Resources
NIS 2 Hub
A practical hub for NIS 2: understand scope, governance & penalties, risk-management measures, and the incident-reporting timelines, plus ISO 27001 mapping and ISMS guidance to get compliance fast.

NIS 2 explained (start here)
Plain-English overview of who’s in scope, what changes, and what “good” looks like. In this article we’ll explore in detail what it is, who needs it, and how to achieve compliance.
NIS 2 Basics

Getting started with NIS 2 (guide)
If you’re approaching NIS 2 for the first time it can be a bit intimidating. This practical starter guide helps you decide if you’re in scope, classify essential vs. important, and translate the Directive into a simple, team-ready plan.

Cybersecurity & compliance white paper
Cybersecurity regulations can seem overwhelming, and new ones are coming thick and fast. But you don’t have to go it alone. We’ve broken down everything you need to know in our latest whitepaper.

ISMS.online’s NIS 2 Framework
Explore the dedicated NIS 2 framework inside ISMS.online, Up to 78% of the work is already done for you. See how it maps directly to the Directive’s Articles 20–23 and the 13 cybersecurity risk-management measures. Every requirement from governance to supply chain oversight is pre-linked to policies, risks, and evidence areas you already use.

Get a 78% complete head-start out of the gate
Our 90-day acceleration plan is the fastest route from “we need to comply” to “we’re audit-ready.” Inside ISMS.online, each phase—scope, gap analysis, risk management, evidence gathering, and management review is streamlined and tracked for you. Real-time dashboards, task reminders, and downloadable proof packs help teams stay on pace without extra admin.

NIS 2 made simple, scalable, and sustainable
Discover the smarter way ISMS.online now delivers NIS 2, more guidance, less guesswork, and instant alignment with EU requirements. We’ve added pre-built NIS 2 policy packs, automated article-to-control mapping, and integrated evidence tracking that makes proving compliance simple.
Take a deeper dive
Scope & entity types (essential vs important)
Use our scope guides to confirm whether NIS 2 applies, then determine if you’re an essential or important entity and what that classification changes in practice. We cover size and sector tests, edge cases (subsidiaries, non-EU companies, indirect services), and how misclassification impacts supervision and fines.
Accountability & penalties
NIS 2 raises the bar for executive accountability. Learn what the management body must approve, oversee and evidence; how supervision differs for essential vs important entities; and how penalties are triggered and sized. We include board-level reporting expectations, training proof, and common first questions from regulators.
Risk-management measures (the 13)
Go line-by-line through the 13 cybersecurity risk-management measures with plain-English actions, policy starters, and “what counts as proof.” From access control and vulnerability handling to logging, continuity and supplier oversight, we show how to implement proportionately and how to reuse ISO 27001 work where possible.
Incident reporting timelines & requirements
Master the 24-hour early warning, 72-hour update, and 30-day final report. We break down thresholds for “significant incidents,” cross-border workflow, CSIRT and NCA roles, the exact information regulators expect and guidance on avoiding self-incrimination while staying transparent.
NIS 2 supply-chain security explained
NIS 2 puts real weight on supplier assurance. Learn how to tier suppliers, run proportionate due-diligence, and embed security clauses that auditors expect to see (vuln disclosure, reporting, audit rights, data location, crypto, exit). We also cover continuous monitoring, handling non-EU providers, and what to do when a critical supplier refuses terms.
NIS 2 FAQs
A collection of some of the most common questions about the NIS 2 directive. Every decision, contract, and action must be proven with auditable records, learn how to ensure compliance, show trust, and turn readiness into a business advantage.
Best of the blog

NIS 2 is Coming: Here’s What UK Organisations Need to Know
NIS 2 introduces a minimum set of measures to which all organisations must adhere and will apply to all medium and large-sized organisations in the sectors deemed providers of “essential” or “important” services

NIS 2: What The Proposed Changes Mean For Your Business
Companies providing essential services such as energy, healthcare, transport, or water may be fined up to £17 million in the UK and €10 million or 2% of worldwide turnover in the EU.

A Strategic Approach to Navigating NIS 2 and DORA Directives
Rather than managing NIS 2 and DORA separately, a strategic approach anchored in an Information Security Management System (ISMS) helps to address both sets of requirements for handling cyber risks.
Watch and listen

The Big Cybersecurity Questions Facing Businesses
Cyber threats are evolving fast. Stay ahead with expert insights on AI, cyber law, and trust, plus ten essential steps to secure your business.

What Not To Do in a Disaster
What to do—and what to avoid—when a cyber attack like WannaCry strikes, with expert insights on ransomware response, minimizing damage, and ensuring your business can recover quickly.
NIS 2 by Business Size

Get compliant. Build credibility. Grow your business.
You don’t need a compliance team to nail your compliance. Our founder-friendly platform has everything you need to get you certified fast.

Compliance confidence for small businesses
Meet your clients regulatory requirements without slowing down or breaking the bank. IO helps you move fast, while staying secure.

Professional compliance, bigger deals
As your business scales, your compliance needs to scale with you. IO takes the mystery out of compliance, making it easy to impress your clients.

Resilient compliance for established companies
Your compliance needs to scale with your business, but that’s not an easy process. You need a platform that can keep up.

Compliance confidence for enterprise
Meet your clients regulatory requirements without slowing down or breaking the bank. IO helps you move fast, while staying secure.
Customer stories
(EU) 2022/2555 (NIS 2 Directive) Articles
1 Subject matter
2 Scope
3 Essential and important entities
4 Sector-specific Union legal acts
5 Minimum harmonisation
6 Definitions
7 National cybersecurity strategy
8 Competent authorities and single points of contact
9 National cyber crisis management frameworks
10 Computer security incident response teams (CSIRTs)
11 Requirements, technical capabilities and tasks of CSIRTs
12 Coordinated vulnerability disclosure and a European vulnerability database
13 Cooperation at national level
14 Cooperation Group
15 CSIRTs network
16 European cyber crisis liaison organisation network (EU-CyCLONe)
17 International cooperation
18 Report on the state of cybersecurity in the Union
19 Peer reviews
20 Governance
21 Cybersecurity risk-management measures
22 Union level coordinated security risk assessments of critical supply chains
23 Reporting obligations
24 Use of European cybersecurity certification schemes
25 Standardisation
26 Jurisdiction and territoriality
27 Registry of entities
28 Database of domain name registration data
29 Cybersecurity information-sharing arrangements
30 Voluntary notification of relevant information
31 General aspects concerning supervision and enforcement
32 Supervisory and enforcement measures in relation to essential entities
33 Supervisory and enforcement measures in relation to important entities
34 General conditions for imposing administrative fines on essential and important
35 Infringements entailing a personal data breach
36 Penalties
37 Mutual assistance
38 Exercise of the delegation
39 Committee procedure
40 Review
41 Transposition
42 Amendment of Regulation (EU) No 910/2014
43 Amendment of Directive (EU) 2018/1972
44 Repeal
45 Entry into force
46 Addressees
Controls
By Country
Take a virtual tour
Start your free 2-minute interactive demo now and see
ISMS.online in action!









