Skip to content
Viriatus
Back to blog Compliance

NIS2: What Changes for European Organizations

A formal analysis of the NIS2 Directive's expanded obligations, notification timelines, and governance implications for essential and important entities across the European Union.

S Sérgio Silva
·
15 March 2026
·
4 min
NIS2ComplianceCNCSRegulation

Abstract

The Network and Information Security Directive 2 (NIS2) represents the most significant expansion of cybersecurity regulation in European Union history. This article examines the directive’s broadened scope, its prescriptive incident notification timeline, and the elevation of cybersecurity governance to board-level accountability. Practical implications for compliance readiness are discussed in the context of current implementation guidance (ENISA, 2024).

Introduction

Enacted in December 2022, Directive (EU) 2022/2555 — commonly referred to as NIS2 — replaces and substantially extends the original NIS Directive of 2016 (European Parliament, 2022). Where the original directive applied primarily to operators of essential services and digital service providers, NIS2 broadens its scope to encompass an estimated 160,000 entities across the European Union, including public administration, waste management, food production, and critical product manufacturing. PricewaterhouseCoopers reports that 68% of European organizations surveyed in 2023 had not yet achieved full compliance readiness, despite the October 2024 transposition deadline (PwC, 2023).

Incident Notification Requirements

Among the most operationally demanding provisions of NIS2 is its prescriptive incident notification timeline. Article 23 of the directive establishes a three-stage notification obligation for significant incidents affecting essential and important entities (European Parliament, 2022).

0hDetectionIncidentidentified24hInitial AlertEarly warning tocompetent authority72hDetailed UpdateImpact assessment& IoCs submitted30dFinal ReportRoot cause analysis& remediation planFigure 1. NIS2 incident notification timeline per Article 23.

Figure 1: NIS2 notification timeline — mandatory deadlines from detection

As illustrated in Figure 1, the timeline commences at the moment of incident detection. Within 24 hours, the affected entity must submit an early warning to the designated competent authority — in Portugal, the Centro Nacional de Ciberseguranca (CNCS). Within 72 hours, a detailed notification must follow, incorporating impact assessment, indicators of compromise, and preliminary technical analysis. A comprehensive final report, including root cause analysis and remediation measures, must be submitted within 30 days (European Parliament, 2022). ENISA’s implementation guidance emphasizes that these deadlines require pre-established workflows and cannot be managed through ad-hoc processes (ENISA, 2024).

Governance and Board-Level Accountability

NIS2 introduces an unprecedented level of management accountability for cybersecurity. Article 20 mandates that the management bodies of essential and important entities approve cybersecurity risk-management measures and oversee their implementation (European Parliament, 2022). Furthermore, management body members are required to undergo cybersecurity training. This provision transforms cybersecurity from a delegated technical function into a fiduciary governance responsibility, analogous to financial reporting obligations. Non-compliance penalties are substantial: up to 10 million euros or 2% of global annual turnover for essential entities.

Supply Chain and Third-Party Risk

The directive explicitly requires organizations to address supply chain security, including the assessment of cybersecurity practices among direct suppliers and service providers (European Parliament, 2022). This obligation necessitates structured vendor risk management programmes, contractual cybersecurity requirements, and ongoing monitoring of third-party exposure. PwC’s research indicates that supply chain compromise was a contributing factor in 41% of significant incidents reported in 2023 (PwC, 2023).

Practical Implications

Compliance with NIS2 demands organizational investment in several domains. Incident response capabilities must include automated notification workflows with deadline tracking calculated from detection timestamps. Governance frameworks must formalize board-level oversight of cybersecurity risk management, with documented evidence of management approval and training. Supply chain risk programmes must extend beyond contractual clauses to include active monitoring and periodic assessment. Finally, compliance evidence must be maintained in audit-ready form, enabling demonstration of proportionate measures to supervisory authorities.

Conclusion

The NIS2 Directive represents a fundamental recalibration of cybersecurity obligations across the European Union. Its prescriptive notification timelines, board-level accountability requirements, and supply chain provisions collectively demand that organizations elevate cybersecurity to a governance-level discipline. Entities that delay compliance preparation risk not only regulatory penalties but also the operational consequences of inadequate incident response capabilities during a crisis.

References

ENISA. (2024). NIS2 Directive Implementation Guidance. European Union Agency for Cybersecurity.

European Parliament. (2022). Directive (EU) 2022/2555 (NIS2 Directive). Official Journal of the European Union.

PwC. (2023). Global Digital Trust Insights 2024. PricewaterhouseCoopers.

Sérgio Silva
About the Author
Sérgio Silva
CEO — CyberS3C

Founder of CyberS3C and CEO of Viriatus. NOVA graduate with 20+ years in public administration, European Commission expert, and CISO of APDP.