The evolving cybersecurity landscape
In today’s interconnected world, supply chains have become increasingly complex and digitized, enhancing efficiency but also exposing organisations to a myriad of cyber threats. Cybercriminals are no longer just targeting individual companies; they are exploiting vulnerabilities across entire supply networks, causing disruptions that ripple through industries and economies.
Recognising the escalating cyber risks, the European Union has introduced the NIS2 Directive – a comprehensive legislative framework aimed at strengthening cybersecurity across critical sectors. Building upon the original NIS Directive, NIS2 expands its scope and imposes stricter security requirements to address the evolving threat landscape.
For TAPA EMEA members, understanding and aligning with NIS2 is not just about regulatory compliance; it is about safeguarding operations, protecting assets, and ensuring the resilience of the supply chain. By proactively adopting robust cybersecurity measures, organisations can mitigate risks, maintain stakeholder trust, and contribute to a more secure and resilient digital ecosystem.
Understanding NIS2: A brief overview
The Network and Information Security Directive 2 (NIS2), formally known as Directive 2022/2555, represents the European Union’s comprehensive effort to enhance cybersecurity across its Member States. Building upon the foundations of the original NIS Directive (NIS1), NIS2 introduces more stringent requirements and a broader scope to address the evolving landscape of cyber threats.
Key objectives of NIS2
NIS2 aims to establish a high common level of cybersecurity across the EU by:
Member States were required to transpose NIS2 into national law by October 17, 2024.
Applicability: Who needs to comply?
NIS2 applies to entities classified as either “Essential” or “Important,” based on the criticality of the sector and the size of the organisation.
Essential Entities
These include organisations in sectors such as:
Important Entities
These encompass sectors like:
In principle, NIS2 applies to medium and large enterprises, defined as organisations with:
However, certain entities are subject to NIS2 regardless of size, including providers of publicly available electronic communications services, trust service providers, and DNS service providers.
Key requirements of NIS2
The NIS2 Directive outlines a set of minimum cybersecurity requirements that all in-scope organistions must implement to reduce their exposure to cyber threats and improve collective resilience across the European Union. These requirements are not one-size-fits-all – they must be applied in a risk-based, proportional manner according to the size, sector, and specific risk profile of the entity.
Below is a deeper look into the core components that organisations need to focus on:
Risk management measures
At the heart of NIS2 lies the expectation that cybersecurity must be a proactive, continuous process – not a reactive afterthought. Organisations must:
Incident handling and reporting
Timely incident management is a cornerstone of NIS2. The Directive mandates a structured, multi-step reporting process:
There might be a request from the competent authority also to submit interim(s) progress reports.
A final report is required within one-month, documenting root cause analysis, remediation actions, and lessons learned.
Beyond regulatory compliance, a well-practiced incident response plan is essential to minimise operational disruption and reputational damage.
Supply chain and third-party risk management
NIS2 explicitly acknowledges that a chain is only as strong as its weakest link. Organisations must:
This requirement forces organisations to shift from focusing solely on internal systems to securing the full digital and operational ecosystem.
Business continuity and crisis management
Cyberattacks do not just steal data – they disrupt services. NIS2 requires that entities:
Resilience is not just about surviving the attack – it’s about resuming operations quickly and with minimal disruption.
Governance, accountability, and leadership responsibility
NIS2 establishes clear expectations that cybersecurity is a board-level issue, not just an IT concern. This includes:
This shift ensures that cybersecurity becomes an integral part of organisational culture and leadership accountability.
These requirements represent a modern, comprehensive approach to cyber resilience. They reinforce that cyber security must be treated as a strategic function—built into operations, not bolted on after the fact. TAPA members, particularly those in transport, logistics, and digital infrastructure, are well-positioned to act now by integrating these principles through existing frameworks like the TAPA Cyber Security Standard (CSS), creating a direct path to NIS2 readiness.
Leveraging TAPA CSS for NIS2 compliance
TAPA’s Cyber Security Standard (CSS) serves as a practical framework that aligns closely with the requirements of the NIS2 Directive, offering organisations a structured approach to enhance their cybersecurity posture. TAPA CSS provides organisations with a systematic, well-structured approach to cybersecurity management, offering practical guidelines and specific controls that can be strategically deployed to strengthen digital defences across various operational domains, and simultaneously supporting the organisations in their effort to align with the NIS2 requirements.
Risk management and information security policies
NIS2 mandates that organisations implement comprehensive risk management measures and establish robust information security policies. CSS addresses this by requiring entities to conduct regular risk assessments and develop policies that safeguard sensitive data, ensuring the integrity, availability, and confidentiality of information within the supply chain. NIS2 establishes clear regulatory requirements that mandate organisations to develop and maintain extensive, thorough risk management frameworks and protocols. Additionally, it mandates the creation and implementation of comprehensive information security policies designed to protect critical systems and data.
In response to these regulatory demands, CSS provides a structured approach that fully addresses these requirements through specific, actionable guidelines. Under the CSS framework, organisations are required to perform systematic, documented risk assessments on a regularly scheduled basis. These assessments must identify potential vulnerabilities, evaluate the likelihood and potential impact of various threat scenarios, and prioritise remediation efforts based on risk severity. This methodical approach to risk management is in alignment with NIS2 expectations for proactive threat identification and mitigation planning.
Incident Handling and Reporting
The NIS2 Directive establishes stringent requirements for organisations regarding cybersecurity incident management, specifically mandating the implementation of comprehensive incident handling protocols and formal reporting mechanisms.
These requirements necessitate that entities develop and maintain well-documented procedures for detecting, analysing, containing, and remediating security incidents across their digital infrastructure. Additionally, NIS2 imposes a legal obligation for organisations to promptly notify designated regulatory authorities when significant cybersecurity incidents occur, ensuring proper oversight and coordinated response to potential threats.
On the other hand, CSS requires organisations to develop, document, and regularly test formal incident response plans that encompass the entire incident lifecycle. These plans must include specific procedures for the timely identification of security events through monitoring systems and anomaly detection mechanisms, systematic analysis of potential incidents to determine scope and severity, immediate containment strategies to limit potential damage, and thorough remediation processes to restore normal operations.
Supply chain security
Related to supply chain security, the NIS2 Directive places substantial emphasis on the critical importance of establishing and maintaining comprehensive security measures throughout the entire supply chain ecosystem. This regulatory framework requires organisations to implement structured, methodical approaches for identifying, evaluating, and actively managing the diverse range of risks that may emerge from relationships with third-party suppliers, vendors, service providers, and other external entities that have access to critical systems, infrastructure, or sensitive data.
On this specific topic, CSS provides a highly compatible and comprehensive framework that directly addresses these supply chain security mandates through its detailed specifications and structured methodology. The standard establishes clear, actionable requirements for organisations to conduct thorough, documented vendor risk assessments before establishing business relationships and on a recurring basis throughout the engagement lifecycle.
Business continuity and crisis management
In the Business Continuity and Crisis Management areas, the NIS2 Directive establishes critical regulatory requirements focused on ensuring organisational resilience and operational continuity in the face of cybersecurity incidents and other disruptive events. This framework mandates that organisations develop robust strategies and documented procedures to maintain essential business functions during crisis situations, facilitate rapid recovery following incidents, and minimise potential operational disruptions that could impact critical services or infrastructure.
Here, CSS offers a comprehensive framework that directly addresses all these business continuity and crisis management requirements through detailed specifications and structured methodologies. The standard mandates that organisations develop, implement, and regularly test formal business continuity plans that identify critical business processes, establish recovery time objectives, define resource requirements, and outline specific procedures for maintaining operational continuity during various disruption scenarios.
Governance and accountability
The NIS2 Directive establishes a clear regulatory framework that explicitly places the ultimate responsibility and accountability for cybersecurity compliance directly on the management bodies and senior leadership of organisations. This approach recognises that effective cybersecurity requires commitment and engagement from the highest levels of organisational hierarchy, with executive leadership bearing specific legal obligations for ensuring appropriate security measures are implemented and maintained. The directive mandates that senior management must be actively involved in approving cybersecurity strategies, allocating sufficient resources, and establishing clear lines of accountability throughout the organisation.
In the same concept, CSS provides a comprehensive governance framework that directly supports and reinforces these accountability requirements through detailed specifications for organisational security governance structures and leadership responsibilities. The Standard requires the establishment of formal governance mechanisms where executive leadership demonstrates visible commitment to cybersecurity through documented policies, strategic decision-making, and regular oversight activities. These governance structures must include designated security leadership roles with clearly defined responsibilities, authorities, and reporting relationships that ensure security considerations are integrated into business planning and operational decisions.
Actionable steps for TAPA members
Understanding the NIS2 Directive is only the first step. The real challenge – and opportunity in this case – lies in implementation. While many TAPA members may already have foundational security practices in place, aligning with NIS2 requires refining and formalising them into a cohesive, risk-driven cybersecurity management system.
Here are five pragmatic steps TAPA members can take now to move from awareness to action:
Perform a targeted applicability assessment
Before committing resources, organisations must determine with certainty whether NIS2 applies to them – and in what capacity.
Map current controls to NIS2 requirements
Conduct an internal review of your existing cybersecurity and risk management practices, focusing on:
This exercise should help identify what is already aligned and where meaningful gaps remain – not only in documentation, but in operational execution.
Design a Prioritised Implementation Roadmap
Once gaps are identified, do not try to fix everything at once. Instead, create a phased improvement plan:
Engage the broader organisation
Cybersecurity cannot succeed in isolation. To build an organisation-wide security culture:
Adopt the TAPA CSS as a strategic anchor
Rather than creating a compliance system from scratch, leverage the CSS as a recognised baseline for:
The CSS offers a sector-relevant approach that reduces complexity and increases internal alignment.
Conclusion: Building resilient supply chains through strategic action
The clock is ticking. With NIS2 transposition into national law overdue since October 17, 2024, organisations across Europe must move beyond awareness and into action. Some countries have already aligned their national legislation to the Directive whereas most of the remaining countries are close to finalising legislative compliance.
Next, we present the 10 guiding rules for good preparation of your organisation in relation to meeting the requirements of the NIS2:
The question is not: “Will we be affected?” – the question is “Are we ready?”
For those who act now, using CSS as a launchpad, NIS2 is not a burden – it is a catalyst for long-term value.
Resources and further reading…
TAPA CSS 2025 Standard
NIS2 Directive Overview
NIS2 Directive Documents
ENISA Implementation Guidance
NIS2: Where do European Countries Stand on Implementing Cybersecurity Strategies?
For further assistance, TAPA members are encouraged to contact the TAPA Standards Team a standards@tapaemea.org