Cybersecurity and NIS2
Industrial IT & IIoT / Cybersecurity and NIS2
The NIS2 Act is the Danish implementation of the EU's NIS2 Directive and aims to strengthen cybersecurity in companies that perform socially critical or important functions.
The law imposes increased requirements on how companies handle IT security, including risk management, incident management, and the implementation of appropriate technical and organizational security measures.
The NIS2 Act covers sectors such as energy, transport, health, water supply, and digital infrastructure, but also applies to certain IT and service providers. Companies covered by the Act must be prepared to document their security efforts and may be subject to supervision and sanctions, including fines, for non-compliance.
Dansk Erhverv notes that an alarming 60% of small and medium-sized enterprises (SMEs) affected by a data breach or cyberattack end up going bankrupt.. These grim statistics underscore how fatal digital attacks can be for SMEs—not only technically, but as a real threat to the company's existence.
For your business, this means that cybersecurity is no longer just a technical task—it is a management responsibility and a business-critical priority.
For the organization, the NIS2 Act has several specific consequences:
Extended scope of application
More types of companies and public authorities are now covered – especially those with critical social significance or a certain level of size.
Strengthened responsibility for management
Senior management will have a clear legal responsibility to ensure that robust security regulations are in place and that cybersecurity is continuously monitored – including in OT environments.
Stricter risk management requirements
Systematic risk assessments, network segmentation, incident management, supply chain security, etc. must be introduced, including in OT networks.
Incident reporting requirements
Security incidents must be reported as soon as possible to the relevant authorities – with stricter requirements regarding time and content.
Stronger supervision and sanctions
Authorities are given increased powers to supervise, issue orders, impose sanctions, or even suspend persons in management in the event of non-compliance.
In short, NIS2 means that companies must now work in a structured manner with cybersecurity – both strategic, operational, and technical. This also applies to industrial OT networks, where delayed updates or lack of monitoring can pose serious risks to operations and public safety.
Why are OT networks and NIS2 inseparable?
As industrial systems and OT environments become increasingly integrated with IT networks, they have become an attractive target for cyber attacks.
The NIS2 Act therefore has a special focus on OT security!
You can see the increased requirements on the right:
Er I omfattet af NIS2? Tag den officielle test
The first step toward compliance is to clarify whether your company is covered by the directive. Take the NIS2 test and get the answer in less than two minutes:
For example, using switches and firewalls to isolate OT networks.
Such as intrusion detection, secure updating of IoT and ICS control systems
Continuous verification and segmented access from OT suppliers and remote users
Dokumentation og kontrol med, at eksterne udbydere følger tilsvarende sikkerhedsstandarder
In practice, this means that your OT setup needs to be upgraded with equipment and procedures that support these requirements—and that's where our solutions come in.
We supply switches, firewalls, and monitoring solutions that ensure your OT network complies with NIS2 requirements—but perhaps more importantly, that you protect your business from cyberattacks and the consequences that follow.
Get an overview with our NIS2 checklist
Use our detailed checklist to determine whether your OT network complies with the requirements of the NIS2 Act. It guides you through all the important points:
- Governance and management responsibility
- Network segmentation and access control
- Monitoring, logging, and incident response
- Ongoing risk assessment and documentation
How to get started with cybersecurity in the production environment
Map your systems
Identify all OT devices and networks that control production and operational environments
Prioritize vulnerabilities
Focus on the components most at risk of cyber attacks
Implement security measures
Use segmentation, strong passwords, and network monitoring
Practice incident response
Train the team to detect, report, and respond to attacks
Maintain documentation
Document your work on an ongoing basis and update the checklist regularly.
Why choose our solution?
- Quick overview: Test whether your company is covered
- Practical guidance: Use our NIS2 checklist to get an overview and close security gaps
- Continuously updated: We comply with NIS2 legislation and review the solutions
Start today – protect your operations, avoid fines, and stand strong in the face of cyberattacks!