Cyber-attacks, reporting obligations, emergency plans: What the NIS-2 directive means for businesses

A woman operates a hand truck in a busy warehouse, highlighting efficient logistics in action.

The NIS-2-directive has been legally binding in Germany since 6 December 2025 and affects around 29,500 companies. As the successor to the original NIS directive from 2016, NIS 2 expands the scope of application and imposes stricter requirements on companies, especially those operating in critical sectors (CRITIS). But what does the abbreviation NIS stand for, what is NIS and what exactly does NIS mean? In addition to clarifying these questions, this article takes a look at the topic of business continuity management, which enables companies to remain operational even in crisis situations thanks to an emergency plan.


What is NIS-2? A definition of the term NIS.

The abbreviation NIS stands for ‘Network and Information Security Directive 2’. The first NIS Directive was launched by the EU in 2016 to improve cybersecurity measures in critical sectors. With the introduction of NIS-2, the requirements are tightened and extended to more sectors and companies. Essentially, it is a revised and expanded directive designed to ensure that all relevant companies within the EU (especially in the CRITIS sector) implement robust measures to defend against cyber threats. A key objective is to eliminate inconsistencies between EU member states in terms of cyber security requirements.


Which companies are affected by the NIS-2 Directive?

Two criteria determine whether a company is affected by the new directive. The first is the size of the company and the second is the sector in which the company operates. If the company has at least 50 employees and an annual turnover of at least 10 million euros, then the first criterion is fulfilled.

A total of 18 sectors were defined for the assessment of the second criterion, most of which are similar to those of the CRITIS categorisation. Sometimes it is not so easy to answer the question about the business sector. The BSI (Federal Office for Information Security in Germany) therefore offers a short questionnaire which you can use to find out in just a few steps whether your company belongs to one of the sectors concerned.

Every rule has its exceptions – including, of course, the NIS-2 directive. Therefore, some organisations must meet NIS-2 compliance regardless of their size because a cyber-attack would cause particularly great damage there. Other organisations, on the other hand, are excluded from the scope of application despite fulfilling the criteria, for example organisations in the public security sector.


What does NIS-2 mean in practice?

Companies from critical sectors such as energy, transport, water, health or finance are affected by the NIS-2 directive – but also IT services such as DNS services, telecommunications providers or internet exchange points. Cloud providers, data centres or less obvious sectors such as IT service providers or e-commerce platforms must also comply with the new directive. All of these companies must take strict security precautions, report incidents and carry out regular assessments of their systems. The EU NIS Directive also sets out clear reporting obligations to strengthen cooperation between companies and the competent national authorities.

The 18 sectors mentioned above are divided into "Essential Entities" (eleven sectors) and "Important Entities" (seven sectors or medium-sized operators of all sectors). This determines the scope of state supervision and the penalties that are due in the event of non-compliance.


NIS-2 as a competitive advantage – a head start through compliance

Supply chain management and compliance within the framework of NIS-2 are key points in the directive. This can be used as a competitive advantage: Companies that have implemented NIS-2 solidly are an attractive alternative on the market. A potential customer, who is himself obliged to comply with NIS-2, must ultimately decide in favour of the competitor that meets the high requirements of the directive.

Even if you are not affected by NIS-2, you should, of course, take cyber security seriously. Often, big issues like this can seem overwhelming at first glance: Where do I start, what do I need to consider? What rules are there, which tools are useful? The BSI has therefore defined the so called “IT-Grundschutz” (Basic IT Protection Compendium), which provides support here.


What is the BSI Basic IT Protection Compendium?

BSI Basic IT Protection Compendium exists since 2017. It addresses all people responsible for information security in their work – regardless of whether they work for a public authority, a company or an institution. It contains rules, instructions and checklists and is based on the so-called Basic IT Protection Modules. This enables large companies that use an information security management system (ISMS) and smaller institutions without an ISMS to quickly implement important security requirements. It takes a holistic approach that considers not only technical aspects but also organisational, personnel and infrastructural issues.

BSI Basic IT Protection Compendium is not mandatory for most companies. However, it is a specific method for meeting the requirements of the ISO 27001 certification. ISO 27001-certified companies can thus demonstrate that they meet information security requirements that comply with international standards.

Business Continuity Management within the framework of NIS-2

Protecting core processes and securing operations regularly emerge as the most important products to offer as a service provider. This is because NIS-2 requires companies to implement a security incident handling policy that ensures all threats are quickly recognised and reported. These measures also include employee training, the introduction of technical protection mechanisms and the continuous monitoring of IT systems. However, preventative measures that reduce the likelihood of a critical process failing are also part of the NIS-2 requirements.


Practical insight into emergency response plans: What happens in the event of a hacker attack?

With the NIS-2 directive, business continuity management is no longer just a good idea to make a company crisis-proof, but a legal requirement. Various service providers have specialised in analysing business-critical processes and provide support in the creation of emergency concepts and security guidelines.

A comparison chart highlights costs and risks with and without EIKONA Business Continuity for IT operations.
*According to the Hiscox Cyber Readiness Report and the Bitkom study “Economic Security 2025”, the cost of a successful ransomware attack on small and medium-sized enterprises often falls within this range. **This figure is an average for a logistics company with approx. 50–100 employees. Calculation: With an annual turnover of approx. €15–20 million, the company generates around €60,000–80,000 in turnover per working day (approx. 250 days). ***Depending on shipment volume. Translated with DeepL.com (free version)

Even if a company does not have to operate in compliance with NIS 2, it should still have an emergency plan in place. After all, all companies that use a transport management system (TMS) share the concern that a cyber-attack could paralyse their systems and thus all warehouse processes. The ability to continue working even in an emergency is thus invaluable – regardless of whether it is a large cooperative or a smaller freight forwarder.

When establishing business continuity management, the first step is to work with the IT service provider to develop a contingency plan. Which processes are critical and must be protected at all costs, and what data is needed to do so? A backup system is then implemented that can be activated at the touch of a button in an emergency. It comes from the cloud, so it is always independent of compromised systems and seamlessly switches from the secondary to the main system. This allows critical functions such as warehouse scanning, dispatching, input and output processing, and status updates to partners to continue running. Once calm is restored, the system returns to the main TMS, which contains all the data from the crisis period.

Conclusion

Whether subject to NIS 2 or not: business continuity management makes companies crisis-proof

Successful digitalisation can only work hand in hand with information security. The NIS-2-directive is an important step towards protecting Europe’s critical infrastructures from cyber-attacks. Companies must review their internal security processes in order to achieve the necessary NIS-2-compliance. IT service providers can help with implementation, for example by creating a contingency plan.

However, even companies that are not subject to NIS-2 should implement business continuity management. Contingency plans and backup systems ensure that business operations can continue even in the event of a cyber-attack. This security is extremely valuable, especially in disruptive times like the present.