{"id":346962,"date":"2025-08-15T16:23:18","date_gmt":"2025-08-15T16:23:18","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/346962\/"},"modified":"2025-08-15T16:23:18","modified_gmt":"2025-08-15T16:23:18","slug":"nis2-update-eu-cyber-authority-sets-out-compliance-expectations-but-implementation-is-a-work-in-progress-skadden-arps-slate-meagher-flom-llp","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/346962\/","title":{"rendered":"NIS2 Update: EU Cyber Authority Sets Out Compliance Expectations, but Implementation Is a Work in Progress | Skadden, Arps, Slate, Meagher &#038; Flom LLP"},"content":{"rendered":"<p>[co-author: Aleksander Aleksiev]<\/p>\n<p><strong>Executive Summary<\/strong><\/p>\n<ul>\n<li><strong>What is new:<\/strong> On 26 June 2025, the EU Agency for Cybersecurity (ENISA) <a href=\"https:\/\/www.enisa.europa.eu\/news\/supporting-nis2-implementation-through-actionable-guidance\" rel=\"noopener noreferrer\" target=\"_blank\">published <\/a>guidance <a href=\"https:\/\/www.enisa.europa.eu\/publications\/cybersecurity-roles-and-skills-for-nis2-essential-and-important-entities\" rel=\"noopener noreferrer\" target=\"_blank\">documents setting out security measures<\/a> that regulated organisations should have in place to comply with the EU\u2019s critical infrastructure cybersecurity law (NIS2).<\/li>\n<li><strong>Why it matters:<\/strong> These expansive security standards will require significant investment for many newly regulated entities, and member states\u2019 varying NIS2 implementations add a further layer of complexity.<\/li>\n<li><strong>What to do next:<\/strong> As companies assess their 2026 security and compliance budgets, they should determine what expanded security efforts will be required \u2014prioritizing the greatest enforcement risks \u2014 and plan implementation and funding for the coming months and years.<\/li>\n<\/ul>\n<p><strong>__________<\/strong><\/p>\n<p>The Guidance<\/p>\n<p>The guidance, though not strictly binding, further clarifies ENISA\u2019s expectations of NIS2-regulated entities, building upon both the text of NIS2 and the European Commission\u2019s NIS2 <a href=\"#\/implementingActs\/12288\" rel=\"noopener noreferrer\" target=\"_blank\">Implementing Regulation 2024\/2690<\/a> on cyber risk management.<a href=\"#ftn1\" name=\"topftn1\">1<\/a> (For an overview of NIS2, see our previous client alert \u201c<a href=\"https:\/\/www.skadden.com\/insights\/publications\/2024\/10\/navigating-the-new-cybersecurity-landscape\" target=\"_blank\" rel=\"noopener\">Navigating the New Cybersecurity Landscape: Key Implications of the EU\u2019s NIS 2 Directive<\/a>.\u201d) As an example:<\/p>\n<ol>\n<li>NIS2 requires companies to have security measures covering \u201cthe use of multi-factor authentication.\u201d<\/li>\n<li>The NIS2 Implementing Regulation expands on this obligation, stating that companies\u2019 multifactor authentication measures \u201cshall ensure that users are authenticated by multiple authentication factors \u2026 in accordance with the [risk] classification of the asset to be accessed.\u201d<\/li>\n<li>The guidance further expands on the Implementing Regulation, stating that companies should \u201cenforce [multifactor authentication] on internet-facing systems, such as email, remote desktop and VPNs,\u201d and document this compliance through configuration logs. The guidance also maps ENISA\u2019s expectations to widely-used international standards such as ISO 27001.<\/li>\n<\/ol>\n<p><img decoding=\"async\" alt=\"Triangular chart: from top to bottom, reads: \" nis2=\"\" implementing=\"\" regulation=\"\" enisa=\"\" guidance=\"\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/08\/b7b770c7-15f7-4db4-844e-412a49ebdcc2-nis2_chart.png\"\/><\/p>\n<p>Pyramid chart: from top to bottom, reads: &#8220;NIS2 &#8211; NIS2 Implementing Regulation &#8211; ENISA Guidance&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>The guidance, and in particular ENISA\u2019s commitment to aligning regulatory obligations with existing international standards that many companies have already adopted, is welcome, and sets out a helpful blueprint for technical implementation of NIS2 compliance programs. However, the scale of ENISA\u2019s guidance (stretching to nearly 200 pages of security measures) reinforces the extent of investment and documentation regulators expect for comprehensive NIS2 compliance. Companies should target their NIS2 compliance programs to focus on systems (e.g., operationally critical systems) and topics (e.g., incident response and vendor management) that present the greatest enforcement risk to avoid spreading limited compliance resources too thinly.<\/p>\n<p>As part of the guidance, ENISA published a<a href=\"https:\/\/www.enisa.europa.eu\/publications\/cybersecurity-roles-and-skills-for-nis2-essential-and-important-entities\" rel=\"noopener noreferrer\" target=\"_blank\"> \u201croles and skills\u201d summary<\/a>, mapping the internal expertise and responsibilities required to meet NIS2 obligations and emphasizing that NIS2 compliance requires cross-functional teams, including IT, cybersecurity, legal and compliance specialists.<\/p>\n<p>NIS2 Implementation Status<\/p>\n<p>While ENISA continues to advance NIS2, EU member states\u2019 implementation has lagged behind. Despite continued complaints from the European Commission, including <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/news\/commission-calls-19-member-states-fully-transpose-nis2-directive\" rel=\"noopener noreferrer\" target=\"_blank\">a public rebuke<\/a>, 13 out of 27 states have not yet implemented NIS2 into local law. This challenges companies to hit a moving compliance target.<\/p>\n<p><img decoding=\"async\" alt=\"Map of Europe showing which countries have adapted the NIS2 law.\" src=\"https:\/\/www.europesays.com\/uk\/wp-content\/uploads\/2025\/08\/b7b770c7-15f7-4db4-844e-412a49ebdcc2-nis2_map_of_europe.png\"\/><\/p>\n<p><strong>EU NIS2 Directive &#8211; Transposition<\/strong><\/p>\n<p>Act adapted: Belgium, Croatia, Cyprus, Denmark, Greece, Finland, Hungary, Italy, Lithuania, Latvia, Malta, Romania, Slovakia, Slovenia.<\/p>\n<p>\u00a0<\/p>\n<p>Legislative process ongoing: Austria, Bulgaria, Czech Republic, Estonia, France, Germany, Greece, Ireland, Luxembourg, Netherlands, Poland, Portugal, Spain, Sweden.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>While approximately half of member states have already transposed NIS2 into national law (some, like Latvia and Lithuania, even ahead of the October 2024 deadline), others are moving more slowly. Several countries, including Germany, Ireland, the Netherlands and Poland, have advanced draft legislation that outlines national frameworks, regulators and sector-specific requirements. Meanwhile, member states such as Spain, Estonia and Sweden remain at an earlier stage of the process.<\/p>\n<p>Approaches to key implementation elements also vary.<\/p>\n<ul>\n<li>Many countries, including Belgium, Hungary and Italy, have aligned liability provisions for management bodies with national existing civil law regimes.<\/li>\n<li>Additionally, the \u201cmain establishment\u201d principle has been adopted in countries such as Belgium, Croatia, Greece, Italy and Slovakia, meaning that NIS2 obligations primarily apply to entities headquartered in those jurisdictions. Hungary has departed from this model: Service providers operating in Hungary must register locally and comply with the Hungarian Cybersecurity Act, regardless of where their main establishment is located.<\/li>\n<\/ul>\n<p>Reporting obligations under NIS2 also vary significantly across member states, creating a fragmented compliance landscape for cross-border entities. Definitions of \u201csignificant incidents,\u201d reporting thresholds and timelines differ, with some countries imposing stricter requirements than NIS2 does. For example, entities in Cyprus must submit early warnings within six hours of detection \u2014 well ahead of NIS2\u2019s 24-hour requirement. This divergence in national rules increases administrative and compliance burdens for organizations operating across multiple EU jurisdictions.<\/p>\n<p>Given this uncertainty, companies should take a phased approach to compliance, focused on addressing core compliance obligations that are likely to be consistent across member states, while leaving flexibility to address jurisdiction-specific quirks once more member states complete their implementations.<\/p>\n<p>What To Do Now<\/p>\n<p>Given the breadth of NIS2\u2019s obligations and the ongoing uncertainty surrounding its implementation, companies need to scope and target their NIS2 compliance efforts to make the most of limited compliance resources. In particular, companies should:<\/p>\n<ul>\n<li>Continue to progress NIS2 compliance programs, focusing on systems (e.g., operationally critical systems) and documentation (e.g., incident response plans) that present the greatest enforcement risk.<\/li>\n<li>Ensure that management bodies (e.g., boards) are updated on NIS2 compliance progress, as those management bodies can be held personally liable for NIS2 noncompliance.<\/li>\n<li>Take advantage of ENISA\u2019s mapping to existing international standards to identify areas where existing information security documentation can be leveraged \u2014 for example, where policies prepared for ISO 27001 compliance can be reused with minimal changes for NIS2 compliance \u2014 and identify gaps in that documentation.<\/li>\n<li>Track NIS2 implementation status in the jurisdictions in which a company operates, and identify areas where compliance efforts can be advanced before local implementation is complete.<\/li>\n<\/ul>\n<p>____________________<\/p>\n<p><a href=\"#topftn1\" name=\"ftn1\">1<\/a>\u00a0The Implementing Regulation and published guidance apply only to companies operating in digital sectors (such as cloud computing, data centres, managed services and online search engines) but are likely to influence regulators\u2019 compliance expectations more broadly.<\/p>\n<p>[<a href=\"https:\/\/www.skadden.com\/insights\/publications\/2025\/08\/nis2-update-eu-cyber-authority\" target=\"_blank\" rel=\"noopener\">View source<\/a>.]<\/p>\n","protected":false},"excerpt":{"rendered":"[co-author: Aleksander Aleksiev] Executive Summary What is new: On 26 June 2025, the EU Agency for Cybersecurity (ENISA)&hellip;\n","protected":false},"author":2,"featured_media":346963,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5174],"tags":[2000,299,5187],"class_list":{"0":"post-346962","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-eu","8":"tag-eu","9":"tag-europe","10":"tag-european"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/115033710176253661","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/346962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=346962"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/346962\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/346963"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=346962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=346962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=346962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}