Need more? Ask an expert.
Jakob Skytte
Partner
Mads Sørensen
Management Consultant
<NIS2>

NIS2 Compliance in 2025: Building Organizational Resilience and Cybersecurity

As the 2025 enforcement date for the NIS2 Directive approaches, Danish CEOs and executives face a pivotal shift: cybersecurity compliance will soon be non-negotiable. For many organizations, NIS2 compliance might be unfamiliar, yet failing to prepare could lead to significant penalties, operational disruptions, or even reputational damage.

We see NIS2 as more than just a regulatory requirement; it’s an opportunity to build resilience and strengthen security in the face of rising cyber threats. Here’s how your organization can approach NIS2 compliance and turn it into a strategic advantage.
Key Aspects of NIS2 Compliance

NIS2 sets the foundation for cybersecurity across Europe, defining clear “conditions to operate” in today’s digital economy. Here’s a summary of the directive’s key aspects:
Aspect Details
Purpose Enhance resilience and capabilities of critical services and infrastructure across the EU.
Who Must Comply Essential and critical entities (based on sector or impact on the economy/society).
Registration Requirement Organizations must self-register if not covered by the CER Directive (e.g., energy, telecom).
Deadline Enforcement begins in 2025 – preparation must start now.
For many organizations, this mandate makes NIS2 compliance essential to survival in the European market. It’s more than a regulatory box to tick—it’s a fundamental shift in how businesses must approach cybersecurity.
NIS2 Compliance Requirements and Penalties for 2025

Failing to comply with NIS2 exposes companies to severe penalties under Articles 21 and 23, which put the onus on top management and boards to ensure adequate cybersecurity measures are in place. These measures aren’t just about ticking boxes; they’re about proving to regulators, stakeholders, and customers that your organization takes cybersecurity seriously.
  • Article 21: Top management is directly responsible for implementing appropriate technical, operational, and organizational measures.
  • Article 23: Non-compliance can lead to sanctions, financial penalties, and legal injunctions.
Without proper preparation, companies face more than just fines. The operational and reputational impact of non-compliance could create long-lasting consequences, undermining trust and resilience.
The Risk-Based Approach to NIS2 Compliance

One of the defining features of NIS2 is its risk-based approach, meaning cybersecurity measures must align with each organization’s unique risk profile. Instead of imposing a one-size-fits-all model, NIS2 allows businesses to allocate resources where they’re most needed, maximizing both efficiency and security.

What does this mean for you?
  • Identify and Prioritize Risks: Map out your critical processes and assets to understand where your vulnerabilities lie.
  • Proportionate Measures: Allocate cybersecurity resources based on the level of risk associated with each area.
  • Document and Defend: Keep records of actions taken and provide clear, documented reasons for any measures you choose to exclude.
NIS2 emphasizes, “maintain sufficient documentation to demonstrate compliance.” This documentation isn’t just for regulatory purposes; it builds a defensible, transparent position that can stand up to scrutiny.
How to Prepare for NIS2 Compliance

We recommend a 4-step approach to help companies get NIS2-ready:
  • Map Critical Processes and Assets: Identify dependencies and risks specific to your organization.
  • Risk Assessment: Evaluate threats and vulnerabilities in key areas.
  • Implement Proportionate Measures: Apply cybersecurity controls aligned with the assessed level of risk.
  • Document Decisions: Justify exclusions with a defensible, documented rationale approved by top management.
This isn’t just a checklist; it’s a strategy for embedding resilience into your operations. With compliance structured around best practices, international standards, and well-documented rationale, your organization is not only meeting regulatory requirements but also fortifying its foundation for long-term resilience.
ISO, IEC, and ENISA Standards for NIS2 Compliance

One of the most efficient ways to align with NIS2 is by following recognized frameworks and standards, such as ISO 27000, IEC/ISA, and ENISA’s guidelines. These standards provide a structured approach to cybersecurity, resilience, and incident management, helping organizations meet NIS2’s compliance requirements. Below is an overview of these standards, organized by focus and relevance to NIS2.
Standard Focus
ISO 27001 Information Security Management System requirements.
ISO 22301 Business Continuity Management.
NIST SP 800-161 Cybersecurity Supply Chain Risk Management.
IEC/ISA 62443 System security requirements and levels.
Using these standards as your compliance framework ensures that your organization meets industry best practices while tailoring your approach to specific operational risks. Standards like ISO and IEC not only help structure your cybersecurity measures but also provide recognized benchmarks for audits and regulatory inspections.
Leveraging ENISA’s Guidance for NIS2 Compliance

The European Union Agency for Cybersecurity (ENISA) offers a crucial resource for organizations preparing for NIS2: the Implementation Guidance. This guidance breaks down NIS2’s technical requirements into actionable steps, offering a structured pathway for compliance.

What’s in the ENISA Guidance?
  • Practical steps for aligning with NIS2.
  • Best practices for implementing risk management measures.
  • Structured approaches to defining and handling significant incidents.
  • Documentation guidelines to ensure compliance readiness.
KK’s Recommendation: Use ENISA’s guidance as the backbone of your compliance strategy. Treat it as a checklist for your documentation, compliance processes, and cybersecurity measures.
Documentation Essentials for NIS2 Compliance: What to Document (and What Not to)

NIS2 mandates not only the implementation of cybersecurity measures but also a robust documentation strategy. This means maintaining clear records of your risk management processes, cybersecurity measures, and incident reporting protocols — and justifying any exclusions.
Documentation Category Purpose
Core Compliance Docs Capture all implemented cybersecurity measures and incident reporting protocols.
Exclusion Justifications Document the rationale for excluding certain measures, based on risk assessments and management approval.
A strong documentation strategy doesn’t just satisfy regulatory requirements; it positions your organization as audit-ready and demonstrates a proactive, defensible approach to cybersecurity. Well-maintained records will be invaluable during an audit, providing transparency and supporting your risk-based decisions.
Key Steps for NIS2 Readiness & Compliance

To support Danish companies in preparing for NIS2, we recommend these immediate actions:
  • Self-Register: Register your organization per Danish CVR protocols, unless covered by the CER Directive.
  • Engage Leadership: Assign roles for compliance oversight. Top management and boards are ultimately responsible.
  • Conduct a Risk Assessment: Map critical processes, evaluate threats, and prioritize cybersecurity measures accordingly.
  • Leverage ENISA’s Guidance: Use it to guide your compliance strategy and documentation processes.
Conclusion: From Compliance to Resilience

NIS2 isn’t just another regulatory requirement; it’s a roadmap to resilience in a world of increasing cyber threats. By taking a risk-based approach and leveraging tools like ENISA’s guidance, Danish companies can transform compliance into a strategic asset, aligning cybersecurity with operational goals to ensure long-term resilience.

Key Takeaways:
  • Use ENISA’s guidance to align with best practices and structure your documentation.
  • Start compliance efforts now to avoid penalties and operational risks.
  • Appoint a leader to keep pace with directives, implementation regulations, and guidance (yes, we’ve read all 1,000 pages).
  • Conduct risk assessments and document decisions to build a defensible compliance position.
If parts of NIS2 remain unclear, or if your organization needs support navigating its requirements, we are here to help. Get in touch with Mads or Jakob up top.