07.04.2026

CyberSec Update #14: Practical advice for the board

Back to compliance: practical guidance for boards in the context of NIS2 and the UKSC

Who are we? Where are we heading?

Cybersec Update #2 helped answer the first of these questions. Today – a few days after the Act implementing the NIS2 Directive came into force – we will attempt to help answer the second, no less fundamental question, which is crucial from the perspective of management boards and regulatory compliance.

Once you have established that your organisation will be subject to NIS2/UKSC, the next step should be to assess the extent to which your existing procedures meet the requirements of the legislation and to what extent further action needs to be taken to ensure compliance with the new regulations.

Gap audit – a compliance and risk management tool

A gap analysis is not a formality, but a business tool that allows you to quickly assess what is working and what needs improvement in the context of NIS2 and the UKSC. The analysis highlights which services and systems are critical to operations, where the greatest risks lie, and which procedural and technical gaps conflict with the requirements of the legislation.

The audit results may also be a pleasant surprise if it turns out that the organisation has already implemented more security measures than originally anticipated. Much like Monsieur Jourdain in Molière’s comedy*, we then discover with astonishment that we have been ‘speaking prose’ all along.

In practice, a gap analysis should include, amongst other things, an inventory of assets, an assessment of supply chain security, a review of risk management mechanisms, and readiness to report incidents. The analysis should take into account both legal and technical aspects.

A gap analysis does not mark the end of the NIS2/UKSC compliance process – it is its foundation and a reference point for further action. It is therefore worth treating it as an investment in business continuity, rather than merely a regulatory obligation.

What happens after the gap audit?

The next stage is to establish and maintain an Information Security Management System (ISMS), which will ensure ongoing compliance with the Act’s requirements. Implementing an ISMS can take up to several months, but a thoroughly conducted gap audit allows you to create a clear roadmap for the entire process.

The audit report helps to better understand the requirements of NIS2 and the UKSC, plan actions and efficiently carry out the implementation. However, this is a topic for a separate article, which we will explore in the next part of the series.

* Molière, ‘The Bourgeois Gentleman’

1 49 50 51 52 53 56

Newsletter

Want to stay up to date?
Subscribe to our newsletter.

By entering your e-mail address above and clicking ‘Subscribe!’ you declare that you have read and accept the Terms of Service and subscribe to the newsletter, i.e. information on legal topics, including information on important legal events, legislative changes and the Law Firm's activities, services and products, via e-mail communication.

The controller of your personal data is KWKR Konieczny Wierzbicki i Partnerzy S.K.A. with its registered office in Kraków, Kącik 4 Street, 30-549 Kraków. Your data will be processed in order to provide the newsletter service and thus send commercial and marketing information to the e-mail address provided, in accordance with the Privacy Policy and the Terms of Service. For more information on the principles of personal data processing, including your rights, please see the Privacy Policy.

Please wait...

Thank you for sign up!