Cybersecurity and NIS2
Industrial IT & IIoT / Cybersecurity and NIS2
The NIS2 Act is the Danish implementation of the EU NIS2 Directive and aims to Strengthen cybersecurity in companies that fulfil critical or important functions for society.
The law places increased demands on how companies handle IT security, including risk management, incident management and the implementation of appropriate technical and organisational security measures.
The NIS2 Act covers sectors such as energy, transport, healthcare, water supply and digital infrastructure, but also applies to certain IT and service providers. Covered organisations must be prepared to document their security efforts and may face audits and sanctions, including fines, for non-compliance.
The Danish Chamber of Commerce notes that an alarming 60 % of small and medium-sized enterprises (SMEs) affected by a data breach or cyberattack end up in bankruptcy. The grim statistics emphasise how fatal digital attacks can be for SMEs - not just technically, but as a real threat to business existence.
For your organisation, this means that cybersecurity is no longer just a technical task - it's a management responsibility and a business-critical priority
For the organisation, the NIS2 Act has several concrete consequences:
Extended scope of application
More business types and public authorities are now covered - especially those with critical societal importance or a certain level of size
Increased responsibility for management
Top management will have a clear legal responsibility to ensure robust security regulations and continuous follow-up on cybersecurity - also in OT environments
Stricter risk management requirements
Systematic risk assessments, network segmentation, incident management, supply chain security, etc. must be implemented, also in OT networks
Incident reporting requirements
Security incidents must be reported to the relevant authorities as soon as possible - with stricter time and content requirements
Stronger supervision and sanctions
Authorities will have increased powers to supervise, issue orders, sanctions or even suspend executives for non-compliance
In short, NIS2 means that the organisation must now work in a structured way with cybersecurity - both strategic, operational and technical. This is also true in industrial OT networks, where delayed updates or lack of monitoring can cause serious risks to operations and public safety.
Why are OT networks and NIS2 inseparable?
As industrial systems and OT environments increasingly integrate with IT networks, they have become an attractive target for cyber attacks.
The NIS2 law therefore has a special focus on OT security!
You can see the increased requirements on the right:
Are you covered by NIS2? Take the official test
The first step towards compliance is to determine if your organisation is covered by the directive. Take the NIS2 test and get answers in under two minutes:
For example. Using switches and firewalls to isolate OT networks
Like intrusion detection, secure updating of IoT and ICS control systems
Continuous verification and segmented access from OT providers and remote users
Documentation and control that external providers follow equivalent security standards
In practice, this means upgrading your OT setup with equipment and procedures that support these requirements - and that's where our solutions come in.
We provide switches, firewalls and monitoring solutions that ensure your OT network meets the requirements of the NIS2 Act - but perhaps more importantly, that you protect your organisation from cyber attacks and the consequences that come with an attack.

Get an overview with our NIS2 checklist
Use our detailed checklist to determine if your OT network is NIS2 compliant. It guides you through all the important points:
- Governance and management responsibilities
- Network segmentation and access control
- Monitoring, logging and incident response
- Ongoing risk assessment and documentation
How to get started with cybersecurity in the production environment
Map your systems
Identify all OT devices and networks that control production and operational environments
Prioritise vulnerabilities
Focus on the components with the highest risk of cyberattacks
Implement security measures
Use segmentation, strong passwords and network monitoring
Practise incident response
Train your team to detect, report and respond to attacks
Maintain documentation
Document your work and update the checklist regularly
Why choose our solution?
- Quick overview: Test if your business is covered
- Practical guidance: Use our NIS2 checklist to get an overview and close security gaps
- Continuously updated: We follow NIS2 legislation and audit the solutions
Start today - protect your operations, avoid fines and stand strong in the face of cyber attacks!
See a selection of our IEC 62443 certified switches here
Switches that strengthen cybersecurity!
