top of page
CyberBackgroundBlue_min.png

Cyber Blog

Writer's pictureColin Mc Hugo

NIS, NIS 2.0 & DORA - What a CISO Needs to Know




In the evolving landscape of cybersecurity legislation within the European Union, two critical directives—NIS 2.0 and DORA—have emerged, significantly impacting how organizations manage their cybersecurity posture. This blog will break down the differences between NIS 1.0, NIS 2.0, and DORA, explore the consequences of non-compliance, and provide actionable steps for Chief Information Security Officers (CISOs) to ensure their organizations are prepared.

NIS 1.0 vs. NIS 2.0

NIS 1.0

  • Adoption: Established in 2016, NIS 1.0 aimed to enhance cybersecurity across critical infrastructure sectors.

  • Scope: Focused on essential services such as energy, transport, and banking.

  • Requirements: Mandated national cybersecurity strategies and incident reporting but lacked uniformity in implementation across member states.

NIS 2.0

  • Adoption: NIS 2.0 was adopted in late 2022, with full implementation expected by October 2024.

  • Expanded Scope: Broadens the sectors affected, now including areas like wastewater management and space.

  • Stricter Requirements: Introduces enhanced risk management measures, including supply chain security and incident reporting timelines (24 hours for significant incidents).

  • Penalties: Non-compliance can result in fines up to €10 million or 2% of global annual turnover for essential entities, and €7 million or 1.4% for important entities.

Overview of DORA

TheDigital Operational Resilience Act (DORA)focuses on the financial sector and aims to ensure that financial entities can withstand and recover from ICT disruptions.

Key Components of DORA

  • Risk Management: Requires financial entities to implement robust ICT risk management frameworks.

  • Incident Reporting: Mandates timely reporting of significant incidents.

  • Operational Resilience Testing: Institutions must conduct regular resilience tests and assessments.

  • Third-Party Risk Management: Requires oversight of third-party service providers to ensure their operational resilience.

Consequences of Non-Compliance

Failure to comply with NIS 2.0 and DORA can have severe repercussions:

  • Financial Penalties: Organizations may face hefty fines, which can significantly impact financial health and brand reputation. For instance, fines under NIS 2.0 can reach €10 million, while DORA penalties can also be substantial, potentially up to 5% of total annual turnover.

  • Legal Accountability: Upper management may face personal liability for non-compliance, including removal from managerial positions, depending on local laws.

  • Operational Disruption: Non-compliance can lead to increased vulnerability to cyberattacks, resulting in operational disruptions that can affect service delivery and customer trust.

What a CISO Needs to Do and By When

To navigate the complexities of NIS 2.0 and DORA, CISOs should take the following actions:

Immediate Actions (By October 2024 for NIS 2.0)

  1. Conduct a Compliance Gap Analysis:

    • Assess current cybersecurity practices against NIS 2.0 and DORA requirements.

    • Identify areas needing improvement, especially in risk management and incident response.

  2. Develop Risk Management Frameworks:

    • Implement comprehensive risk management strategies that align with both NIS 2.0 and DORA.

    • Ensure policies cover incident handling, supply chain security, and crisis management.

  3. Establish Incident Reporting Protocols:

    • Create clear processes for reporting incidents within the 24-hour timeline mandated by NIS 2.0.

    • Train staff on incident classification and reporting procedures.

Longer-Term Actions (By January 2025 for DORA)

  1. Implement Regular Testing and Drills:

    • Schedule periodic resilience testing, including penetration tests and vulnerability assessments.

    • Use insights from testing to refine security measures and incident response plans.

  2. Strengthen Third-Party Risk Management:

    • Develop criteria for evaluating and monitoring third-party service providers.

    • Ensure contracts include compliance with NIS and DORA requirements.

  3. Foster a Culture of Information Sharing:

    • Engage in industry forums to share insights on threats and vulnerabilities.

    • Collaborate with other organizations to enhance collective cybersecurity efforts.

Impact on NIST Framework Implementation

Integrating the NIST Cybersecurity Framework (CSF) with NIS 2.0 and DORA can enhance organizational resilience. The NIST CSF's core functions—Identify, Protect, Detect, Respond, and Recover—align well with the requirements of both directives.

Integration Strategies

  • Identify: Use NIST's risk assessment tools to identify and prioritize risks in line with NIS and DORA requirements.

  • Protect: Develop protective measures that meet the specific security standards set by DORA.

  • Detect: Implement continuous monitoring solutions that align with incident detection requirements.

  • Respond: Establish incident response plans that comply with reporting timelines mandated by NIS 2.0 and DORA.

  • Recover: Ensure recovery strategies are robust and tested regularly, as required by DORA.

By proactively addressing these compliance requirements, CISOs can not only safeguard their organizations against potential penalties and operational disruptions but also enhance their overall cybersecurity posture in an increasingly complex regulatory environment.

1 view0 comments

Comments


bottom of page