NIS2 implementation

We will comprehensively prepare your organisation for compliance with the NIS2 directive. This includes determining whether you fall within its scope, conducting an audit and identifying gaps, developing an action plan, and implementing the necessary processes and security measures. Risk management and audit readiness will be ensured throughout, so your organisation can operate with confidence and peace of mind.

NIS2: fundamentals

An EU directive that raises cybersecurity requirements

NIS2 is a European directive that obligates selected organisations to implement an effective security management system in order to lower the risk of incidents and ensure business continuity. It expands the scope of previous legislation (NIS), covering more sectors and suppliers, and explicitly requires management involvement and readiness to report serious incidents to the relevant authorities.

Business impact: reduced risk of downtime and penalties, greater operational predictability, and clear accountability at board and team level.

Verification

We confirm whether—and in what capacity—your organisation falls under NIS2, and establish the objectives, scope, and timeline for action.

Audit

We assess processes, people, suppliers, and technologies, identify risks, and compile a list of gaps relative to NIS2 requirements.

Plan

We prioritise actions, assign responsibilities and deadlines, and implement the first fixes to limit risk and costs.

Implementation

We put in place policies and procedures, technical solutions, training, and full documentation, then wrap up with a live incident reporting simulation.

Where to start with NIS2 implementation

NIS2 Directive: key requirements at a glance

Risk management, business continuity, incident reporting, suppliers, training, and management responsibility.

NIS2 calls for a genuine security system, not just paperwork. Here are the key areas that need to be addressed:

  • Risk management: threat identification, risk owners, reduction plan.
  • Business continuity: backups, recovery tests, established recovery times.
  • Incidents: detection and response procedures, deadlines for reporting to appropriate teams.
  • Suppliers: security requirements in contracts, periodic assessments.
  • Access: principle of least privilege, multi-factor authentication, permission reviews.
  • Updates and vulnerabilities: patching process, scanning, and rapid remediation of critical gaps.
  • Monitoring and logging: event logging and post-incident analysis.
  • Training and awareness: regular training for employees and management.
  • Role of the board: formal oversight, policy approval, and accountability for decisions.

NIS2 Directive: who does it apply to?

Qualification criteria (essential vs. important entities), sectors covered, and the impact on companies within the supply chain.

NIS2 applies to organizations that are critical for the continuity of services in the economy, as well as to their key suppliers. In practice, this applies to companies in critical sectors as well as digital entities and IT infrastructure managers.

  • Categories: essential entities (e.g. energy, healthcare, banking, digital infrastructure) and important entities (e.g. postal/courier services, selected manufacturing industries, administration).
  • Size threshold (as a general rule): ≥50 employees and ≥€10 million turnover/balance sheet total; possible exceptions for services of critical importance.
  • Supply chain: security requirements for suppliers and subcontractors (contractual provisions, assessments, audits).
  • Typical in digital business: IT maintenance/management providers (private hosting/cloud), online platforms and services, and logistics operators serving companies subject to NIS2.

NIS2 in Poland

How EU regulations have been implemented in Poland, what is changing for businesses, and what the obligations are

Poland is implementing NIS2 through an amendment to the Act on the National Cybersecurity System (Krajowy System Cyberbezpieczeństwa, KSC). The EU deadline passed on 17 October 2024, and the European Commission took action against Poland for missing the deadline; the government is working on the bill and has announced its adoption, which will set national deadlines for registration and compliance once the act enters into force. On 7 May 2025, the Commission issued a reasoned opinion against Poland for failing to notify the full transposition of the directive.

What this means for businesses:

  • Status identification: classification as an essential or important entity according to the NIS2 criteria carried over into the KSC. (the proposed regulations extend the scope of industries and the supply chain).
  • Organisational and technical obligations: a risk management system, business continuity planning, supplier oversight, staff training, and a readiness to report incidents within the deadlines set by national legislation.
  • National procedure: once the act is passed, registration windows and compliance deadlines will be established (details to follow upon adoption).

Businesses will need to formally assign accountability, put processes in place, and document their security practices in line with Poland’s NIS2 implementation.

NIS2 implementation: what does it look like in practice?

From rapid qualification to audit readiness: four steps, no unnecessary theory.

  1. Qualification and scope: we establish whether NIS2 applies to you, under which category (essential or important), and which systems, processes, and suppliers fall within scope.
  2. Audit and gap map: we compare the current state against NIS2 requirements, producing a prioritised gap list with assigned responsibilities.
  3. Roadmap and quick wins: we set out a timeline and tackle high-impact, low-effort improvements first (e.g. access controls, backups, core procedures) while building out the documentation in parallel.
  4. Implementation and final review: processes launched (risk, incidents, continuity), security controls configured, staff trained; we close out with an incident reporting drill and evidence review.

NIS2 regulation: why choose us?

End-to-end implementation: practice over theory, evidence over declarations

Having spent years maintaining critical e-commerce environments, we know how to translate NIS2 requirements into business reality. We carry out the audit, gap mapping, planning, and implementation of processes and security measures, then prepare the evidence and ensure audit readiness. Alongside complete documentation and training, we provide secure, scalable infrastructure, backed by our 24/7 SDO (Service Desk) to keep things running smoothly after go-live.

Genuine experience

End-to-end implementation

24/7 support

Secure infrastructure

HA/DR and hardening

Incident testing

FAQ

NIS2: what does it mean in practice for management and business teams?

In short: NIS2 is an obligation to take cybersecurity management seriously, with clearly assigned board-level responsibility, regular risk assessments, and tangible evidence that the organisation can detect an incident, respond to it, and maintain business continuity.

For management: formal risk oversight (approved policy, objectives, and budget), defined roles and metrics (e.g. recovery time, patching timeliness, training completion rates), regular status reviews, and readiness to meet statutory incident reporting obligations (including early notifications and final reports).

For business and operations: consistent processes (access, updates, backups and recovery tests), security requirements embedded in supplier contracts, regular staff training, vulnerability scanning and patching, event monitoring, and complete documentation and registers; so that in the event of an audit, you can demonstrate not just that procedures exist, but that they are actually followed.

What is the size threshold and what are the exceptions (small businesses in a critical role)?

Size threshold (general rule): if you operate in sectors covered by NIS2 and are at least a medium-sized company (≥50 employees and ≥€10M in turnover or balance sheet total), you fall within the scope of the directive.

Automatic exceptions (regardless of size): certain types of entities are always in scope, including providers of cloud services and data centres, managed IT services (MSP/MSSP), public networks and electronic communications, DNS/TLD services, trust services, and certain digital platforms and services.

Small companies in a critical role: even below the threshold, you may be brought into scope if you play a key role in service continuity, such as the sole significant supplier in a region or supply chain, or due to a high risk profile.

What are the penalties and sanctions for non-compliance with NIS2?

Financial (administrative) penalties:

  • Essential entities: up to €10M or 2% of global annual turnover, whichever is higher.
  • Important entities: up to €7M or 1.4% of global annual turnover, whichever is higher.

Additional sanctions and supervisory measures:

  • binding orders to remediate violations with set deadlines,
  • audit/inspection and obligation to provide evidence of compliance,
  • public disclosure of the violation (including the entity’s name),
  • possible temporary removal of management personnel from security-related responsibilities.

What does NIS2 implementation look like step by step and how long does it take?

Step by step:

  1. Scoping and qualification (1–2 weeks): confirmation of whether you are subject to NIS2, under which category (essential/important), and which systems/processes/suppliers are in scope.
  2. Audit and gap mapping (2–4 weeks): assessment of the current state against NIS2 requirements; prioritised gap list with assigned responsibilities and risks.
  3. Roadmap and quick wins (2–4 weeks): action plan, implementation of quick wins (access controls, backups, core procedures), beginning of documentation process.
  4. Implementation and audit readiness (4–12+ weeks): processes (risk, incidents, continuity), technical measures, training; evidence pack prepared and incident reporting drill completed.

How long does it take?
For a typical medium-sized organisation, core implementation usually takes 8–16 weeks; full process maturity and cyclical review takes 3–6 months. The duration depends primarily on the complexity of the environment, number of suppliers, availability of data and evidence, and the organisation’s readiness for change.

Does compliance with ISO 27001, PCI DSS, or GDPR mean a company is already compliant with NIS2?

In short: No. Being ISO 27001, PCI DSS or GDPR compliant is very helpful, but does not guarantee compliance with NIS2. A gap analysis is needed, along with addressing requirements specific to NIS2.

Why is it not enough?

  • Scope:
    • ISO 27001: information security management system (ISMS), but without some of the NIS2 supervisory obligations.
    • PCI DSS: narrow scope (card data).
    • GDPR: personal data protection, not comprehensive service resilience.
  • Specific to NIS2: management responsibility, categories of entities (key/important), supply chain requirements, incident reporting deadlines (initial notification within 24h, update within 72h, final report), possible supervisory measures and penalties.

What usually needs to be added despite ISO/PCI/GDPR?

  • formal NIS2 qualification and registration under national law,
  • incident reporting policies and procedures, including dry run,
  • security requirements for suppliers and evidence of verification,
  • metrics and reporting to management confirming oversight,
  • a coherent set of compliance evidence aligned with NIS2 implementation in Poland.

Conclusion: existing certifications shorten the path, but a gap map against NIS2 and closing the missing elements is necessary.

Which is the competent authority/CSIRTs in Poland and how does communication work?

Competent authorities and CSIRTs in Poland:

  • Supervision is sector-based. Competent authorities are typically the relevant ministries (e.g., Digital Affairs for digital infrastructure, respective ministries for infrastructure/energy/health etc.). The contact list is published by, among others, the EC.
  • Three national-level CSIRTsCSIRT NASK (CERT Polska), CSIRT GOV (ABW) and CSIRT MON(MON) cooperating and coordinating incident handling within the KSC framework.

NIS2: when will it apply in Poland and what are the transitional timelines

Current status: the EU deadline for transposing NIS2 into national law passed on 17 October 2024. For countries that missed the deadline (including Poland), the European Commission initiated infringement procedures and issued reasoned opinions in May 2025.

What happens next in Poland: On 22 October 2025, the Council of Ministers adopted a draft amendmentto the KSC Act implementing NIS2 (currently going through the legislative process). The proposal sets out avacatio legis period: 1 month, followed by 6 months for adjustment for essential and important entities. The final deadlines and procedures will be confirmed once the law is formally adopted.

Practical takeaway: if you potentially fall within the NIS2 scope, preparations (qualification, gap map, action plan) are worth starting before the final legislation is enacted, as the real window for full adoption will be short.

What can we do for you?

Let's talk. Send a message!