NIS2 for Managing Directors
What Cyber Security requirements must be observed?
According to Section 30(1) BSIG (new version), affected companies must implement suitable, proportionate, and effective technical and organizational measures based on systematic cyber risk management.
For NIS2 directors’ and officers’ liability, this means that risks must not only be addressed technically, but also identified, assessed, prioritized, and documented in a structured manner.
Section 30 BSIG requires a holistic approach across the entire company. The aim is to prevent disruptions to the availability, integrity, and confidentiality of the information technology systems, components, and processes that an organization uses to provide its services. The “state of the art” is decisive, taking into account international standards, i.e. ISO 27001 and ISO 27002 for the purposes of EU regulation.
The core requirements in Section 30 (2) BSIG (new version) include
- Risk management process (analysis, assessment, treatment, documentation)
- Incident management
- Business continuity & emergency planning
- Backup and recovery strategies
- Encryption and multi-factor authentication
- Supply chain security
- Training and awareness
- Effectiveness checks and audits
Managing director liability: these are the to-dos
- Have the company's risk exposure assessed - taking into account the environmental conditions in the context of business objectives, critical services/processes, legal requirements and stakeholder expectations
- Provide binding budgets and resources
- Regularly review the effectiveness of risk management measures, for example by establishing a reporting structure
- Personally approve risk management plans with treatment measures and risk acceptance
NIS2 and reporting obligations - what now applies to companies?
Section 32 BSIG (new version) provides for a three-stage reporting procedure. After becoming aware of a significant security incident, the affected organization must report to the joint BSI and BBK reporting office within:
- 24 hours: Initial notification
- 72 hours: Update with initial assessment, severity and impact
- Within 1 month at the latest: Final report or progress report (if still ongoing)
Compliance with these deadlines requires established processes and no ad hoc action. According to Section 35 BSIG (new version), the BSI may also order that affected customers be informed.
To-dos for the management
- Review incident response structures and crisis plans
- Define binding reporting channels and decision-making responsibilities
- Prepare a communication strategy for customers and partners
NIS2 Managing director liability: What are the specific fines and risks?
Fines of up to €10 million or 2% of global annual turnover may be imposed (Section 65 BSIG). In addition, management may be held personally liable for breaches of duty.
Anyone who does not implement NIS2 correctly, completely, and on time is in breach of regulations and may face the following fines:
- Particularly important facilities: up to €10 million or 2% of global turnover
- Important facilities: up to €7 million or 1.4% of global turnover
Personal liability is particularly relevant for management. This may apply, for example, in the event of:
- Lack of documented risk management (Section 30(1) BSIG as amended)
- Omitted or undocumented training obligations (Section 38(3) BSIG as amended)
- Ignoring known vulnerabilities (Section 30(2), No. 5 BSIG as amended)
- Lack of monitoring of risk management measures (Section 30(1) BSIG as amended)
Important: A cybersecurity incident alone does not establish liability. The decisive factor is whether management has properly fulfilled its organizational and monitoring duties before, during, and after the incident.
How can ISO 27001 help with the implementation of NIS 2 requirements?
An Information Security Management System (ISMS) based on the international standard ISO 27001 covers a large part of the requirements of Section 30 BSIG (new version) in a process-oriented manner. The standard is explicitly recommended by the legislator as an implementation aid.
Effective information security management offers management one thing above all: a reliable control instrument. The abstract duty of cybersecurity is translated into clear processes, responsibilities, and decision-making mechanisms.