Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Cyber Security Update: NIS2 Directive On Cyber Security Adopted – Security

admin by admin
Dec 25, 2022
in Cyber Laws & Regulations
A A
0

13 December 2022


William Fry



To print this article, all you need is to be registered or login on Mondaq.com.

The NIS Directive (EU 2016/1148) was the first piece of EU-wide
legislation on cybersecurity. Now it’s expanded revision, the
NIS2 Directive (NIS2D), has finally been adopted and from
publication in the Official Journal, Member States will have 21
months to transpose it into national law. It is therefore expected
to enter into force sometime in 2024.

But what differs in NIS2D and how does it affect
organisations?

Background

The NIS2D is a response to the ever-growing cyber-attack
landscape within the EU and worldwide. It aims to ensure a high,
common level of cybersecurity across the EU. The NIS2D updates and
expands the scope of the pre-existing framework (the NIS Directive)
to include medium and large businesses from more critical sectors
(e.g. manufacturing of critical products (including medical device
manufacturers), postal and courier services, public administration,
digital services). The NIS2D will also put cybersecurity and breach
reporting obligations on operators of essential services and
digital service providers (e.g. online marketplaces, search engines
and cloud services).

Key Changes

  • Broader Scope: it will apply to a broader
    scope of sectors and entities (excluding micro and small
    enterprises). The following sectors will be under the scope of the
    NIS2D:

o Essential Entities:
energy; transport; banking; financial markets infrastructure;
health; drinking water and wastewater; digital infrastructure;
public administration; space.

o Important Entities:
postal and courier services; waste management; the manufacture,
production and distribution of chemicals; food production,
processing and distribution; manufacturing; digital providers (such
as providers of online marketplaces, online search engines and
social networking services platforms).

  • Management body oversight and accountability:
    it will impose direct obligations on “management bodies”
    concerning implementation and supervision of their
    organisation’s compliance with the legislation, leading to
    potential fines and temporary suspensions from discharging
    managerial functions including at C-Suite level. Notably, NIS2D
    specifically provides that C-Suite must follow “specific
    trainings, on a regular basis, to gain sufficient knowledge and
    skills in order to apprehend and assess cybersecurity risks and
    management practices and their impact on the operations of the
    entity”. It also grants wide supervisory powers of access and
    audit to the competent authority for entities that fall under the
    scope of NIS2D.

  • Cyber Risk management measures: it requires
    entities subject to NIS2D to implement cyber risk management
    measures that are “appropriate and proportionate technical and
    organisational measures to manage the risks posed to the security
    of network and information systems which those entities use in the
    provision of their services.” NIS2D lists the measures which
    should be taken by entities, such as security policies, incident
    handling, business continuity and crisis management, supply chain
    security, policies and procedures to test effectiveness of cyber
    risk management procedures and the use of cryptography and
    encryption.

  • Amended incident reporting requirements: NIS2D
    imposes notification obligations in phases, including an initial
    notification within 24 hours of becoming aware of any incidents
    having a significant impact on the provision of the company’s
    services or any significant cyber threat that those entities
    identify that could have potentially resulted in a significant
    incident (previously the NIS Directive only required without
    “undue delay”) followed by “intermediate” and
    “final” reporting obligations. It is unclear at this
    point who the competent authority in Ireland will be for such
    notifications, but it will likely be CSIRT-IE.

  • Fines and penalties: Member States are granted
    discretion to set out effective, proportionate and dissuasive
    penalties for breaches of NIS2D, as well as administrative fines
    for certain breaches of up to EUR 10M or 2% of total worldwide
    turnover (whichever is higher).

  • GDPR and NIS2D: where the competent authority
    under NIS2D becomes aware of an infringement by an entity of its
    obligations under Article 18 (risk management measures) or Article
    20 (reporting obligations) of NIS2D which entails a personal data
    breach, the competent authority shall notify the Data Protection
    Commissioner within a reasonable time.

Actions for C-Suite and Next Steps

  • At this stage, organisations should consider the scope of NIS2D
    and whether their businesses fall within that scope. Notably
    organisations that fall within the scope of the NIS2D must notify
    the European Union Agency for Cybersecurity (ENISA) within 12
    months of the entry into force of NIS2D, of their name and main
    established and up to date contact details.

  • If an organisation concludes that it is within the scope of
    NIS2D, it will need to conduct a fulsome review of its technical
    and organisational measures to ensure compliance with NIS2D.

  • Organisations should also ensure they have proper breach
    reporting measures in place to ensure they can comply with the
    short notification window if and when a breach occurs.

  • In addition, in-scope organisations should keep an eye on how
    NIS2D is implemented in the key EU jurisdictions where they operate
    to see if there are any derogations from the Directive.

  • C-Suite should ensure they have the requisite training as
    required under NIS2D.

The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.

POPULAR ARTICLES ON: Technology from Ireland

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.