Companies in many sectors supply to larger companies that fall under the NIS2. Many companies will face the challenge of getting their digital security in order next year. The question for many companies is no longer whether, but how quickly they will start the implementation, because time is of the essence.
The implementation date of the NIS2 Directive is likely to be set at 1 July 2025, although this has not yet been officially confirmed. It is expected that the law will enter into force around the second or third quarter of 2025, with 1 July being the most logical date.
Include NIS2 in your 2025 budget
Many companies are already working on their 2025 budgets, and including NIS2 projects in these is essential. Most organizations still have one to two months to complete these budgets, and not including the necessary resources for NIS2 compliance could have serious consequences for their competitive position. Falling behind neighboring countries such as Belgium and Germany, which started implementation earlier, would be detrimental to Dutch companies. Belgium has already started and Germany is expected to follow in early 2025. The average implementation time for NIS2 projects is between six and nine months. This means that companies must act quickly to meet the deadline.
Why start now?
The NIS2 legislation makes large companies responsible not only for their own cybersecurity, but also for the security of their suppliers. This chain responsibility makes it necessary to work together and ensure that suppliers also comply with the NIS2 standards. For many companies, it is essential to organize this process well. Samen Digitaal Veilig is the platform of your industry organization with support, checklists and webinars to help companies on their way.
Companies are encouraged to start taking the first steps now, such as conducting a risk assessment and engaging their IT suppliers. Achieving the NIS2 Quality Mark is a way to demonstrate that a company meets the required standards and is ready for the future. This standard is particularly useful for companies that want to demonstrate that their cybersecurity is in order without having to work through the complexity of ISO standards.