Cybersecurity and NIS2

The NIS2 Act is the Danish implementation of the EU's NIS2 Directive and aims to strengthen cybersecurity in companies that perform socially critical or important functions.

The law imposes increased requirements on how companies handle IT security, including risk management, incident management, and the implementation of appropriate technical and organizational security measures.

The NIS2 Act covers sectors such as energy, transport, health, water supply, and digital infrastructure, but also applies to certain IT and service providers. Companies covered by the Act must be prepared to document their security efforts and may be subject to supervision and sanctions, including fines, for non-compliance.

Dansk Erhverv notes that an alarming 60% of small and medium-sized enterprises (SMEs) affected by a data breach or cyberattack end up going bankrupt.. These grim statistics underscore how fatal digital attacks can be for SMEs—not only technically, but as a real threat to the company's existence.

For your business, this means that cybersecurity is no longer just a technical task—it is a management responsibility and a business-critical priority.

For the organization, the NIS2 Act has several specific consequences:

Extended scope of application

More types of companies and public authorities are now covered – especially those with critical social significance or a certain level of size.

Strengthened responsibility for management

Senior management will have a clear legal responsibility to ensure that robust security regulations are in place and that cybersecurity is continuously monitored – including in OT environments.

Stricter risk management requirements

Systematic risk assessments, network segmentation, incident management, supply chain security, etc. must be introduced, including in OT networks.

Incident reporting requirements

Security incidents must be reported as soon as possible to the relevant authorities – with stricter requirements regarding time and content.

Stronger supervision and sanctions

Authorities are given increased powers to supervise, issue orders, impose sanctions, or even suspend persons in management in the event of non-compliance.

In short, NIS2 means that companies must now work in a structured manner with cybersecurity – both strategic, operational, and technical. This also applies to industrial OT networks, where delayed updates or lack of monitoring can pose serious risks to operations and public safety.

Why are OT networks and NIS2 inseparable?

As industrial systems and OT environments become increasingly integrated with IT networks, they have become an attractive target for cyber attacks.

The NIS2 Act therefore has a special focus on OT security!

You can see the increased requirements on the right:

Er I omfattet af NIS2? Tag den officielle test

The first step toward compliance is to clarify whether your company is covered by the directive. Take the NIS2 test and get the answer in less than two minutes:

Network segmentation and access control

For example, using switches and firewalls to isolate OT networks.

ICS-specific controls and ongoing monitoring

Such as intrusion detection, secure updating of IoT and ICS control systems

Zero Trust principles

Continuous verification and segmented access from OT suppliers and remote users

Supplier and supply chain management

Dokumentation og kontrol med, at eksterne udbydere følger tilsvarende sikkerhedsstandarder

In practice, this means that your OT setup needs to be upgraded with equipment and procedures that support these requirements—and that's where our solutions come in.

We supply switches, firewalls, and monitoring solutions that ensure your OT network complies with NIS2 requirements—but perhaps more importantly, that you protect your business from cyberattacks and the consequences that follow.

Get an overview with our NIS2 checklist

Use our detailed checklist to determine whether your OT network complies with the requirements of the NIS2 Act. It guides you through all the important points:

  • Governance and management responsibility
  • Network segmentation and access control
  • Monitoring, logging, and incident response
  • Ongoing risk assessment and documentation

How to get started with cybersecurity in the production environment

Map your systems

Identify all OT devices and networks that control production and operational environments

Prioritize vulnerabilities

Focus on the components most at risk of cyber attacks

Implement security measures

Use segmentation, strong passwords, and network monitoring

Practice incident response

Train the team to detect, report, and respond to attacks

Maintain documentation

Document your work on an ongoing basis and update the checklist regularly.

Why choose our solution?

  • Quick overview: Test whether your company is covered
  • Practical guidance: Use our NIS2 checklist to get an overview and close security gaps
  • Continuously updated: We comply with NIS2 legislation and review the solutions


Start today – protect your operations, avoid fines, and stand strong in the face of cyberattacks!

Sign up for our newsletter

Stay up to date with the latest in industrial IT and components – sign up here.