Cinthia Trevisoli

Cinthia Trevisoli

Dec 18, 2023   •  2 min read

NIS2 Guideline - What german companies need to know now

NIS2 guideline: What German companies need to know now

The EU cybersecurity landscape is undergoing a significant change as a result of the NIS2 Directive and its German implementation, the NIS-2 Implementation and Cybersecurity Strengthening Act (NIS-2UmsuCG). This article provides an overview of the specific compliance requirements for German companies and what this means for future management. Additionally, it offers a guideline for navigating these new regulations effectively, ensuring that companies can know their obligations and need to enhance their cybersecurity measures in alignment with the Directive's goals.

What is the NIS-2UmsuCG?

The draft bill from the Federal Ministry of the Interior forms the basis for the German compliance requirements of the NIS2 directive. This is intended to create a coherent level of cybersecurity in the EU and includes expanded requirements and sanctions.

Compliance requirements for German companies

German companies must evaluate themselves based on defined criteria. This criteria concern, among other things, the size of the company and the industry. Executives now have direct responsibility for identifying and addressing cyber risks.

Key measures include:

  • Cyber risk management: Companies must implement and continually develop effective risk management.
  • Security in the supply chain: Security must also be guaranteed with third-party providers.
  • Business Continuity Management: Companies must be prepared to maintain their operational capability even in crisis situations.
  • Encryption and access restrictions: Data must be managed and protected securely.
  • Reporting to the authorities: Incidents and security gaps must be reported in a timely manner.

Tiered fine concept

Failure to comply could result in fines of up to 20 million euros. The amount depends on the degree of fault and type of facility.

Affected sectors

The NIS2 directive covers a wide range of sectors, from energy to space. Each company must check for itself whether it falls under the directive.

Conclusion

The NIS2 Directive is a complex and far-reaching law that redefines cybersecurity practices in Germany and the EU. Companies are well advised to quickly understand and implement the requirements to ensure both security and compliance.

It is crucial that companies take the requirements of the NIS2 Directive seriously and implement appropriate compliance measures. This requires careful review of your own processes and possibly extensive adjustments.

Detailed NIS2 process description: Business operations during a cyberattack

Detailed NIS2 process description: Business operations during a cyberattack

The goal of this process is to ensure that the company can continue business operations even in the event of a cyberattack. The implementation and regular updating of a Business Continuity Plan (BCP) play a decisive role here. This plan defines emergency measures and alternative operating procedures to ensure that ...

CCNet

CCNet

Mar 5, 2025   •  3 min read

Template analysis for effective investigation of security incidents

Template analysis for effective investigation of security incidents

NIS2 Template: Standard Analysis for Effective Investigation of Security Incidents Purpose of the Analysis The method serves to conduct a structured investigation of security incidents, aiming to uncover causes, document the course of the incident, and derive preventive measures to prevent future incidents. Scope This analysis method is used for ...

CCNet

CCNet

Mar 3, 2025   •  2 min read

NIS2-Analysis: Detailed incident response report for precise evaluation of IT security incidents

NIS2-Analysis: Detailed incident response report for precise evaluation of IT security incidents

NIS2 Analysis: Detailed Incident Response Report for Accurate Evaluation of IT Security Incidents On September 15, 2024, at 14:35, suspicious network traffic was detected by our SIEM system, indicating a potential ransomware infection. This required immediate responses. Unusual activity, such as high CPU usage and file encryption, was quickly ...

CCNet

CCNet

Jan 31, 2025   •  2 min read