Our Voice

What is Cloud Transformation? The Complete Guide

Discover what cloud transformation means, its benefits, and how CWSI helps businesses modernise IT systems and drive innovation through cloud solutions.

Learn More
BOOK A MEETING

How to Navigate the NIS2 Regulation with Paul Conaty

The cybersecurity landscape in Europe is evolving rapidly, driven by rising cyber threats, advancing technology, and the introduction of new stringent regulations like the NIS2 Directive. This updated directive marks a significant shift in the European Union’s approach to cybersecurity, aiming to address the growing complexity and frequency of cyber attacks by expanding the scope and requirements for compliance.

For organisations across Europe, staying agile and adapting to these ongoing changes is crucial. Ensuring compliance with the latest European legislation not only safeguards their operations but also reinforces their commitment to protecting the digital ecosystem at large.

While the NIS2 directive’s primary aim is to enhance cybersecurity standards, the regulations also introduce a host of new challenges for businesses working to meet its stringent requirements.

Lined up balls

In this blog, Paul Conaty, Client Solutions Director at CWSI, addresses the essential questions organisations must consider as they navigate their NIS2 compliance journey. He explores the key changes introduced by NIS2, the challenges organisations may encounter, and the best practices for ensuring compliance.

What are the Key Changes Introduced by NIS2?

NIS2 widens the scope of organisations that fall under its regulations, meaning many more businesses will be required to comply. For those in scope, several critical elements require attention:

Structured Incident Detection and Reporting

Organisations must implement a structured approach to incident detection and reporting. This includes reporting incidents to supervisory bodies like the National Cyber Security Centre (NCSC) within 24 hours, with a follow-up report due within 72 hours. In some cases, additional reporting may be required to other entities, such as central banks or telecommunications authorities, depending on the sector.

Senior Leadership Responsibility

There is now a greater emphasis on ensuring senior leadership is trained in cyber risk and management. Executives will bear more responsibility for understanding and managing cybersecurity risks, making informed decisions, and allocating appropriate budgets.

Cybersecurity Hygiene

While many of the requirements under NIS2 involve practices that organisations should already be following, these will now be enforced more strictly. This includes managing identities, using multi-factor authentication, having robust business continuity and backup plans, ensuring data security controls are in place, and implementing automated remediation tools.
Staff Training

Security awareness training for staff is critical. Organisations will be required to ensure their employees are adequately trained to recognise and respond to cybersecurity threats.

How Should Organisations Assess their Current Cybersecurity Posture in Relation to NIS2?

To prepare for NIS2 regulation compliance, organisations should assess their current cybersecurity maturity. While specific legislation is still pending across European countries, businesses can begin by evaluating their practices against key principles outlined in frameworks like NIST 800.

Conducting a gap analysis will help identify areas that need improvement, particularly in incident reporting, handling, and board-level training. Many organisations may find that they are already following many of the required practices, but a thorough assessment will reveal any gaps that need to be addressed.

How Should Organisations Address Supply Chain Risk in Relation to NIS2?

Addressing supply chain risks is another key area under NIS2. Organisations must ensure that their critical suppliers meet cybersecurity standards and have robust incident reporting processes in place. This will involve more rigorous vetting of suppliers and establishing agreements to ensure timely communication of any security issues.

What are the Recommended Best Practices for Achieving NIS2 Regulation Compliance?

To comply with NIS2, organisations should focus on the below best practices:

  1. Multi-Factor Authentication (MFA): Implement strong MFA, ideally backed by an authenticator solution or biometrics.
  2. Endpoint Security: Ensure visibility across all endpoints and use tools that provide telemetry and automated remediation.
  3. Network Security: Maintain good visibility of network activity, establish baselines, and detect anomalies.
  4. Data Security: Implement data classification, encryption, and data loss prevention (DLP) to protect sensitive information.
  5. Staff Training: Provide regular and effective cybersecurity awareness training, not just tick-the-box exercises.
  6. Internal Audits: Regularly audit security controls to ensure they are effective and continuously improve them.

What are the Biggest Challenges Facing Organisations Looking to Achieve NIS2 Regulation Compliance?

The biggest challenges that organisations will face in achieving NIS2 regulation compliance are likely to be related to resourcing, both in terms of budget and personnel. The global shortage of skilled cybersecurity professionals, combined with the increased workload, may strain resources. Smaller organisations, in particular, may struggle with the additional costs and complexities of compliance.

In order to combat this, organisations may need to outsource to managed security service providers or consultants to meet the requirements. As NIS2 becomes more mature, there may be a rush for these services, so planning ahead is crucial.

How Do You Anticipate the Cybersecurity Landscape Will Evolve in the Next Few Years, Particularly in Relation to NIS2?

Looking ahead, NIS2 is expected to raise the overall level of cybersecurity across Europe. By enforcing higher standards, the directive aims to bring cybersecurity risk management to the same level as financial risk management.

 While this will benefit organisations in the long run, there may be some growing pains, particularly for smaller entities that may face consolidation, or cost increases due to the added compliance burden.

In Conclusion

NIS2 represents a significant shift in cybersecurity regulation, and organisations must act now to prepare. By focusing on key areas such as incident reporting, supply chain risk, and best practices for cybersecurity hygiene, businesses can position themselves to comply with the new requirements. Although challenges lie ahead, the ultimate goal of NIS2 is to create a more secure digital environment for everyone.

Author: Paul Conaty, Client Solutions Director at CWSI

Paul Conaty is Client Solutions Director, Security & Compliance at CWSI, one of Europe’s most experienced mobile and cloud security specialists. Paul has over 20 years’ experience in the technology industry across engineering, technical and management roles.

Having joined the company in 2014, he heads up the Strategic Enterprise Consultancy, Engineering, Security and Support Services division at CWSI. Here, he provides best-in-class strategic and tactical advice to customers in all sectors, both in Ireland and globally. He is passionate about delivering real business enhancements via secure technological solutions. 

Before joining CWSI, Paul spent 13 years at UPC Ireland (now Virgin Media Ireland) across senior engineering and support roles. He is currently an Ambassador for the GDPR Awareness Coalition, where he aims to raise awareness of the data privacy obligations for companies resulting from the implementation of GDPR. 

Paul Conaty Headshot

Paul is a thought leader and expert voice on cybersecurity, governance, data protection and compliance. With organisations around the world on increasingly high alert, Paul can give practical advice to businesses across all industries (from public sector to supply chain and SMEs) on how they can defend themselves against the rising threat of cyberattacks.  He can outline the steps that should be taken to protect company data, such as being aware of potential vulnerabilities and having a good understanding of the business’ IT infrastructure, implementing Multi-Factor Authentication, and carrying out user awareness training for employees around phishing threats

Relevant Resources

Our Voice

What is Cloud Transformation? The Complete Guide

Discover what cloud transformation means, its benefits, and how CWSI helps businesses modernise IT systems and drive innovation through cloud solutions.

Learn More

Our Voice

The Complete Guide to Advanced Persistent Threats

Learn everything you need to know about Advanced Persistent Threats in this guide by CWSI. Get in touch today for more information.

Learn More

Our Voice

The Complete Guide to Cyber Threat Actors: Understanding and Defending Against Digital Threats

Learn all you need to know about Cyber Threat Actors in this detailed guide from CWSI. We discuss different actor groups, techniques and tactics.

Learn More