07.11.2025

Cybersec Update #2: How to prepare for NIS2

Seven months. That’s the maximum amount of time entities covered by the NIS2 directive will have to fully comply with the new requirements. In practice, it may be even shorter – the deadline for registration in the list of essential and important entities will be set by the Minister of Digital Affairs. The clock is ticking, and many organizations still don’t know whether and to what extent the new rules apply to them. Where should you start and how can you avoid being caught off guard? Here’s a roadmap for companies entering the world of NIS2.

Who are we? Entity status under NIS2

Just as every person at some point in life asks themselves the fundamental question of who they are and what they should expect from themselves, every organization potentially subject to NIS2/KSC2 must begin by determining its status under these regulations. This is the first and crucial step – without it, we don’t know which specific requirements apply to us or whether we even have to comply at all. Determining this is often not straightforward – you need to take into account the sector in which the organization operates (the directive and the act specify essential and important sectors), as well as criteria related to the size of the entity (measured by the number of employees and revenue).

The act enters into force one month after its publication in the Journal of Laws, and the time to comply with its requirements is six months from that date – a total of seven months. However, we must not forget that we may have even less time to register in the list of essential and important entities. According to Article 34(3) of the act, the Minister of Digital Affairs will announce the schedule for submitting applications for entry into the list.

Gap audit – what do we have and what’s missing?

Once we determine that we are subject to the act and in what capacity (important/essential entity), it’s time to check whether and to what extent we meet the requirements. For this purpose, it’s worth conducting a so-called gap analysis to verify the organization’s readiness level.

As experience shows, many entities already partially have the appropriate legal and technical solutions in place – often without realizing it. A gap analysis will help inventory all of this and identify actual deficiencies.

Implementation – it’s more than just a few documents

Once we know what we have and what we’re missing, we can begin proper implementation. Contrary to what is sometimes believed, it will not be limited to drafting a few documents.

Real and full compliance with NIS2/KSC2 requirements must include comprehensive actions, such as:

  • appropriately structuring the company’s organization and responsibilities
  • conducting a risk analysis
  • drafting and implementing necessary policies and procedures (e.g. information security policy, thematic policies)
  • preparing document templates (e.g. supplier agreements, questionnaires)
  • ensuring the necessary resources and technical measures (e.g. related to process automation and system monitoring)
  • negotiating with ICT suppliers
  • conducting regular training and security audits (for which appropriate contracts with specialized entities should also be concluded)

Compliance is a process, not a one-time effort

As one of the heroes of The Lord of the Rings might put it – the implementation ends, but the battle for NIS2 compliance is just beginning. One of the key requirements of the new regulations is the need for continuous verification of applied measures, proper oversight, and ongoing learning from exercises, tests, and daily practice.

Is ISO 27001 and 22301 enough?

In the previous edition of Cybersec Update, we analyzed whether implementing ISO standards automatically means compliance with NIS2/KSC2. The answer is: definitely not, although these certifications can significantly facilitate the adaptation process. ISO standards provide a certain framework consistent with the assumptions of NIS2, but they do not cover many of the specific requirements of the new regulations – from detailed rules for incident reporting and precise audit timelines to expanded management liability.

For more details on specific requirements, stay tuned for the next parts of the series, where together with Jarosław Straś and Andrzej Broniewski we’ll be breaking down NIS2.

1 2 3 54

Newsletter

Want to stay up to date?
Subscribe to our newsletter.

By entering your e-mail address above and clicking ‘Subscribe!’ you declare that you have read and accept the Terms of Service and subscribe to the newsletter, i.e. information on legal topics, including information on important legal events, legislative changes and the Law Firm's activities, services and products, via e-mail communication.

The controller of your personal data is KWKR Konieczny Wierzbicki i Partnerzy S.K.A. with its registered office in Kraków, Kącik 4 Street, 30-549 Kraków. Your data will be processed in order to provide the newsletter service and thus send commercial and marketing information to the e-mail address provided, in accordance with the Privacy Policy and the Terms of Service. For more information on the principles of personal data processing, including your rights, please see the Privacy Policy.

Please wait...

Thank you for sign up!