Following the adoption of the NIS2 Implementation Act (Link only in German) - by the German Bundestag in mid-November, the European cybersecurity directive is now taking concrete shape in Germany. For many companies, this represents a significant change that is not immediately obvious.
What was once perceived as a vague European requirement is now being incorporated into national legislation. Once the final legislation takes effect, the requirements will become legally binding. Security levels and resilience are expected to rise noticeably, as are the threats posed by increasingly sophisticated cyberattacks. This puts companies at a critical turning point: the time has come to systematically implement the new requirements and understand that cybersecurity is an integral part of future business viability.
Who is affected by NIS2?
The law applies to 'essential' and 'important' entities in 18 critical and key sectors, including energy supply, transportation, healthcare, critical infrastructure, public administration, waste management and manufacturing. However, classification is not determined by sector alone. Companies with at least 50 employees or an annual turnover of at least 10 million euros often fall within the scope as well, as economic criteria also play a crucial role.
Consequently, the number of obligated organisations increases significantly. It is estimated that the directive affects more than 30,000 companies in Germany, including many that previously had little exposure to regulatory cybersecurity. One of the biggest challenges is that many companies recognise their own relevance late or underestimate its full implications, even though the requirements immediately impact processes, structures, and responsibilities.
How to determine whether your organisation is subject to NIS2
Before planning any concrete measures, organisations must first answer the following fundamental question: Are we affected by NIS2, and if so, to what extent? The first step is therefore to conduct a systematic impact assessment. Companies should examine which business areas may be classified as 'essential' or 'important', and which activities could be considered 'negligible'.
However, you should be careful: excluding certain activities does not automatically mean that no risks exist in those areas. Attackers do not care about legal definitions — they look for the easiest entry point. Overly generous interpretations or loosely defined exceptions can quickly create unexpected vulnerabilities.
