NIS2 Readiness: What German CISOs Actually Need to Do
If you’re a CISO at a German enterprise, you’ve been hearing about NIS2 for two years. The directive entered into force in January 2023. Member states had until October 17, 2024 to transpose it into national law. Germany, characteristically, is late — but the NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherheitsstärkungsgesetz) is coming, and when it lands, there won’t be a grace period.
Here’s what you actually need to do. Not the jargon-filled version. The practical one.
Who’s in Scope? Probably You.
NIS2 massively expanded the scope compared to NIS1. If your organisation operates in one of 18 sectors and meets the size threshold, you’re in scope:
Essential entities (stricter requirements, proactive supervision):
- Energy, transport, banking, financial market infrastructure, health, drinking water, wastewater, digital infrastructure, ICT service management (B2B), public administration, space
Important entities (lighter touch, reactive supervision):
- Postal services, waste management, chemicals, food, manufacturing, digital providers, research
Size thresholds:
- Medium: 50+ employees OR €10M+ turnover
- Large: 250+ employees OR €50M+ turnover
If you’re a Mittelstand company with 50+ employees in manufacturing — congratulations, you’re in scope. Many organisations don’t realise this yet.
Article 21: The 10 Minimum Measures
Article 21 is the heart of NIS2. It requires “appropriate and proportionate technical, operational and organisational measures” across 10 areas:
- Risk analysis and information system security policies
- Incident handling (detection, response, reporting)
- Business continuity and crisis management (backup, disaster recovery)
- Supply chain security (including vendor risk management)
- Security in network and information systems acquisition, development, and maintenance (including vulnerability handling)
- Policies and procedures to assess the effectiveness of cybersecurity risk management measures
- Basic cyber hygiene practices and cybersecurity training
- Policies on the use of cryptography and encryption
- Human resources security, access control, and asset management
- Multi-factor authentication, secured communications, and secured emergency communications
If you’re already ISO 27001 certified, you’ll recognise most of these. That’s intentional — NIS2 explicitly references international standards. But there are gaps, and they matter.
Where ISO 27001 Isn’t Enough
Having ISO 27001 certification gives you a head start, but NIS2 adds requirements that go beyond the standard:
Incident reporting timelines are aggressive:
- 24 hours: Early warning to the competent authority (BSI in Germany)
- 72 hours: Full incident notification with initial assessment
- 1 month: Final report with root cause, impact, and remediation
Your current incident response process probably doesn’t hit these timelines. Most don’t.
Supply chain security gets specific: NIS2 requires you to assess the cybersecurity posture of your direct suppliers and service providers. Not just a questionnaire — actual assessment of their security measures, product quality, and cybersecurity practices.
Management body accountability: This is the one that gets board attention. NIS2 makes management bodies (Geschäftsführung/Vorstand) personally accountable for cybersecurity measures. They must approve the risk management measures, oversee implementation, and undergo cybersecurity training. This isn’t optional.
Fines are real:
- Essential entities: Up to €10M or 2% of global annual turnover
- Important entities: Up to €7M or 1.4% of global annual turnover
These are GDPR-level fines. Applied to cybersecurity.
The Practical Roadmap
Here’s what I recommend to every German CISO:
How AI Accelerates NIS2 Compliance
This is where it gets interesting. The 10 Article 21 requirements generate enormous amounts of work — documentation, assessment, monitoring, reporting. AI can compress months of effort into weeks:
The Bottom Line
NIS2 is coming to Germany. The exact timeline is uncertain, but the requirements are not. If you’re in scope — and if you have 50+ employees in any of the 18 sectors, you probably are — start now.
The good news: if you have ISO 27001, you’re 60-70% there. The bad news: the remaining 30-40% includes the hardest parts — incident reporting timelines, supply chain security, and management accountability.
Don’t wait for the Umsetzungsgesetz to be finalised. The requirements from the directive are clear. Start your gap analysis today, and consider where AI can compress your timeline from months to weeks.
Your board will thank you when the law lands and you’re already compliant.
Need help with this?
We help enterprise security teams implement what you just read — from strategy through AI-powered automation. First strategy session is free.