Monolit-IT - Implementation of NIS-2

Implementation of NIS-2

The NIS-2 Directive significantly raises the level of cybersecurity by requiring organisations to implement effective measures to protect against cyberattacks and incidents. Its goal is to strengthen the resilience of entire supply chains — including entities cooperating with public administration and key economic sectors across the European Union.

NIS-2 (Network and Information Systems Directive 2) will apply to medium-sized and large companies (employing more than 50 people or generating more than EUR 10 million in revenue) operating in the sectors listed in the Directive – including organisations that are key suppliers to larger entities covered by the regulation. The Directive requires the implementation of risk-management measures and incident-response capabilities in areas such as access control, business continuity, supply-chain security, system testing, and incident reporting.

NIS-2 applies to all entities operating within the European Union, including non-EU companies that provide services to users in EU Member States. By implementing NIS-2, you establish a comprehensive cybersecurity framework that not only ensures legal compliance but also significantly enhances your organisation’s resilience to modern digital threats.

Failure to comply may result in severe financial penalties. Depending on the classification of the organisation (essential or important), fines may reach up to EUR 10 million or 2% of the company’s annual turnover.


Who should implement the NIS-2 Directive?

Energy sector

Energy sector

(electric power, gas, heating)

Transport

Transport

(electric power, gas, heating)

Banking and financial<br/> market infrastructure

Banking and financial
market infrastructure

Healthcare

Healthcare

(hospitals, laboratories, medical device manufacturers)

Drinking water<br/> and wastewater providers

Drinking water
and wastewater providers

(water utilities)

Digital infrastructure

Digital infrastructure

(e.g. data centres, DNS operators, cloud service providers, etc.)

Public administration

Public administration

Local government administration

Local government administration


Important entities

Postal <br/>and courier services

Postal
and courier services

Waste management

Waste management

Production and distribution<br/> of chemicals

Production and distribution
of chemicals

Food sector

Food sector

(production, processing, distribution)

Suppliers of ICT equipment<br/> and services

Suppliers of ICT equipment
and services


The scope of our NIS2 implementation services for organisations

Risk management<br/> and security policy

Risk management
and security policy

(identification, analysis and assessment of risks to IT systems, implementation of information security policies)

Network and information<br/> system security

Network and information
system security

(protection of infrastructure against attacks)

Access and identity management

Access and identity management

Incident response<br/> and reporting

Incident response
and reporting

(development of incident-reporting procedures, analysis and prevention of threat escalation)

Business continuity<br/> and operational resilience

Business continuity
and operational resilience

(developing contingency plans, backups, and testing system recovery after failures)

Supply chain security

Supply chain security

(assessment of the cybersecurity level of suppliers and business partners)

Training

Training

Compliance and documentation<br/> management

Compliance and documentation
management

Contact us now!