Workplace
Microsoft 365-powered for smart, secure, and flexible workspaces, seamlessly integrating cutting-edge technologies and identity services.
Contact
Company
Pioneer in the Cloud: Your top Microsoft partner for comprehensive cloud solutions with a Blueprint-based approach and Infrastructure-as-Code expertise.
Contact
From compliance to actionable security

Practical technical implementation of the NIS2 Directive

The NIS2 Directive requires many organizations to put baseline cybersecurity measures in place. Our proven, practical solutions help you meet those requirements efficiently — standardized, secure and scalable.

Abstract security map with route lines and blue X markers on an orange background
Preventive Services

The NIS2 Directive affects tens of thousands of companies in Germany. How can it be implemented sustainably?

10 Microsoft MVPs, four with a security focus

BSI-certified APT response provider

ISO 27001-certified service

Extensive expertise in Workplace, Security and Azure

What is NIS2 and what does it mean for your organization?

Since October 2024 the new EU NIS2 Directive has been in force, setting binding cybersecurity standards across Europe. Its aim is to create a uniform level of security throughout the European Union and to better protect organizations from digital threats. It applies to companies providing critical or essential services, and their supply chains are also covered by the new requirements. Organizations within the scope are required to implement concrete security measures. Acting now reduces risks, protects your company — and helps avoid fines and personal liability for management.

Sectors affected by the NIS2 Directive

What specific measures does NIS2 require?

Our managed services help you practically implement the requirements of NIS2
Illustration eines Computerbildschirms mit binärem Code und einem gelben sechseckigen Logo darüber
  • NIS2 Article 21, 2(a)
  • Policies on risk analysis and information system security
  • NIS2 Article 21, 2(b)
  • Incident handling
  • NIS2 Article 21, 2(c)
  • Business continuity, such as backup management and disaster recovery, and crisis management
  • NIS2 Article 21, 2(d)
  • Supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers
  • NIS2 Article 21, 2(e)
  • Security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure
  • NIS2 Article 21, 2(f)
  • Policies and procedures to assess the effectiveness of cybersecurity risk-management measures
  • NIS2 Article 21, 2(g)
  • Basic cyber hygiene practices and cybersecurity training
  • NIS2 Article 21, 2(h)
  • Policies and procedures regarding the use of cryptography and, where appropriate, encryption
  • NIS2 Article 21, 2(i)
  • Human resources security, access control policies and asset management
  • NIS2 Article 21, 2(j)
  • The use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate

Reduce risks through targeted security measures

Our managed services help you to implement the NIS2 requirements in a practical way

Risk Measures | GK ServicesNIS2CSOCAPT ResponsePreventive ServicesManaged Red TennantAzEREData SecurityWorkplace/ Azure
Risk Analysis and Information System Security
12.2 a)
Incident Handling
12.2 b)
Business Continuity
12.2 c)
Supply Chain Security
12.2 d)
Security in Network and Information Systems
12.2 e)
Effectiveness of Cybersecurity Risk Management Measures
12.2 f)
Basic Computer Hygiene Practices and Cybersecurity Training
12.2 g)
Cryptography
12.2 h)
Human Resources Security, Access Control Policies and Asset Management
12.2 i)
Multifactor Authentication or Secured Communication
12.2 j)

Achieving NIS2 Compliance in 3 Steps

Together with a specialized partner, we guide you on your path to NIS2 compliance. While the partner assesses your organization’s applicability and addresses any organizational gaps, we take care of the technical implementation through our Managed Services built on Microsoft technologies.
  • Applicability Assessment
    Applicability Assessment
    A specialized service provider or law firm assesses whether – and to what extent – NIS2 applies to your organization. This gives you a solid evaluation of your exposure and a clear basis for understanding which requirements need to be considered as you move forward.
  • Gap Analysis
    Gap Analysis
    The analysis highlights which measures are already in place and where action is required. Based on proven frameworks, we derive pragmatic technical and organizational steps—from kick-off through audit and evaluation to the final set of recommendations.
  • Action Package
    Action Package
    While our Managed Services based on Microsoft technologies support you in defining and implementing the technical measures, a partner helps you close the remaining organizational gaps.

Latest articles

Contact us now

Jan Geisbauer
In most of our emergency operations, we repeatedly find that IT was not well enough prepared for attacks. A proactive security check is therefore an efficient investment in more security to reduce downtime.
Jan GeisbauerSecurity Lead