Cinthia Trevisoli

Cinthia Trevisoli

Dec 18, 2023   •  2 min read

NIS2 Guideline - What german companies need to know now

NIS2 guideline: What German companies need to know now

The EU cybersecurity landscape is undergoing a significant change as a result of the NIS2 Directive and its German implementation, the NIS-2 Implementation and Cybersecurity Strengthening Act (NIS-2UmsuCG). This article provides an overview of the specific compliance requirements for German companies and what this means for future management. Additionally, it offers a guideline for navigating these new regulations effectively, ensuring that companies can know their obligations and need to enhance their cybersecurity measures in alignment with the Directive's goals.

What is the NIS-2UmsuCG?

The draft bill from the Federal Ministry of the Interior forms the basis for the German compliance requirements of the NIS2 directive. This is intended to create a coherent level of cybersecurity in the EU and includes expanded requirements and sanctions.

Compliance requirements for German companies

German companies must evaluate themselves based on defined criteria. This criteria concern, among other things, the size of the company and the industry. Executives now have direct responsibility for identifying and addressing cyber risks.

Key measures include:

  • Cyber risk management: Companies must implement and continually develop effective risk management.
  • Security in the supply chain: Security must also be guaranteed with third-party providers.
  • Business Continuity Management: Companies must be prepared to maintain their operational capability even in crisis situations.
  • Encryption and access restrictions: Data must be managed and protected securely.
  • Reporting to the authorities: Incidents and security gaps must be reported in a timely manner.

Tiered fine concept

Failure to comply could result in fines of up to 20 million euros. The amount depends on the degree of fault and type of facility.

Affected sectors

The NIS2 directive covers a wide range of sectors, from energy to space. Each company must check for itself whether it falls under the directive.

Conclusion

The NIS2 Directive is a complex and far-reaching law that redefines cybersecurity practices in Germany and the EU. Companies are well advised to quickly understand and implement the requirements to ensure both security and compliance.

It is crucial that companies take the requirements of the NIS2 Directive seriously and implement appropriate compliance measures. This requires careful review of your own processes and possibly extensive adjustments.

Meet the NIS2-Requirements through regular review and adjustment of your cybersecurity strategy

Meet the NIS2-Requirements through regular review and adjustment of your cybersecurity strategy

Meet NIS2 Requirements by Regularly Reviewing and Adjusting Your Cybersecurity Strategy A well-thought-out and clearly defined emergency management plan for cybersecurity incidents is crucial to minimizing the impact of a potential cyberattack and ensuring business continuity. Companies must ensure that their emergency plans are regularly reviewed and adapted to new ...

CCNet

CCNet

Jan 22, 2025   •  3 min read

NIS2 Emergency Management: Effective Response to Cybersecurity Incidents

NIS2 Emergency Management: Effective Response to Cybersecurity Incidents

NIS2 Emergency Management: Effective Response to Cybersecurity Incidents An efficient emergency management process is crucial for preparing companies for potential cyberattacks and ensuring a quick and coordinated response. A comprehensive emergency plan outlines clear procedures for communication, containment, remediation, and recovery following an incident. Objective This process aims to ensure ...

CCNet

CCNet

Jan 20, 2025   •  3 min read

Ensuring the Accuracy of Access Rights: Identity and Access Management (IAM)

Ensuring the Accuracy of Access Rights: Identity and Access Management (IAM)

The regular review and adjustment of access rights is a central component of the company's IT security strategy. An automated Identity and Access Management (IAM) system ensures that access to IT systems and sensitive data corresponds to users' current roles and responsibilities and prevents unauthorized access. Objective The main goal ...

CCNet

CCNet

Jan 17, 2025   •  2 min read