Cybersecurity and NIS2

The NIS2 Act is the Danish implementation of the EU NIS2 Directive and aims to Strengthen cybersecurity in companies that fulfil critical or important functions for society.

The law places increased demands on how companies handle IT security, including risk management, incident management and the implementation of appropriate technical and organisational security measures.

The NIS2 Act covers sectors such as energy, transport, healthcare, water supply and digital infrastructure, but also applies to certain IT and service providers. Covered organisations must be prepared to document their security efforts and may face audits and sanctions, including fines, for non-compliance.

The Danish Chamber of Commerce notes that an alarming 60 % of small and medium-sized enterprises (SMEs) affected by a data breach or cyberattack end up in bankruptcy. The grim statistics emphasise how fatal digital attacks can be for SMEs - not just technically, but as a real threat to business existence.

For your organisation, this means that cybersecurity is no longer just a technical task - it's a management responsibility and a business-critical priority

For the organisation, the NIS2 Act has several concrete consequences:

Extended scope of application

More business types and public authorities are now covered - especially those with critical societal importance or a certain level of size

Increased responsibility for management

Top management will have a clear legal responsibility to ensure robust security regulations and continuous follow-up on cybersecurity - also in OT environments

Stricter risk management requirements

Systematic risk assessments, network segmentation, incident management, supply chain security, etc. must be implemented, also in OT networks

Incident reporting requirements

Security incidents must be reported to the relevant authorities as soon as possible - with stricter time and content requirements

Stronger supervision and sanctions

Authorities will have increased powers to supervise, issue orders, sanctions or even suspend executives for non-compliance

In short, NIS2 means that the organisation must now work in a structured way with cybersecurity - both strategic, operational and technical. This is also true in industrial OT networks, where delayed updates or lack of monitoring can cause serious risks to operations and public safety.

Why are OT networks and NIS2 inseparable?

As industrial systems and OT environments increasingly integrate with IT networks, they have become an attractive target for cyber attacks.

The NIS2 law therefore has a special focus on OT security!

You can see the increased requirements on the right:

Are you covered by NIS2? Take the official test

The first step towards compliance is to determine if your organisation is covered by the directive. Take the NIS2 test and get answers in under two minutes:

Network segmentation and access control

For example. Using switches and firewalls to isolate OT networks

ICS-specific controls and continuous monitoring

Like intrusion detection, secure updating of IoT and ICS control systems

Zero Trust principles

Continuous verification and segmented access from OT providers and remote users

Supplier and supply chain management

Documentation and control that external providers follow equivalent security standards

In practice, this means upgrading your OT setup with equipment and procedures that support these requirements - and that's where our solutions come in.

We provide switches, firewalls and monitoring solutions that ensure your OT network meets the requirements of the NIS2 Act - but perhaps more importantly, that you protect your organisation from cyber attacks and the consequences that come with an attack.

Get an overview with our NIS2 checklist

Use our detailed checklist to determine if your OT network is NIS2 compliant. It guides you through all the important points:

  • Governance and management responsibilities
  • Network segmentation and access control
  • Monitoring, logging and incident response
  • Ongoing risk assessment and documentation

How to get started with cybersecurity in the production environment

Map your systems

Identify all OT devices and networks that control production and operational environments

Prioritise vulnerabilities

Focus on the components with the highest risk of cyberattacks

Implement security measures

Use segmentation, strong passwords and network monitoring

Practise incident response

Train your team to detect, report and respond to attacks

Maintain documentation

Document your work and update the checklist regularly

Why choose our solution?

  • Quick overview: Test if your business is covered
  • Practical guidance: Use our NIS2 checklist to get an overview and close security gaps
  • Continuously updated: We follow NIS2 legislation and audit the solutions


Start today - protect your operations, avoid fines and stand strong in the face of cyber attacks!

See a selection of our IEC 62443 certified switches here

Switches that strengthen cybersecurity!

Sign up for our newsletter

Keep up to date with the latest in industrial IT and components - sign up here.