Four people are seated at a table, listening to a speaker in a conference room with a presentation screen.

NIS2 Directive for Swiss Companies

Franco T.,

Jan 10, 2026

Too Long; Didn't Read

- NIS2 affects more companies than expected: critical infrastructure + key sectors (50+ employees or 10M+ revenue) - October 2024 was the deadline: EU member states had to implement the directive – enforcement comes in 2026 - Swiss companies are also affected: those operating in the EU or serving EU customers must comply - Management is personally liable: this is new – the executive board can no longer delegate and overlook

Eine Silhouette einer Person interagiert mit farbenfrohen, abstrakten Grafiken und Formen, die von Technologie inspiriert sind.

Another EU Regulation... really now?

I know. You're probably thinking: “Yet another new compliance requirement. Didn't we just digest GDPR?”

And yes... NIS2 is another one of those EU things. More paperwork, more new processes, more budget that was actually meant for innovation.

But here's the difference: NIS2 is not just another checkbox exercise. The directive aims to create real cybersecurity resilience. And for Swiss companies – even if we're not in the EU – there's no way to ignore it.

Why? Because if you do business in the EU, if you have EU customers, if your supply chain includes EU companies... then you're right in the middle. EU regulation has a funny way of spilling over Swiss borders.

Let's demystify it. Without legal jargon. Without scaremongering. Just practical: What is NIS2, who does it really affect, and how do you implement it without spending the next two years solely on it?

What is NIS2 exactly?

NIS2 stands for “Network and Information Security Directive 2” – the second version of the EU directive on network and information security.

The first NIS directive came in 2016 and... well, was a bit toothless. Too vague requirements, too few companies affected, little enforcement. The EU realized: That's not enough.

So NIS2 came. Adopted at the end of 2022, with implementation due by October 2024 for EU member states.

What's different?

First: The scope has been massively expanded. Where the old NIS directive only affected a handful of sectors (energy, health, transport), NIS2 now covers 18 sectors. Yes, eighteen.

Second: The requirements are much more specific. No more “you should maybe think about cybersecurity”, but clear guidelines on risk management, incident response, supply chain security, etc.

Third: The penalties have real teeth. Up to 10 million euros or 2% of the global annual revenue. And – this is new – personal liability for management.

And for Swiss companies?

Here's where it gets interesting. Switzerland is not in the EU. We are not obliged to adopt EU directives 1:1.

But (and this is a big but)...

If your company:

  • Has subsidiaries in the EU

  • Provides critical services for EU customers

  • Is part of the supply chain of EU companies

  • Operates in the EU (even partially)

...then you can't ignore NIS2. Your EU partners will demand proof of compliance. Contracts will include NIS2 clauses. And Swiss authorities are paying close attention to how EU standards develop.

We see this with GDPR – many Swiss companies practically had to become GDPR compliant, even if the Swiss Data Protection Act (DPA) was of a slightly different nature.

It will be similar for NIS2.

Does NIS2 affect your company?

The most important question first: Are you even affected?

NIS2 distinguishes between two categories:

1. Essential Entities (Essential Entities)

These are the “critical” sectors:

  • Energy: Electricity, gas, oil, district heating, hydrogen

  • Transport: Aviation, rail, shipping, road transport

  • Banking & Financial Market Infrastructure

  • Healthcare: Hospitals, laboratories, research institutions, pharma

  • Drinking Water & Wastewater

  • Digital Infrastructure: Internet exchange points, DNS providers, TLD registries, cloud services, data centers

  • Space: Yes, satellite operators.

  • Public Administration (only at central level)

2. Important Entities (Important Entities)

The expanded network:

  • Postal and Courier Services

  • Waste Management

  • Chemical Production & Distribution

  • Food Production & Distribution

  • Manufacturing: Medical devices, computers/electronics, machinery, vehicles

  • Digital Services: Online marketplaces, search engines, social media platforms, B2B SaaS

  • Research Organizations

Sounds broad, right? That's intentional. The EU wanted to cover all areas that could seriously disrupt the economy or society in the event of a cyberattack.

The Size Thresholds

Not every small startup is affected. There are thresholds:

You are affected if you have:

  • 50 or more employees, OR

  • More than 10 million euros in annual revenue

There are exemptions for smaller companies in certain sectors… but if you are in a critical area, you're probably not getting around it.

The Swiss Self-Assessment Check

Okay, practically. Answer these questions:

1. Sector Check:

  • [ ] Is my company active in one of the 18 NIS2 sectors?

  • [ ] Do I operate critical infrastructure (energy, transport, health, etc.)?

  • [ ] Do I offer digital services (cloud, SaaS, data center)?

2. Size Check:

  • [ ] Do I have 50+ employees?

  • [ ] Does my annual revenue exceed 10 million euros?

3. EU Exposure Check:

  • [ ] Do I have branches or subsidiaries in the EU?

  • [ ] Are my customers EU companies in regulated sectors?

  • [ ] Am I part of the supply chain of NIS2-mandated companies?

  • [ ] Do I process data from EU citizens or companies?

If you answer at least one question per category with “Yes”... welcome to the NIS2 club.

The Gray Zone: Swiss Peculiarities

This is where it gets complicated. Switzerland will likely develop its own cybersecurity law (similar to how we have our DPA instead of GDPR).

So even if you are purely focused on the Swiss market: The direction is clear. Cybersecurity minimum standards are coming. Becoming NIS2-compliant is also a good preparation for purely Swiss companies.

The 10 Key NIS2 Requirements

Now it gets concrete. What does NIS2 actually require from you?

Here are the ten core requirements, without legal jargon:

1. Risk Management (Risk Management)

What it means: You need to systematically identify, assess, and manage your cyber risks.

In practice:

  • Regular risk analyses (at least annually, better quarterly)

  • Documented risk assessment methodology

  • Prioritization by criticality

  • Action plan for risk reduction

This is not new... but NIS2 requires that you document and prove it.

The Reality Check: Most companies do informal risk analyses (“Yes, we know our HR system is outdated”). NIS2 wants formal processes.

2. Incident Response (24-hour Reporting Obligation!)

What it means: You must report cybersecurity incidents within 24 hours. To the competent authority (in EU countries the CSIRT – Computer Security Incident Response Team).

In practice:

  • Incident response plan must exist

  • Clear escalation paths

  • 24h initial detection and reporting to authority

  • 72h interim report

  • 30-day final report

The Reality Check: Many companies discover breaches only after weeks or months. NIS2 says: You have 24 hours. That is... ambitious. But achievable with the right monitoring tools.

For Swiss companies: Switzerland currently has no 24-hour reporting obligation. But if you serve EU customers, you must adhere to their rules.

3. Business Continuity & Disaster Recovery

What it means: You need a plan on how to resume operations after a cyberattack.

In practice:

  • Business Continuity Plan (BCP)

  • Disaster Recovery Plan (DRP)

  • Backup strategy (and regular tests!)

  • Defined Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO)

The Reality Check: “We have backups” is not enough. You need to show that you can also restore them. And how long it takes.

We often see: Companies have backups. But the restore procedure was never tested. Or the backups are encrypted... but the decryption key is on the system that was just encrypted. Oops.

4. Supply Chain Security (Supply Chain Risks)

What it means: You are responsible for the cybersecurity of your suppliers and service providers.

In practice:

  • Security assessment of your critical suppliers

  • Contractual security requirements

  • Monitoring and audits

  • Incident-notification clauses

The Reality Check: This is tough. You can't audit every supplier. But you must identify the critical ones and know their security level.

The SolarWinds attack in 2020 showed: Your weakest link is often not in your house, but in the supply chain.

5. Network Security (Network Security)

What it means: You must protect your network. Sounds mundane, but NIS2 is specific:

In practice:

  • Segmentation (Zero Trust approach)

  • Firewalls and Intrusion Detection/Prevention

  • VPN for remote access

  • Network monitoring

Interesting post for that: Zero Trust - Where Do I Actually Start?

The Reality Check: Many companies have “flat networks” – everything can communicate with everything. That's the opposite of what NIS2 wants.

Micro-segmentation is the gold standard. Yes, it's complex. But a ransomware incident is more complex.

6. Access Control (Access Control)

What it means: Only authorized persons may access critical systems.

In practice:

  • Multi-factor authentication (MFA) everywhere

  • Least privilege principle (minimal rights)

  • Regular access reviews

  • Strong password policies

  • Privileged Access Management (PAM) for admin accounts

The Reality Check: MFA is not optional in 2025. Period.

And no, SMS-based MFA is not good enough. Authenticator apps or hardware tokens.

7. Cryptography & Encryption

What it means: Data must be encrypted. In transit and at rest.

In practice:

  • TLS 1.3 for all connections

  • Encrypted databases

  • Encrypted backups

  • Key management (who has access to encryption keys?)

The Reality Check: “Our data is in the cloud, it's safe” – no. You must control who has the encryption keys.

8. Employee Training (Security Awareness)

What it means: Your employees must be regularly trained in cybersecurity.

In practice:

  • Annual security awareness training (minimum)

  • Phishing simulations

  • Incident reporting training

  • Role-specific training (e.g. for developers, admins)

The Reality Check: The most annoying compliance training in the world. But also the most important. 90% of breaches start with phishing or social engineering.

9. Security Tests & Audits

What it means: You must regularly test whether your security measures work.

In practice:

  • Vulnerability scans (monthly or quarterly)

  • Penetration tests (annually, after major changes)

  • Security audits (internal or external)

  • Code reviews (for software development)

The Reality Check: “We've never had an attack, so we're safe” is no longer an argument.

10. Management Responsibility & Governance

What it means: The executive management is responsible. Not IT. Not the CISO. The C-suite.

In practice:

  • Management must approve and oversee cybersecurity measures

  • Regular reporting to the board/management

  • Budget responsibility

  • Personal liability for gross negligence

The Reality Check: This is the game changer. Previously, management could say “IT topic, take care of it”. Not anymore.

NIS2 makes cybersecurity a top priority. And with personal liability. That has drawn attention... to say the least.

Blog post: CISO-as-a-Service – Leadership in Cybersecurity When It Matters


The NIS2 Implementation Roadmap

Okay. You now know what NIS2 wants. How do you implement it without spending the next two years solely on it?

Here's our proven approach. No theory – this is what we do with clients.

Phase 1: Gap Analysis (4-6 weeks)

Goal: Understand where you stand vs. where you need to be.

What happens:

  • Scope Definition: Which systems, processes, data are NIS2-relevant?

  • Current State: Documentation of current security measures

  • Desired State: Mapping to NIS2 requirements

  • Gap Identification: What's missing? What needs to be improved?

  • Risk Assessment: Which gaps are critical?

Output: Gap analysis report with prioritized action areas.

The Reality Check: Most companies are at 40-60% compliance. That's normal. No one starts from scratch. But no one is “accidentally” NIS2-compliant either.

Phase 2: Roadmap & Prioritization (2-3 weeks)

Goal: Realistic implementation planning with business buy-in.

What happens:

  • Identify Quick Wins: What can we implement in 4-8 weeks?

  • Medium and Long-term Planning: What takes 6-12 months?

  • Resources & Budget: What does it really cost?

  • Risk vs. Effort: Where do we invest first?

  • Executive Buy-In: Presentation and approval

Output: 12-18 months roadmap with milestones, budget, resources.

The Reality Check: NIS2 compliance is not a 3-month project. Count on 12-18 months for full implementation. But after 3-6 months, you should have closed the most critical gaps.

Phase 3: Implementation (6-12 months)

Goal: Implement measures. Document. Test.

The phases within implementation:

Month 1-3: Quick Wins & Foundations

  • Activate MFA everywhere

  • Create incident response plan

  • Set up basic monitoring

  • Apply critical patches

  • First security awareness training

Month 4-6: Core Security Improvements

  • Network segmentation

  • PAM (Privileged Access Management)

  • Backup & recovery testing

  • Supply chain assessment (Top 10 suppliers)

  • Vulnerability management process

Month 7-12: Advanced & Governance

  • Zero trust architecture (gradually)

  • Penetration tests

  • Business continuity plans

  • Governance framework

  • Management reporting

The Reality Check: You will not implement everything perfectly. That's okay. NIS2 requires “appropriate” measures. Which means: risk-based, proportionate, state-of-the-art.

Small companies don't need to have the same measures as corporations. But they must have the right measures.

Phase 4: Documentation (ongoing!)

Goal: Prove that you are compliant.

What needs to be documented:

  • Risk analyses and assessments

  • Security policies and processes

  • Incident response plans and incidents

  • Training records (who was trained when?)

  • Audit reports and test results

  • Management reviews and decisions

  • Supplier assessments

The Reality Check: Documentation is the unloved part. But crucial under NIS2.

“If it's not documented, it didn't happen” – that applies to audits.

You don't need perfect documentation. But you need traceable documentation.

Phase 5: Testing & Continuous Improvement (ongoing)

Goal: Ensure that measures work. And keep up with the threat landscape.

What needs to happen regularly:

  • Quarterly: Vulnerability scans, access reviews, policy updates

  • Semi-annually: Security awareness training, backup recovery tests

  • Annually: Penetration tests, risk analysis update, management review

The Reality Check: NIS2 compliance is not a project. It is a program.

You will never be “done”. Threats change. Technology changes. Your business changes.

The question is not “When are we compliant?”, but “How do we stay compliant?”

The Most Common Mistakes in NIS2 Implementation

We see the same stumbling blocks repeatedly. Here are the top 5:

Mistake #1: Treating NIS2 as a Pure IT Project

The Problem: “IT, take care of NIS2” – and the IT tries to handle it alone.

Why that fails: NIS2 is a business risk management topic, not an IT topic. It needs:

  • Executive Management (Governance, Budget, Liability)

  • Legal (Contracts, Data Protection, Reporting Obligations)

  • HR (Training, Awareness)

  • Procurement (Supplier Management)

  • All departments (Risk Identification)

The Solution: Cross-functional NIS2 project team. With executive sponsor from management.

Mistake #2: Underestimating Documentation

The Problem: “We already do all that somehow, we just need to write it down.”

Why that fails: “Just write it down” becomes a 6-month project. Because you realize: you don't actually do a lot. Or not consistently. Or not traceably.

The Solution: Plan documentation from the start. Use templates. Not perfect, but complete.

Mistake #3: Ignoring Supply Chain Security

The Problem: “We're concentrating on our own systems for now. Suppliers come later.”

Why that fails: Later never comes. And your suppliers need time to improve their security.

The Solution: Include supply chain security from the start. Identify and address the Top 10-20 critical suppliers. Early.

[LINK: third-party-risk-management] (if available)

Mistake #4: Waiting Too Long

The Problem: “NIS2 might affect us, but Switzerland is not in the EU, so we have time...”

Why that fails: Your EU customers and partners don't wait. Contracts already contain NIS2 clauses. RFPs demand compliance evidence.

The Solution: Start now. Gap analysis takes 4-6 weeks. After that, you know where you stand. And can make informed decisions.

Mistake #5: Striving for Perfection Instead of Pragmatism

The Problem: “We'll implement NIS2 100% before we report or document anything.”

Why that fails: 100% doesn't exist. You will always find optimization potential.

The Solution: Proceed risk-based. The most critical 20% of measures close 80% of risks. Start there.

NIS2 requires “appropriate” and “state-of-the-art”. Not “perfect”.

What Happens in Case of Non-Compliance?

Okay, real talk. What happens if you ignore NIS2?

The Penalties (in the EU)

For “Essential Entities”:

  • Up to 10 million euros OR

  • 2% of the worldwide annual revenue

  • Whichever is higher

For “Important Entities”:

  • Up to 7 million euros OR

  • 1.4% of the worldwide annual revenue

Personal Liability: New to NIS2: Management can be held personally liable for gross negligence.

This means: If management ignored cybersecurity, despite warnings, and a severe incident occurs... personal consequences are possible.

This is a paradigm shift. And has led to cold showers for many CEOs/CFOs.

The Reality of Enforcement

But: Theory vs. practice.

The EU member states are currently building the enforcement infrastructure. CSIRTs (Computer Security Incident Response Teams) need to be created or expanded. Auditors need to be trained.

This does not mean you have time. It means the first 12-24 months will likely focus on:

  • Serious incidents (major breaches, critical infrastructure failures)

  • Repeat offenders (companies ignoring warnings)

  • Examples (a few high-profile cases to set an example)

For Swiss companies: Currently no direct penalties by EU authorities (we are not in the EU).

BUT:

  • Contractual consequences: EU partners can terminate contracts or not renew them

  • Reputational damage: “We are not NIS2 compliant” is not a good sales argument

  • Swiss regulation is coming: NCSC is working on national standards that will be similar

  • Civil liability: In the event of data breaches, customers can claim damages

The Business Case for Compliance

Forget the penalties. Here's the real reason why NIS2 compliance makes sense:

1. Risk Reduction: The measures actually make you safer. Ransomware incidents cost an average of 1-5 million euros. Plus reputational damage. Plus business interruption.

Contribution to this: Is it Cheaper to Recover after a Ransomware Attack or to Rebuild?

2. Competitive Advantage: “We are NIS2 compliant” will become a selling point. Especially with large, regulated customers.

3. Insurability: Cyber insurances will increasingly demand minimum standards. NIS2 compliance helps.

4. M&A Readiness: Due diligence in acquisitions looks at cybersecurity. NIS2 compliance makes you more attractive (or less risky).

5. Foundation for Growth: Solid security foundations enable faster, safer growth. You can enter new markets, use new technologies, without starting over each time.

How We Help with NIS2 Implementation

We have done NIS2 assessments and roadmaps with dozens of companies in recent months. From SMEs to large corporations. In regulated and non-regulated industries.

Our approach is assessment-first.

We don't start with “Here's what you need”. We start with “Where do you stand today?”

How We at ODCUS Operate

Step 1: Scope & Applicability Assessment

  • Are you even affected?

  • Which systems, processes, data are relevant?

  • Essential or Important Entity?

Step 2: Gap Analysis

  • Document current state

  • Mapping to NIS2 requirements

  • Identify and prioritize gaps

  • Risk assessment

Step 3: Roadmap & Business Case

  • Implementation Planning (Quick Wins, Medium, Long Term)

  • Budget and resources

  • Business case and ROI

  • Presentation for Executive Management

Step 4: Implementation Support

  • Project management

  • Technical implementation (or coordination with your teams/partners)

  • Documentation

  • Testing and validation

Our job is to structure the process, identify the gaps, guide you through the complexity, and ensure that in the end, you are not only compliant... but actually safer.

Next Steps

Okay. You've read this far. That shows you're taking NIS2 seriously. Good.

Here’s what you should do now:

Step 1: Determine if You Are Affected (1-2 hours)

Use the self-assessment checklist above. Discuss with legal and executive management.

If unsure: Better to be safe and do an assessment.

Step 2: Initial Gap Analysis (internally, 1-2 weeks)

You can do an initial rough gap analysis yourself:

  • List the 10 NIS2 requirements

  • Rate where you stand on a scale of 1-10

  • Identify the top 5 gaps

  • Roughly estimate budget and effort

This gives you an initial feel.

Step 3: Inform Stakeholders and Get Buy-In

NIS2 is top management’s responsibility. Inform executive management. Early.

“Personal liability” is a good argument for budget and attention.

Step 4: Professional Assessment (recommended)

An external gap analysis takes 4-8 weeks and a few tens of thousands of francs.

For this, you get:

  • Objective evaluation (no blind spots)

  • Benchmarking (where do others stand?)

  • Prioritized roadmap

  • Business case for executive management

  • Foundation for compliance evidence

That's money well spent. Because the alternative – blindly implementing measures – will be more expensive.

Step 5: Start. Don’t Wait.

The companies that start now have an advantage. They can proceed calmly and methodically.

The companies that wait until the first EU customer demands NIS2 compliance in the contract... are in a rush. And make mistakes. And pay more.

You don’t have to be perfect. But you have to start.

Does this topic concern you?

Learn more about our services related to the topic or easily arrange a conversation.

Two men engaged in conversation, smiling, while sitting in a cozy indoor setting with plants and natural light.
Abstract graphic featuring colorful blocks and lines, creating a modern digital aesthetic.
Text reads: "And so it begins, a digital journey."
Contact us!

Grabenstrasse 15a

6340 Baar

Switzerland

+41 43 217 86 70

Copyright © 2025 ODCUS | All rights reserved.

Legal Notice