What is the NIS2 Directive?
The NIS2 Directive (Directive EU 2022/2555) is the European Union’s flagship cybersecurity legislation, establishing comprehensive security and resilience requirements across all Member States. As the successor to the original 2016 NIS Directive, NIS2 significantly expands the scope of EU cybersecurity regulation.
Key NIS2 Facts
- Official Name: Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union
- Entry into Force: January 16, 2023
- Transposition Deadline: October 17, 2024 (missed by most Member States)
- Legal Basis: Published in Official Journal L333/80, December 27, 2022
The NIS2 Directive represents a fundamental shift in European cybersecurity governance, moving from voluntary best practices to mandatory compliance with severe penalties for non-compliance.
Official NIS2 Text on EUR-Lex →
Why NIS2 Compliance Matters in 2025
Organizations across the EU must understand NIS2 requirements to avoid significant penalties and security risks. According to the European Commission, the NIS2 Directive introduces several critical obligations:
Expanded Sector Coverage
NIS2 significantly broadens the definition of critical sectors beyond the original NIS Directive. The new framework now includes:
Essential Entities (Annex I):
- Energy (electricity, oil, gas, hydrogen)
- Transport (air, rail, water, road)
- Banking and financial market infrastructure
- Health sector
- Drinking water supply and distribution
- Digital infrastructure
- ICT service management (B2B)
- Public administration
- Space
Important Entities (Annex II):
- Postal and courier services
- Waste management
- Manufacturing of critical products (medical devices, electronics, machinery, automotive, food)
- Digital providers (online marketplaces, search engines, social networks)
- Cloud computing services
- Data centre services
- Content delivery networks
- Trust service providers
- SaaS providers (Software as a Service)
Mandatory Risk Management Requirements
Under Article 21 of NIS2, all covered entities must implement comprehensive cybersecurity risk management measures:
- Incident handling policies and procedures
- Business continuity and disaster recovery (backup, crisis management)
- Supply chain security (third-party vendor risk assessment)
- Network security measures (firewalls, access controls, segmentation)
- Encryption and cryptographic controls
- Human resources security (employee training, access management)
- Multi-factor authentication and secure authentication protocols
- Vulnerability disclosure and coordinated disclosure policies
Strict Incident Reporting Timelines
NIS2 introduces mandatory incident notification requirements with tight deadlines:
- 24 hours: Early warning notification to national CSIRT
- 72 hours: Detailed incident report including impact assessment
- Final report: Within one month, with root cause analysis and remediation measures
Failure to report incidents can result in penalties up to €10 million or 2% of global annual turnover for essential entities.
Enhanced Cross-Border Cooperation
NIS2 strengthens EU-wide cybersecurity coordination through:
- European Cyber Crises Liaison Organisation Network (EU-CyCLONe): Coordinated response to large-scale incidents
- Cooperation Group: Strategic cooperation between Member States
- CSIRT Network: Operational cooperation for incident response
Read the European Commission’s Official NIS2 Overview →
NIS2 Transposition Deadline: What Happened
The October 2024 Deadline
According to Article 41 of the NIS2 Directive, all 27 EU Member States were legally required to:
- Transpose the Directive into national legislation
- Publish implementing measures
- Notify the European Commission of compliance
- Deadline: October 17, 2024
Widespread Non-Compliance
On May 7, 2025, the European Commission revealed alarming statistics:
- 19 Member States failed to notify complete transposition
- These countries received reasoned opinions (second stage of infringement procedure under Article 258 TFEU)
- Only 5 countries had successfully implemented NIS2 by the deadline: Belgium, Italy, Greece, Lithuania, and Slovakia
The Commission issued a stern warning:
“The Directive is an essential component of the European Union’s cybersecurity regulatory framework. Any delays in national transposition jeopardize the collective resilience of the Union and its ability to withstand cyber threats.”
— European Commission, Press Release, May 7, 2025
Legal Consequences for Member States
Member States facing infringement procedures may ultimately be:
- Referred to the Court of Justice of the European Union (CJEU)
- Subject to financial penalties for continued non-compliance
- Required to implement emergency measures
European Commission Press Release on NIS2 Non-Compliance →
Why EU Countries Delayed NIS2 Implementation
Understanding the causes of NIS2 implementation delays helps organizations anticipate when their national laws will finally enter into force.
1. Complex National Legislative Procedures
NIS2 transposition isn’t simply copying EU text into national law. Each Member State must:
- Integrate NIS2 with existing critical infrastructure protection laws
- Align with national data protection regulations
- Coordinate with telecommunications regulatory frameworks
- Harmonize with sector-specific security requirements
This process requires extensive coordination between:
- Multiple government ministries (Interior, Economy, Digital Affairs)
- National cybersecurity agencies and CSIRTs
- Sector regulators (energy, finance, health, transport)
- Data protection authorities
The result? Slow, bureaucratic processes that can take 18-24 months.
2. Regulatory Overlap and Harmonization Challenges
NIS2 doesn’t exist in isolation. Organizations must comply with multiple overlapping EU frameworks:
Related EU Legislation:
- GDPR (Regulation 2016/679): Personal data security and breach notification
- DORA (Regulation 2022/2554): Digital Operational Resilience Act for financial entities
- CER Directive (2022/2557): Critical Entities Resilience Directive
- eIDAS 2.0 Regulation: Electronic identification and trust services
- Cyber Resilience Act (CRA): Product security requirements
- AI Act: Artificial intelligence governance
Several large Member States (France, Germany, Spain, Portugal) attempted to create comprehensive “digital resilience packages” bundling these regulations, significantly delaying NIS2-specific implementation.
3. Limited Administrative and Technical Capacity
ENISA’s 2024 report on national cybersecurity capabilities identified critical gaps:
- Understaffed CSIRTs: Many national teams lack personnel to handle expanded entity registrations
- Skills shortage: Cybersecurity professionals needed for supervision and enforcement
- Budget constraints: Limited funding for new supervisory infrastructure
- Technical systems: Registration portals and incident reporting systems not ready
Small Member States face particular challenges scaling up their cybersecurity authorities to meet NIS2 requirements.
4. Political Transitions and Government Changes
Parliamentary elections and government transitions in multiple countries disrupted legislative timelines:
- Spain: 2023 general election delayed cybersecurity bill scheduling
- Netherlands: Coalition formation delayed legislative priorities
- Poland: 2023 parliamentary elections shifted policy focus
- Finland: Government transition affected regulatory timelines
In parliamentary systems, major legislation like NIS2 transposition often requires cross-party consensus, which takes time during political uncertainty.
NIS2 Transposition Status by Country (November 2025)
Countries with NIS2 Fully Transposed and In Force
These Member States have successfully implemented national NIS2 legislation:
| Country | National Law | Enforcement Date | Notes |
|---|---|---|---|
| Belgium | Loi relative à la cybersécurité | October 2024 | Comprehensive implementation with sector-specific provisions |
| Italy | Decreto Legislativo NIS2 | October 2024 | Integrated with existing critical infrastructure framework |
| Greece | NIS2 Implementation Law | October 2024 | Created new National Cybersecurity Authority |
| Lithuania | Kibernetinio saugumo įstatymas | October 2024 | Strengthened existing CSIRT capabilities |
| Slovakia | Zákon o kybernetickej bezpečnosti | October 2024 | Enhanced National Security Authority powers |
Countries with NIS2 Bills in Parliamentary Process
Significant progress but not yet in force:
| Country | Status | Expected Date | Key Details |
|---|---|---|---|
| France | Resilience Bill under review | Q1 2026 | Bundled with DORA and CER implementation |
| Germany | NIS2-Umsetzungsgesetz draft | Q1 2026 | Federal-state coordination required |
| Spain | Anteproyecto 2025 | Q2 2026 | Delayed by election cycle |
| Portugal | Law approved Sept 2025 | Q4 2025 | Implementation regulations pending |
Countries Notified as Non-Compliant (Infringement Procedure)
These 19 Member States received reasoned opinions from the Commission on May 7, 2025:
Alphabetical List: Austria • Bulgaria • Croatia • Cyprus • Czech Republic • Denmark • Estonia • Finland • Hungary • Ireland • Latvia • Luxembourg • Malta • Netherlands • Poland • Romania • Slovenia • Sweden
Legal Status: Second stage of infringement under Article 258 TFEU. Risk of CJEU referral if transposition not completed promptly.
Real-Time Tracking Resources
For the most current information, monitor these official sources:
- ECSO NIS2 Transposition Tracker — Industry consortium monitoring
- ENISA NIS2 Resources — Technical guidance and updates
Business Impact of NIS2 Delays
The uneven implementation of NIS2 across the EU creates significant challenges for organizations, especially those operating cross-border.
1. Inconsistent Enforcement Creating Compliance Chaos
The Problem: Companies with operations in multiple Member States face radically different regulatory environments.
Real-World Impact:
- Belgium or Italy: Full NIS2 enforcement, mandatory audits, incident reporting to national CSIRT, potential penalties
- Denmark or Netherlands: Still operating under old NIS Directive framework, voluntary guidelines
- Cross-border operations: Uncertainty about which law applies to pan-European infrastructure
Example Scenario: A cloud service provider with data centers in Belgium (NIS2 enforced) and Ireland (not yet enforced) faces conflicting requirements for the same service.
2. Compliance Uncertainty Paralyzing Decision-Making
Without finalized national laws, organizations cannot definitively answer:
- Am I an essential or important entity? (Classification criteria vary by draft national law)
- Which authority do I report to? (National CSIRT, sector regulator, or both?)
- What are the actual penalties? (Sanctions differ significantly between Member State drafts)
- When do obligations begin? (Retroactive application possible once law enters force)
This uncertainty forces companies to either:
- Invest in compliance now based on draft laws (risk of wasted effort if requirements change)
- Wait for final laws (risk of non-compliance when enforcement begins)
3. Supply Chain Vulnerabilities Across Borders
NIS2’s supply chain security provisions (Article 21) require entities to assess and manage third-party risks. But:
- If a critical supplier operates in a non-compliant Member State, they may lack required security measures
- Cross-border supply chains create enforcement gaps
- One weak link can compromise entire European infrastructure
Critical Risk: A cyberattack on an unsecured supplier in a delayed Member State could cascade across the EU, exactly what NIS2 was designed to prevent.
4. Competitive Disadvantage for Early Adopters
Companies in countries with enforced NIS2 face higher compliance costs than competitors in delayed Member States:
- Mandatory security investments
- Audit and reporting overhead
- Management time and attention
- Potential penalties for violations
This creates temporary market distortions that disadvantage responsible actors.
European Commission NIS2 Q&A →
NIS2 Compliance Checklist for Organizations
Critical Guidance: Don’t wait for your Member State to finalize NIS2 transposition. Proactive compliance is the only safe strategy.
The European Commission and ENISA strongly recommend immediate action:
Step 1: Determine Your NIS2 Classification
Action Required: Assess whether your organization qualifies as an essential or important entity.
How to Classify:
- Check sector: Review Annex I (essential) and Annex II (important) of the Directive
- Size threshold: Organizations with ≥50 employees OR >€10M annual turnover generally covered
- Criticality assessment: Evaluate if your services are critical to societal or economic activities
- Cross-border considerations: Operating in multiple Member States may trigger multiple classifications
Outcome: Document your classification with clear justification for supervisory authorities.
Tool: Use ENISA’s self-assessment questionnaire (available on their website)
Step 2: Map Your Supply Chain and Critical Dependencies
Action Required: Conduct comprehensive supply chain risk assessment per Article 21.
Key Activities:
- Identify all critical suppliers: Cloud providers, SaaS vendors, managed security services, ICT infrastructure
- Assess security posture: Request SOC 2, ISO 27001, or equivalent certifications
- Document dependencies: Map single points of failure and alternative suppliers
- Contractual requirements: Update vendor contracts to include NIS2-aligned security obligations
- Continuous monitoring: Establish processes for ongoing supplier risk evaluation
Outcome: Supply chain risk register with mitigation strategies for each critical dependency.
Step 3: Develop Incident Response and Reporting Procedures
Action Required: Create policies that meet the 24h/72h reporting timelines.
Essential Components:
- Incident detection: 24/7 monitoring and alerting systems
- Severity classification: Clear criteria for “significant incidents” requiring notification
- Escalation procedures: Decision tree from detection to management to CSIRT notification
- 24-hour early warning template: Pre-approved format for rapid initial notification
- 72-hour detailed report template: Structured format including impact assessment, affected systems, preliminary root cause
- Communication protocols: Contact details for national CSIRT and designated reporting channels
- Regular testing: Quarterly incident response drills
Outcome: Documented incident response plan approved by management.
Template: Download ENISA’s NIS2 incident reporting template
Step 4: Implement Board-Level Cybersecurity Governance
Action Required: Ensure management accountability per Article 20.
Critical Changes:
- Board responsibility: Cybersecurity is now explicitly a board-level responsibility
- Training requirements: Management must receive cybersecurity awareness training
- Oversight mechanisms: Establish board committee or designate responsible executives
- Reporting structure: Direct reporting line from CISO to board/senior management
- Decision authority: Clear authorization for cybersecurity investments and incident response
- Personal liability: In some Member States, executives can face personal sanctions for gross negligence
Outcome: Board resolution documenting cybersecurity governance framework.
Step 5: Align with Recognized Security Frameworks
Action Required: Implement technical and organizational measures that demonstrate compliance.
Recommended Standards:
- ISO/IEC 27001:2022: Information security management system (most widely recognized)
- NIST Cybersecurity Framework 2.0: Comprehensive risk-based approach
- CIS Critical Security Controls: Prioritized implementation guidance
- ENISA NIS2 Good Practices: EU-specific compliance guidance
Core Controls to Prioritize:
- Asset inventory and management
- Access control and identity management
- Multi-factor authentication (mandatory under NIS2)
- Encryption (data in transit and at rest)
- Vulnerability management and patching
- Network segmentation
- Security monitoring and logging
- Backup and disaster recovery
- Security awareness training
- Third-party risk management
Outcome: Gap analysis report and remediation roadmap with timeline and budget.
Step 6: Prepare for Registration and Supervisory Interaction
Action Required: Get ready to engage with national authorities once portals open.
Preparatory Actions:
- Monitor national authority websites: Subscribe to updates from your CSIRT and regulators
- Designate points of contact: Identify individuals authorized to communicate with authorities
- Document compliance evidence: Maintain organized records of security measures, policies, audits
- Legal review: Ensure data sharing with authorities complies with privacy laws
- Budget allocation: Reserve resources for potential audits and compliance verification
Outcome: Registration package ready for immediate submission when required.
Step 7: Conduct Regular Compliance Audits
Action Required: Establish ongoing verification processes.
Audit Schedule:
- Internal audits: Quarterly reviews of security controls and compliance
- External audits: Annual independent assessment (consider ISO 27001 certification)
- Management reviews: Semi-annual board presentations on cybersecurity posture
- Gap assessments: Monitor evolving national requirements and adjust accordingly
Outcome: Continuous compliance monitoring with documented evidence trail.
Critical Reminder: Enforcement Can Be Retroactive
Once your Member State’s NIS2 law enters into force, requirements may apply retroactively. Authorities could:
- Request evidence of compliance measures implemented before the law’s entry
- Investigate incidents that occurred during the transposition delay
- Impose penalties for violations during the “gap period”
Bottom Line: Waiting for transposition is not a compliance strategy. Begin implementation now.
Download ENISA’s Complete NIS2 Implementation Guide →
Future of NIS2 Enforcement
European Commission Next Steps
The Commission has signaled its commitment to full NIS2 implementation across all Member States:
Enforcement Timeline:
- Q4 2025: Continued monitoring of national transposition progress
- Q1 2026: Possible CJEU referrals for persistent non-compliance
- 2026 onwards: Financial penalties for Member States that fail to comply with CJEU rulings
Commission Statement:
“The Commission will not hesitate to take further legal action, including referral to the Court of Justice, to ensure that all Member States fulfill their obligations under the NIS2 Directive.”
ENISA and ECSO Support Initiatives
To assist lagging Member States and organizations, coordination efforts include:
Available Resources:
- Maturity assessment tools: Free self-evaluation frameworks
- Implementation workshops: Technical assistance for national authorities
- Voluntary reporting templates: Standardized formats for cross-border consistency
- Peer learning programs: Best practice sharing between Member States
- Sector-specific guidance: Tailored compliance advice for different industries
What Organizations Should Expect in 2026
Realistic Predictions:
- Mass implementation Q1-Q2 2026: Expect 10-15 additional Member States to complete transposition
- Registration requirements: National portals will open, triggering mandatory entity registration
- Initial audits: First round of compliance inspections targeting essential entities
- Test cases: Early enforcement actions to establish precedent
- Harmonization guidance: EU-level clarifications on cross-border scenarios
Preparation Strategy:
- Stay informed: Monitor official sources monthly
- Network with peers: Join industry associations tracking NIS2 (ECSO, national trade groups)
- Legal counsel: Engage cybersecurity lawyers familiar with EU regulations
- Budget planning: Allocate 2026 resources for compliance acceleration
Long-Term Impact on EU Cybersecurity Landscape
NIS2 represents a fundamental shift in European cybersecurity posture:
Expected Outcomes by 2027:
- Standardized baseline: Consistent minimum security standards across all 27 Member States
- Improved incident response: Coordinated EU-wide handling of major cyber crises
- Supply chain transparency: Greater visibility into third-party risks
- Enhanced international cooperation: Stronger cybersecurity diplomacy with non-EU partners
- Regulatory maturity: Refined enforcement practices after initial learning period
The Path Forward:
For organizations operating in the EU, the message is unambiguous:
✅ Start aligning policies now — Don’t wait for finalized national laws
✅ Document risk management measures — Create audit trail for future verification
✅ Prepare for immediate registration — Have all information ready when portals open
✅ Engage with authorities proactively — Build relationships with national CSIRTs and regulators
✅ Treat NIS2 as ongoing program — Compliance is continuous, not one-time
Summary: Key Takeaways for NIS2 Compliance
What You Need to Know:
✅ NIS2 is EU law — Binding on all Member States despite transposition delays
✅ Most countries missed the October 2024 deadline — Only 5 of 27 compliant as of November 2025
✅ Enforcement is coming — Commission pursuing infringement procedures against 19 Member States
✅ Organizations must act now — Waiting for national law is not a compliance strategy
✅ Requirements are comprehensive — Risk management, incident reporting, supply chain security, board accountability
✅ Penalties are severe — Up to €10M or 2% of global turnover for essential entities
Your Next Steps:
- Assess your NIS2 classification status
- Conduct supply chain risk assessment
- Implement 24h/72h incident reporting procedures
- Establish board-level cybersecurity governance
- Align with ISO 27001 or NIST CSF
- Monitor your national authority for registration requirements
Need Expert Guidance?
Consult with legal and cybersecurity professionals experienced in EU regulatory compliance to ensure your organization is fully prepared for NIS2 enforcement.
Need Expert Guidance?
Mosaiku can help your organization achieve NIS2 compliance. Our team of cybersecurity experts specializes in EU regulatory compliance and provides end-to-end support for organizations navigating the NIS2 Directive requirements.
How Mosaiku Supports Your NIS2 Journey:
✅ Compliance Assessment — Determine your classification (essential vs. important entity) and identify specific obligations
✅ Gap Analysis — Evaluate your current security posture against NIS2 requirements and create a prioritized remediation roadmap
✅ Risk Management Implementation — Deploy comprehensive risk management measures aligned with Article 21, including supply chain security assessments
✅ Incident Response Planning — Develop and test 24h/72h incident reporting procedures with integration to national CSIRTs
✅ Board-Level Governance — Establish cybersecurity governance frameworks that satisfy management accountability requirements
✅ Technical Implementation — Deploy security controls aligned with ISO 27001, NIST CSF, and ENISA guidelines
✅ Continuous Monitoring — Maintain ongoing compliance through regular audits, assessments, and policy updates
✅ Multi-Country Support — Navigate different national implementations across EU Member States for pan-European operations
Why Choose Mosaiku:
- Deep expertise in EU cybersecurity regulations (NIS2, GDPR, DORA)
- Proven track record of helping organizations achieve compliance
- Practical, business-focused approach that balances security and operational needs
- Ongoing support throughout your compliance journey
Ready to get started? Contact Mosaiku today for a complimentary NIS2 readiness assessment and discover how we can help your organization stay ahead of regulatory requirements.
Consult with legal and cybersecurity professionals experienced in EU regulatory compliance to ensure your organization is fully prepared for NIS2 enforcement.
Last Updated: November 13, 2025
Next Review: January 2026 (after expected transposition wave)
Disclaimer: This guide provides general information about the NIS2 Directive and should not be construed as legal advice. Organizations should consult with qualified legal and cybersecurity professionals for specific compliance guidance.