Skip to main content

NIS2 Directive: An Overview of EU Cyber-security Requirements

The binding EU directive on cybersecurity (NIS2) will come into effect this year on October 17 and applies to a wide range of industries. Find out if your company is affected and how the version control software octoplant can support you!

Register for webcast           Download NIS2 brochure


NIS2: The Future of Cybersecurity in the EU

The Network and Information Security (NIS2) directive is revolutionizing the security landscape. Here are its key features:

Icon Shield

Tightened Security Requirements

  • Enhanced supply chain security
  • Streamlining reporting obligations
  • Implementing tighter supervisory measures
Icon Hand Dollar

Harmonized Sanctions

  • Stricter enforcement rules
  • EU-wide harmonised sanctions not yet quantified



Icon User Shield

Risk Assessments and Multifactor Authentication

  • Integration of risk assessments
  • Implementation of multifactor authentication
  • Implementation of security procedures for employees with access to sensitive data
Icon Clipboard

Supply Chain Security and Incident Reporting

  • Creation of business continuity plans
  • Definition of reporting requirements in the event of security incidents
  • Management liability in case of non-compliance with cybersecurity requirements



Produktion Mitarbeiter

Entities and Companies Affected by NIS2

  1. Providers of Essential Services:
    Including energy, transportation, water, banking, financial market infrastructures, healthcare.
  2. Significant Digital Service Providers:
    Encompassing public administration, aerospace, research, postal services, waste management, mechanical engineering.
  3. Key Providers of Digital Services:
    Such as search engines, cloud computing services, online marketplaces.
  4. Manufacturing and Production of Goods:
    Including the automotive and medical device sectors production & processing of food, Pharmaceuticals.


Does NIS2 apply to your organization?

Let's assess the situation! The questionnaire from PwC Germany provides an initial way to determine whether your organization is affected by the directives.

Start the analysis



Online demo of SAP Connect

NIS2 Webcast: Stay Informed!

On May 14th, you'll have the opportunity to learn about the latest developments from cybersecurity expert Dr. Swantje Westpfahl. Gain insights and ask questions to a recognized expert in the field!


Register for the webcast



Measures to Be Taken According to NIS-2 Regulations

Icon User Lupe

Management Accountability

Company leadership is responsible for monitoring and participating in cybersecurity training. Violations may result in sanctions and temporary exclusion from
leadership roles.

Icon Clipboard

Business Continuity Plan

Companies need plans for handling major cyber incidents, including system recovery, emergency procedures, and the establishment of a crisis response team.


Icon Report

Reporting Obligations

Essential and significant entities must have procedures for promptly reporting security incidents that have significant impacts on their service provision or recipients.

Icon Sirene

Risk Management

  • Incident management
  • Enhanced supply chain security
  • Improved network security
  • Better access control
  • Data encryption



Dr. Antje Westpfahl

Expert Webcast

Do you have questions about the NIS2 Directive and its implementation? On May 14, Dr. Swantje Westpfahl, a recognized expert in cybersecurity, will provide valuable insights into the meaning and implementation of the NIS-2 Directive. Don't miss this opportunity to ask your questions and benefit from her expertise!

Register for the webcast now






How octoplant Enhances Cybersecurity

The new EU directive aims to protect IT and OT systems from cyberattacks by increasing the resilience of these systems. The version control software octoplant can assist you in meeting the requirements and ensuring that your IT and OT infrastructure complies with the required standards.

Asset Management

  • octoplant provides a comprehensive change history, detailing exactly what changes were made by whom, when, and why.
  • Automated notifications for unintended alterations enable the early detection and resolution of potential security risks.
  • Granular access management ensures that only authorized personnel can make changes to the respective devices.
Octoplant ASC Risk Bewertung

Risk and Vulnerability Management

  • octoplant monitors assets and automatically notifies companies of vulnerabilities and risks by matching them against Common Vulnerabilities and Exposures (CVEs)
  • A separate risk score for each asset highlights potential threats
  • Additional preventive features, such as change and vulnerability detection, actively help prevent outages
Zurcüksetzen eines früheren Backups auf Knopfdruck

Business Continuity Management

  • octoplant provides version control and automated backups for all operational technology devices, ensuring fast recovery of critical programs and data at all times.
  • This reduces downtime by an average of 13 hours per year.










You might also be interested in

Online demo of SAP Connect

Join our Webcast on NIS2

Stay on top of the latest developments in cybersecurity. Register now for our webcast and gain insights from a leading expert.


Register now for the webcast