Monolit IT Sp. z o.o.
Warsztatowa street no.12, 81-341 Gdynia, Poland
tel. +48 58 763 30 00
tel. +48 58 763 30 10
e-mail: biuro@monolit-it.pl
The NIS-2 Directive significantly raises the level of cybersecurity by requiring organisations to implement effective measures to protect against cyberattacks and incidents. Its goal is to strengthen the resilience of entire supply chains — including entities cooperating with public administration and key economic sectors across the European Union.
NIS-2 (Network and Information Systems Directive 2) will apply to medium-sized and large companies (employing more than 50 people or generating more than EUR 10 million in revenue) operating in the sectors listed in the Directive – including organisations that are key suppliers to larger entities covered by the regulation. The Directive requires the implementation of risk-management measures and incident-response capabilities in areas such as access control, business continuity, supply-chain security, system testing, and incident reporting.
NIS-2 applies to all entities operating within the European Union, including non-EU companies that provide services to users in EU Member States. By implementing NIS-2, you establish a comprehensive cybersecurity framework that not only ensures legal compliance but also significantly enhances your organisation’s resilience to modern digital threats.
Failure to comply may result in severe financial penalties. Depending on the classification of the organisation (essential or important), fines may reach up to EUR 10 million or 2% of the company’s annual turnover.
(electric power, gas, heating)
(electric power, gas, heating)
(hospitals, laboratories, medical device manufacturers)
(water utilities)
(e.g. data centres, DNS operators, cloud service providers, etc.)
(production, processing, distribution)
(identification, analysis and assessment of risks to IT systems, implementation of information security policies)
(protection of infrastructure against attacks)
(development of incident-reporting procedures, analysis and prevention of threat escalation)
(developing contingency plans, backups, and testing system recovery after failures)
(assessment of the cybersecurity level of suppliers and business partners)