We'll make NIS 2 a breeze for you!

In October 2024, EU countries will start implementing the NIS 2 Directive.

Our products are the easiest, most affordable way to start ticking off the NIS 2 requirements - one-by-one.

What is NIS 2? >
Get help with NIS 2 >
Download our NIS 2 Report >

Check your
NIS 2 status

Your business may be impacted by NIS 2. Use the free form below to find out.
Industry
Employees
E-mail
Is my company affected?
Your company is highly likely to be affected by NIS 2
Companies that do not comply risk a fee of up to 10.000.000 EUR or 2% of revenues.
Discover how to become NIS 2 compliant. Talk to our team or download our report to understand and assess the directive's impact on your business.
Talk to a NIS 2 Expert >
Download our NIS 2 Report >
Your company is likely to be affected by NIS 2
Companies that do not comply risk a fee of up to 10.000.000 EUR or 2% of revenues
Discover how to become NIS 2 compliant. Talk to our team or download our report to understand and assess the directive's impact on your business.
Talk to a NIS 2 Expert >
Download our NIS 2 Report >
Your company is not likely to be affected by NIS 2
However, you should still protect yourself - cyberattacks can cost you your business
Discover how to become NIS 2 compliant. Talk to our team or download our report to understand and assess the directive's impact on your business.
Talk to a NIS 2 Expert >
Download our NIS 2 Report >

NIS 2 Cheatsheet

What?

The EU is trying to make the internet a safer place - and NIS 2 is part of that. The NIS 2 Directive sets the framework for cyber security in Europe, creating a set of rules and guidelines that companies in key industries need to follow. NIS 2 builds on the existing Network and Information Security, but brings several differences, such as extended scope, harmonized security measures, better cooperation among member states and penalties for noncompliance. In practice, this means that companies will be required to start paying attention to cybersecurity - including using software like the one Blackshell sells.

When?

The NIS 2 Directive must be implemented by EU member states by October 18, 2024. This means that countries in the EU are required to transpose the directive into their national laws by this date and ensure that organizations within its scope comply with the new regulations.
€10m
or up to 2% of revenues fine for noncompliance
15
sectors covered by upcoming NIS 2 regulation
200k
companies affected by the NIS 2 Directive
<€500
annual fee for NIS 2 compliance using Blackshell products

Who?

The NIS 2 Directive divides companies into three categories, based on their contribution to the economy and security of their country.
Essential Entities
  • Critical for supporting key societal and economic activities
  • Must undergo a cybersecurity audit within the first year, then every two years
  • Subject to stricter security measures due to their impact on national security and infrastructure
  • Must check the security of their suppliers, including cloud, DNS, and data center services
Important Entities
  • Play an important role in the economy and society but aren't as critical
  • Security measures are scaled to match their risks and size
  • Need to implement appropriate security measures but with more flexibility
  • Must create business continuity plans, including disaster recovery, to reduce the impact of incidents on operations
Other Entities
  • Non-essential companies may be regulated if they provide critical services
  • ⁠Service disruptions affecting public safety or health could bring them under regulation
  • Companies with cross-border risks may also be include
  • Key players in important sectors might still face security measures if identified by the governmental body in their country
Read our in-depth NIS 2 Report
(insights, business impact, and compliance strategy for future growth)
Check your e-mail to download the report!
Oops! Something went wrong while submitting the form.

NIS 2 covers a wide range of cybersecurity items:

Cryptography, encryption and data security
Companies must use encryption whenever dealing with sensitive data, whether at rest or in transit
We can help.
Audits, reporting and compliance
Compliance data must be regularly collected, exported and verified with external third parties.
We can help.
Pen-testing + vulnerability management
Regular penetration testing and vulnerability scanning must be performed by all companies.
We can help.
Network access control and safeguards
Businesses must continuously secure access to their networks, devices and data.
We can help.
Data leakage protection
Sensitive data must be encrypted, and data leaks must be identified, stopped and reported.
We can help.

Book a Demo

Complete the form and we will reach out to show you how our cybersecurity solutions can benefit your company
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.