Around 30,000 companies in Germany will fall under the NIS 2 regulation. The legal obligations will apply from the date the implementing law comes into force – expected to be early 2026. We can help you identify risks at an early stage, close security gaps, and ensure your management is legally compliant.

NIS-2 Impact Assessment
⚠️ Important Notice
The NIS-2 impact assessment serves as an automated guidance tool based on self-reported information, and its result is not legally binding. The NIS-2 impact assessment does not replace the self-identification review and has no evidential value for any proceedings.
NIS-2 Compliance Dashboard
Interactive Guide to the 5 Core Requirements in Germany
Management Responsibility
Management is personally liable. They must approve cybersecurity measures, monitor their implementation, and undergo training themselves.
Governance & Integration
Cybersecurity must become an integral part of corporate governance and operational processes.
Control System (ISMS)
An ISMS according to ISO 27001 (or equivalent) is the central bridge between strategy and implementation.
Technical Measures
Standard measures such as access control, logging, authentication, monitoring, and encryption are mandatory.
Reporting Obligation & Registration
Security incidents must be reported within 24 hours, including a complete report after 72 hours at the latest. Companies must register with BSI – deadline: 3 months after entry into force.
What happens if you do nothing?
The legal and financial consequences of non-compliance with the new regulations
No Transition Period
Obligations apply immediately upon entry into force of the law
Dual Supervision
Ex-ante and ex-post supervision by competent authorities
Significant Penalties
Up to €10 million or 2% of annual revenue for essential entities
Personal Liability
Management is personally liable for compliance
Our 5-Step Roadmap
Assess Impact & Register with BSI
Systematically determine whether and to what extent your company falls under the new regulation. Complete the necessary registration with the competent authority.
Structure Governance & Establish Accountability
Establish clear responsibilities and robust governance structures for cybersecurity at all organizational levels.
Implement or Expand ISMS according to ISO 27001
Implement a certified Information Security Management System or expand your existing system according to requirements.
Adapt Technology & Processes – Including Supply Chain
Adapt technical systems and business processes to new requirements and integrate supply chain security into your strategy.
Prepare Incident Response & Audits
Develop effective incident response procedures and systematically prepare for regular audits and regulatory inspections.
Our Services
Status and gap analysis including BSI-compliant report
Implementation or adaptation of ISMS (ISO 27001, C5)
Management training & awareness campaigns
Technical implementation (IAM, monitoring, logging, SBOM)
Development of reporting and escalation processes
Assessment & audit preparation
Operational support for implementation & control
