information security.
Our NIS2 Compliance Toolkit maps the cybersecurity risk-management measures and obligations mandated by NIS2 for essential and important entities and their supply chains against a set of cybersecurity controls based on international standards and best practices.
Speak to an expert to learn how you can enhance your NIS2 compliance with Diligent.