Cybersecurity
NIS2 in Practice (DE/EU): What Changes for Companies and What an “Incident-Ready” Organization Looks Like

For many companies in the EU, NIS2 is the moment cybersecurity stops being “an IT topic” and becomes an operational and management responsibility. It raises expectations around risk management, incident response, supply-chain security, and measurable accountability.
In plain terms: it’s no longer enough to say “we have a firewall and antivirus.” Regulators and auditors will expect a structured security program, clear ownership, and evidence that you can detect, respond, and recover—fast.
This article explains what NIS2 changes for companies (with a practical DE/EU angle), and what an incident-ready organization looks like in real life—not in a policy document.
What NIS2 Really Changes (Beyond the Buzzwords)
NIS2 modernizes the EU cybersecurity framework and expands both scope and obligations. Even if your organization is not 100% sure it falls under NIS2, the direction is clear: stronger requirements, stronger enforcement, and stronger focus on governance.
- Broader scope: more sectors and more mid-sized organizations are included
- Clear cybersecurity risk-management expectations (measures you must implement)
- Mandatory incident reporting timelines
- Management accountability and oversight obligations
- More emphasis on supply-chain risk and vendor controls
DE/EU Reality: Implementation Is National, Expectations Are EU-Level
NIS2 is an EU directive, so the exact enforcement details depend on national implementation. However, the operational expectations are aligned across the EU: incident reporting, risk management controls, and demonstrable governance.
In Germany, the NIS2 implementation has been formalized through the NIS2 implementation act (NIS2UmsuCG), with enforcement anchored around BSI-related structures. If you operate in DE or supply DE-based clients, you should treat “incident readiness” as an immediate requirement, not a future plan.
Reporting: The 24h / 72h / 1-Month Timeline You Must Be Ready For
A major difference with NIS2 is the explicit incident reporting timeline. This changes how you run detection, triage, forensics, and communications—because you must be able to provide credible information early, even when the full picture is not yet known.
- Early warning: within 24 hours of becoming aware of a significant incident
- Incident notification: within 72 hours with initial assessment (severity, impact, indicators where possible)
- Final report: within one month (or progress + final report after handling, depending on the scenario)
The practical takeaway: if you can’t answer “what happened, which services are impacted, what we did in the first hours, and what evidence we preserved,” you’re not incident-ready.
Management Accountability: Security Moves to the Boardroom
NIS2 explicitly pushes responsibility upward. Management bodies are expected to approve cybersecurity risk-management measures, oversee implementation, and ensure the organization can operate securely.
This doesn’t mean executives must run firewall rules. It means they must ensure the program exists, is funded, is measured, and is auditable—just like finance or safety compliance.
What “Incident-Ready” Actually Means
Incident readiness is not one tool. It’s a capability. When something goes wrong at 02:00, your organization must be able to: detect, decide, contain, communicate, recover, and document—without improvisation.
The easiest way to think about incident readiness is three layers: People, Process, and Technology—plus one hidden layer: Evidence.
People: Roles, Ownership, and On-Call Reality
If an incident happens, who is in charge? Who can isolate systems? Who speaks to customers? Who writes the report? If the answer is unclear, response time will be lost in internal confusion.
- Define an Incident Commander (IC) and a backup
- Define IT/Infra, Security, Legal/Compliance, and Communications roles
- Create an escalation chain and on-call coverage (even if outsourced)
- Train and run tabletop exercises at least quarterly
Process: The Minimum Incident Workflow That Works
A working incident process can be simple, but it must be consistent. The goal is speed with discipline: contain the incident while preserving evidence and tracking decisions.
- Triage: classify severity and impacted services
- Containment: isolate endpoints, rotate credentials, block indicators
- Forensics-ready: preserve logs, snapshots, and timestamps
- Communication: internal updates + external messaging rules
- Recovery: restore services, validate integrity, remove persistence
- Post-incident: root cause, lessons learned, control improvements
Technology: Controls NIS2 Expects You to Have (In Practice)
NIS2 describes cybersecurity risk-management measures that organizations should implement. In practice, incident-ready organizations typically have the following as a baseline:
- Asset inventory (systems, SaaS, identities, critical dependencies)
- Identity security: MFA, privileged access controls, joiner-mover-leaver process
- Central logging (SIEM or log management) + alerting for key events
- Endpoint protection + hardening (baselines, patching, local admin control)
- Backups with restore tests (not just “we have backups”)
- Network segmentation for critical systems and admin paths
- Supply-chain controls: vendor risk review and access limitations
- Secure development and change management (where applicable)
- Cryptography/encryption policies for data in transit and at rest
- Security awareness and basic cyber hygiene training
Evidence: If You Can’t Prove It, It Didn’t Happen
The biggest gap in many organizations is not technology—it’s evidence. During an audit or after a real incident, you need to prove what was in place and what was done.
That means maintaining records: risk decisions, access approvals, patch windows, backup restore logs, incident timelines, and communications approvals.
Table: NIS2 Expectations vs. What to Show as Proof
| Area | Practical Requirement | Typical Evidence |
|---|---|---|
| Incident response | Defined workflow + ownership | IR plan, on-call list, incident tickets, postmortems |
| Reporting readiness | 24/72/30 timeline capability | Templates, contact points, incident timeline logs |
| Logging | Central logs + retention | Log architecture, retention policy, sample alerts |
| Identity security | MFA + privileged access control | MFA policies, admin group reviews, access approvals |
| Backups | Restore-tested backups | Restore test reports, RPO/RTO targets, backup job logs |
| Supply chain | Vendor risk and access controls | Vendor register, contracts, access reviews, third-party MFA |
| Training | Cyber hygiene training | Training records, phishing simulations, policy sign-offs |
A Practical 30/60/90-Day Plan to Become Incident-Ready
Most companies don’t need a massive security program to get started. They need a focused plan that creates response capability and reporting readiness first—then expands coverage.
- First 30 days: define scope, critical services, roles, incident workflow, and reporting templates
- Days 31–60: centralize logs, enforce MFA, lock down admin paths, and test backup restores
- Days 61–90: vendor access reviews, tabletop exercises, monitoring improvements, evidence pack for audits
Common Mistakes That Break Incident Readiness
- No clear ownership (security is “everyone’s job”, so it becomes nobody’s job)
- No log retention or logs scattered across tools
- Backups exist but restores are never tested
- MFA is optional or not enforced for admins and vendors
- Third-party access is not reviewed and not time-limited
- No practiced incident playbooks—only policies
Conclusion: NIS2 Is a Capability Test, Not a Paperwork Test
NIS2 pushes companies toward a predictable reality: cyber incidents are normal, and resilience is the differentiator. The organizations that handle incidents well will not only meet regulatory expectations—they will protect revenue, trust, and operational continuity.
If you want to be incident-ready, build the capability first: roles, workflow, logs, backups, identity security, and evidence. Then refine. That’s how NIS2 becomes manageable—and how cybersecurity becomes a business advantage.

