EU measures to strengthen cyber security: how you can best prepare for them
The EU is planning comprehensive regulations to strengthen cyber security with the NIS 2 Directive and the Cyber Resilience Act. These measures will have a major impact on almost all digital processes, which should not come as a surprise.
by DI (FH) Stephan Leitner
As the world becomes increasingly interconnected, cyber security has taken on a new significance in everyday (working) life. To make the EU economy fit for this new world and protect users, the European Union is planning numerous mandatory packages of measures.
Contents
- Network and Information System Security Act(NIS) 2.0
- Law on cyber resilience
- Why waiting is not an option
- The first steps
- More links
- Author

Network and Information System Security Act (NIS) 2.0
The NIS 2 Directive is a European legal regulation on cyber security. It aims to ensure a high level of security for network and information systems in the EU. It focuses on sectors that are essential to society and the economy, such as energy, transport, health, finance and digital services. Compared to the current Network and Information System Security Act (NIS), which only applies to operators of so-called “essential services” and “digital services”, the scope of NIS 2 is extended to other sectors, including healthcare, water, wastewater, the chemical industry and digital infrastructure. The directive lays down stricter security requirements that must be met by the companies and organizations concerned. These include risk-based security measures, the introduction of security precautions and practices and the reporting of security incidents. The NIS 2 Directive provides for deterrent penalties for breaches of the security requirements, making both companies and individuals in management positions liable. Member States must provide appropriate enforcement mechanisms to ensure that companies and organizations comply with the rules.
Law on cyber resilience
Unlike NIS2, which applies to companies in certain sectors or functions, the Cybersecurity Act applies to all products that have a digital component. This means that a wide range of products are affected, from a smart light bulb to a modern car. The directive is still being drafted, but it is expected that a series of mandatory measures will be prescribed. The entire product life cycle will be affected. For example, cyber security must be considered in the planning, design, development, manufacturing and maintenance phases. Comprehensive documentation and reporting obligations (e.g. reporting of vulnerabilities and incidents) will also be introduced. Furthermore, vulnerabilities must be rectified promptly and security-relevant updates must be provided for each product sold for at least five years.
Why waiting is not an option
By implementing measures from this directive at an early stage, companies can ensure that they comply with the legal requirements as soon as the directive comes into force in their country. This allows them a smooth transition and prevents possible sanctions or legal consequences.
Apart from legal requirements, these guidelines aim to improve the security of network and information systems. Cyber attacks are a constant threat. Companies that take early action to strengthen their security standards are better equipped to counter these threats. By implementing security precautions and practices, organizations can identify and address potential vulnerabilities, increase the security of their systems and reduce the likelihood of successful attacks.
This can minimize financial losses – cyber attacks can cause considerable economic damage, be it through the loss of data, business interruptions or the theft of intellectual property. By taking proactive measures to secure their network and information systems, companies can identify and eliminate potential vulnerabilities, leading to a reduction in financial risk.
In addition, compliance with the NIS 2 directive can strengthen the trust of customers, partners and the public. With the increasing threat of cyber-attacks, the security of network and information systems has become a major concern. Companies that implement demonstrably robust security measures and meet the requirements of the NIS 2 Directive can strengthen their image as a trustworthy and reliable business partner. This can lead to an improved competitive position, increased customer loyalty and a positive reputation.
The first steps
1. impact assessment:
First, a comprehensive assessment of the network and information systems must be carried out to identify potential vulnerabilities and risks. This includes analyzing the critical infrastructure, identifying sensitive data and assessing potential threats.
2. development of a security strategy:
A comprehensive security strategy should be developed on the basis of the assessment. This strategy should include the necessary security measures and practices to increase the level of protection of their network and information systems.
3. implementation of technical and organizational measures:
Appropriate technical and organizational measures must be taken to ensure the security of the systems. This includes the implementation of firewalls, intrusion detection systems (IDS), access controls, regular security updates and patches, secure configurations and access restrictions.
4. risk management:
Effective risk management must be established in order to identify and assess risks and take appropriate countermeasures. This includes continuous monitoring, detection of security incidents and rapid response to these incidents.
5. incident response plan:
It is advisable to draw up an incident response plan that defines clear procedures for dealing with security incidents. This includes communication, the escalation procedure, the recovery of systems and data and cooperation with authorities and partners.
6. training and sensitization:
employees should be instructed in the security measures and sensitized to possible threats. Training programs and regular security briefings can help raise awareness of cybersecurity and empower employees to perform security-related tasks effectively.
7. cooperation and exchange:
You are not alone! The NIS 2 Directive emphasizes cooperation and the exchange of information between companies, authorities and relevant stakeholders.
RISC Software GmbH is happy to support you in the development of secure and resilient software and contribute its expertise. With its motivated team of experts, your software will be developed from the very first step with the highest quality and security in mind. They will be happy to advise you on the implementation of your product idea or update your established software to the latest state of the art.
Further links
Ansprechperson
Author
DI (FH) Stephan Leitner
Head of Unit Domain-specific Applications