Lack of Preparedness: UK Organizations at Risk as EU’s NIS2 Deadline Approaches

With just one year before the EU’s updated Network and Information Security Directive (NIS2) comes into force, a concerning lack of preparedness is evident among organizations in the UK, France, and Germany. NIS2 aims to address the rising cyber threats and increased reliance on digital systems, expanding its reach to encompass more industries and entities. This article explores the level of preparedness, specifically focusing on the unpreparedness in the UK, the significance of securing supply chains, potential penalties for non-compliance, the background of NIS2, its scope, compliance timelines, the importance of learning from past experiences with GDPR, and a call to action for organizations to prioritize cybersecurity preparation.

Lack of preparedness in the UK

Among the three countries surveyed, UK organizations show the lowest level of preparedness for NIS2 compliance. Shockingly, three quarters of UK organizations are yet to fully address the five key requirements for compliance outlined in NIS2. This concerning lack of readiness poses a significant risk to these organizations if they operate within the EU, necessitating immediate action to avoid potential penalties and reputational damage.

Supply chain security

According to Sailpoint’s findings, a staggering 80% of the UK organizations surveyed need to improve their supply chain security. The importance of securing supply chains cannot be understated, as they serve as potential entry points for cyber attacks and can jeopardize the overall network and information security of an organization. NIS2 places a strong emphasis on supply chain security, necessitating robust measures to protect against cyber threats.

Penalties for Non-Compliance

Failure to comply with NIS2 carries severe consequences. Organizations found in breach of the directive can face fines of up to €10 million ($10.5 million), or 2% of their global annual revenue. These penalties serve as a stark reminder of the financial repercussions associated with non-compliance. In addition to financial consequences, organizations not compliant with NIS2 risk reputational damage, loss of customer trust, and potential disruptions to their operations.

Background on NIS2

NIS2 is an updated version of the original NIS directive, which was passed in 2016 and became law in most EU member states in 2018. This update reflects the ever-increasing reliance on digital systems and addresses the evolving cyber threat landscape. NIS2 expands the scope of the directive to include a broader range of industries and entities, ensuring a more comprehensive approach to network and information security across the EU.

Scope of NIS2

NIS2 applies to organizations with over 250 employees and an annual turnover of €10 million or more. With these criteria, NIS2 encompasses a wide range of organizations, from small to large enterprises across various sectors. It is crucial for organizations falling within this scope to ensure they are compliant with NIS2 requirements to safeguard their networks, information, and overall cybersecurity posture.

Timeline for compliance

NIS2 was enacted in January 2023, signaling the start of the countdown for organizations to comply with its provisions. The deadline for member states to transpose NIS2 into their national laws is set for October 17, 2024. With just one year remaining, organizations must act swiftly and decisively to navigate the complexities of NIS2 requirements and align their cybersecurity practices accordingly.

Lessons from GDPR

The implementation of the General Data Protection Regulation (GDPR) in 2018 served as a valuable lesson for organizations preparing for NIS2 compliance. Many organizations struggled to meet GDPR requirements and faced significant challenges in protecting personal data adequately. It is crucial not to repeat these mistakes with NIS2. Organizations should leverage the lessons learned from GDPR to enhance their cybersecurity preparedness for NIS2 and avoid potential pitfalls.

As the deadline for the EU’s NIS2 looms, organizations in the UK, France, and Germany must urgently address their lack of preparedness for compliance. With significant fines and potential reputational damage at stake, organizations need to prioritize securing their supply chains, aligning with NIS2 requirements, and investing in robust cybersecurity practices. By learning from past experiences and taking decisive action, organizations can navigate the changing cybersecurity landscape effectively and protect themselves from emerging cyber threats. The time to act is now – don’t wait until it’s too late.

Explore more

How Is the New Wormable XMRig Malware Evolving?

The rapid transformation of cryptojacking from a minor background annoyance into a sophisticated, kernel-level security threat has forced global cybersecurity professionals to fundamentally rethink their entire defensive posture as the landscape continues to shift through 2026. While earlier versions of Monero-mining software were often content to quietly steal idle CPU cycles, the emergence of a new, wormable XMRig variant signals

AI-Driven Behavioral Intelligence – Review

The rapid proliferation of machine-learning-assisted malware has officially transformed the cybersecurity landscape into a high-stakes competition where static defense is no longer a viable strategy for survival. While traditional security measures once relied on a digital library of known threats to protect networks, the current environment demands a system capable of interpreting the intent behind a process rather than just

Trend Analysis: India AI Sovereignty and Evaluation Standards

While the global race to build the largest large language model often dominates technology headlines, a more subtle and arguably more consequential shift is occurring within the Indian subcontinent’s technological landscape. This transition marks a departure from the simple pursuit of “national champion” models toward a more sophisticated objective: the establishment of sovereign evaluation standards. As artificial intelligence becomes deeply

AI and Stolen Credentials Redefine Modern Enterprise Risk

The traditional castle-and-moat defense strategy has become an obsolete relic in an era where digital identities are the primary gateway for highly sophisticated global threat actors. Recent data suggests that enterprise risk has fundamentally transitioned from frequent but localized incidents toward high-impact disruptions that threaten the very fabric of systemic stability. This shift is punctuated by the emergence of identity

How Is AI Accelerating the Speed of Modern Cyberattacks?

Dominic Jainy brings a wealth of knowledge in artificial intelligence and blockchain to the table, offering a unique perspective on the modern threat landscape. As cybercriminals harness machine learning to automate exploitation, the gap between a vulnerability being discovered and a breach occurring is shrinking at an alarming rate. We sit down with him to discuss the shift toward identity-based