The NIS2 Deadline Is Coming. Here’s Why 99% Of Companies Are Unprepared (And What To Do About It).

Most European organizations remain critically unprepared for the January 2025 NIS2 deadline. Three misconceptions hold companies back: treating NIS2 as IT, assuming current training suffices, and viewing supply chain security as compliance.

The NIS2 Deadline Is Coming. Here’s Why 99% Of Companies Are Unprepared (And What To Do About It).

Pattern #1: Treating NIS2 as an IT Responsibility

When NIS2 first appears on an organization's radar, the immediate response is often to forward it to the IT or security team. This makes intuitive sense—"cybersecurity directive" signals a technical problem requiring technical expertise.

But Article 21 changes this equation. It explicitly requires policies for "human resources security," mandates training for all personnel, and demands that the management body approve cybersecurity strategy, monitor program effectiveness, and complete mandatory training themselves. This isn't a technical requirement—it's a governance and organizational behavior requirement.

Your IT team can deploy sophisticated technical controls, but if your finance manager clicks a phishing link that appears to come from your CEO, those controls become irrelevant. If your procurement team doesn't understand supply chain security requirements, your third-party risk program exists only on paper.

Organizations default to delegating cybersecurity to IT because that's how it has historically been structured. Security was about perimeter defense, endpoint protection, and network monitoring—domains where technical expertise dominates. NIS2 shifts the boundary. It recognizes that human behavior is the foundation every technical control sits on.

Capability (knowing what to do), Opportunity (having the tools and processes to do it), and Motivation (wanting to do it) determine whether people act securely when it matters. This is the COM-B Framework from behavioral science, and it applies directly to NIS2 compliance.

Reframe NIS2 as a governance obligation with technical components, not a technical project with governance oversight. Appoint a program lead with executive sponsorship—typically your CISO or equivalent—but establish accountability at the management body level. Stand up a cross-functional steering committee that meets monthly and includes representatives from legal, IT/OT, procurement, HR, risk/compliance, and communications.

Make personnel security a first-class compliance domain. Define what "appropriate and effective" training means in your context. Establish baseline measurements (phishing click rates, reporting rates, knowledge assessments) so you can demonstrate improvement over time. Build role-specific training that addresses the actual threats your people face, not generic content that satisfies a checkbox.

This approach doesn't just satisfy Article 21—it creates a program where secure behavior becomes the easy default, where people have the capability and motivation to act safely, and where your evidence of effectiveness is measurable and defensible.

Pattern #2: Underestimating Implementation Timelines

The Q2 2026 deadline feels distant. Many organizations assume they can start serious implementation in late 2025 and still meet the deadline. This assumption is based on experience with other compliance frameworks, where a focused six-month effort was sufficient to implement controls and document evidence.

NIS2 doesn't work that way. It's not a set of controls you implement—it's an operating model transformation that touches governance, risk management, incident response, supply chain security, and personnel training. Building this takes 18-24 months for most organizations, not six.

Timeline underestimation stems from two cognitive biases. First, the planning fallacy—we systematically underestimate how long complex projects take because we focus on best-case scenarios and ignore the coordination challenges, dependencies, and iterations that real implementation requires. Second, present bias—we discount future costs and overvalue immediate priorities. The Q2 2026 deadline feels abstract compared to the operational fires you're fighting today, so NIS2 preparation gets deferred.

Start with realistic scoping. NIS2 compliance isn't a single deliverable—it's multiple interconnected workstreams that must mature in parallel. Governance takes 3-4 months to institutionalize. Risk management takes 2-3 months for initial assessment, then ongoing monitoring. Incident response takes 4-6 months to build and test. Supply chain security takes 6-9 months to operationalize across your supplier base. Personnel security takes 3-6 months for initial rollout, then continuous improvement.

These workstreams don't happen sequentially—they run in parallel with dependencies and coordination overhead. Organizations that start now have time to build properly, test thoroughly, and iterate based on what they learn. Those who wait until late 2025 will be assembling fragmented programs that look compliant on paper but fail under scrutiny.

Pattern #3: Viewing Compliance as Cost, Not Risk Reduction

Many organizations approach NIS2 with a mindset of minimizing compliance cost—finding the cheapest, fastest way to satisfy requirements so they can return to "real work." This treats compliance as a regulatory burden that drains resources without delivering business value. This framing is backwards. NIS2 compliance, done right, is risk reduction that happens to satisfy regulators.

The "compliance as cost" mindset emerges from how regulatory requirements are often communicated and implemented. Legal and compliance teams translate directives into checklists. Audit firms assess whether controls exist on paper. Budgets get framed as "compliance spend" rather than "risk investment." This creates a disconnect between the compliance program and the actual risk landscape.

Organizations implement controls because they must, not because those controls address threats they actually face. The result is checkbox compliance—policies that exist but don't operate reliably, training that gets completed but doesn't change behavior, processes that look good in audits but fail during real incidents.

Reframe NIS2 as an opportunity to build operational resilience that satisfies compliance as a byproduct. Consider the ROI of a mature security awareness program. A 1,000-person organization investing €200,000 annually in behavior-focused awareness can prevent seven incidents per year, assuming a 35% reduction from a 2% baseline breach probability. At an average incident cost of €500,000, that's €3.5 million in avoided costs—a 1,650% return on investment.

That same program satisfies NIS2's personnel training requirements, improves incident detection and response times by 35%, and creates a culture where reporting suspicious activity becomes the norm rather than the exception. It generates measurable evidence (click rates declining from 22% to 8%, reporting rates increasing from 9% to 47%) that proves your program operates proportionately and reliably.

The business case extends beyond avoided incident costs. Cyber insurance premiums are rising, and insurers increasingly require evidence of mature security programs before offering coverage. Organizations with demonstrable NIS2 compliance and measurable security awareness outcomes negotiate 10-20% lower premiums. Supply chain expectations are tightening. Your largest customers and partners are implementing their own NIS2 programs, which means they're assessing your cybersecurity posture as part of their supply chain risk management. Being NIS2-ready isn't just compliance—it's competitive advantage.

What This Means for Your Timeline

If your organization hasn't started NIS2 preparation, the window for building a mature, defensible program is narrowing. But starting now—even if you're behind—is significantly better than waiting.

A realistic 18-month roadmap includes three phases. Months 1-3 focus on scoping and baseline assessment: conduct legal-entity scoping to determine which entities fall under "essential" vs. "important" classifications, assess current posture across NIS2's duty-of-care domains, identify gaps, prioritize remediation, and build a phased implementation plan.

Months 4-9 focus on core program build: establish governance structures, build incident reporting workflows, operationalize supply chain security, and launch personnel security awareness programs with baseline measurements and role-specific training.

Months 10-15 focus on testing, iteration, and evidence generation: exercise incident reporting through tabletop simulations, test supply chain security processes with high-risk suppliers, measure behavioral change in personnel security, iterate based on data, and generate audit-ready evidence.

Months 16-18 focus on inspection readiness and final validation: conduct internal compliance assessment against NIS2 requirements, validate evidence completeness and defensibility, brief management body on program status and effectiveness metrics, and prepare for regulatory inspection.

This timeline assumes adequate resourcing, executive sponsorship, and cross-functional coordination. Organizations with complex structures, multiple legal entities, or immature baseline postures may need 24 months. The key insight is that starting now gives you options. You can build properly, test thoroughly, and iterate based on what you learn. You can spread costs over multiple budget cycles. You can demonstrate progress to regulators, insurers, and customers. You can turn compliance into operational resilience.

Waiting until late 2025 removes those options. You'll be forced into a rushed, fragmented implementation that satisfies auditors on paper but fails to reduce actual risk.

Next Steps

If you're unsure where you stand, start with a baseline assessment. We offer a free NIS2 readiness diagnostic that maps your current posture across the duty-of-care domains, identifies critical gaps, and provides a prioritized roadmap. This diagnostic takes 60-90 minutes and delivers a clear picture of what needs to happen and when.

If you know you need help, we specialize in NIS2 readiness programs that build operational resilience while satisfying compliance requirements. Our approach focuses on governance clarity, measurable personnel security, incident reporting workflow design, and supply chain risk operating models.

If you want to learn more, download our NIS2 Strategic Implementation Framework, a comprehensive whitepaper that covers governance requirements, reporting obligations, supply chain security, personnel training, and a phased implementation roadmap.

Olof Penning

Olof Penning

Founder | SACP

Most European organizations remain critically unprepared for the January 2025 NIS2 deadline. Three misconceptions hold companies back: treating NIS2 as IT, assuming current training suffices, and viewing supply chain security as compliance.

Newsletter

Blijf op de hoogte van Human Risk en security awareness.

Ontvang maandelijks praktische inzichten over gedragsverandering, compliance en resilience. Alleen relevante kennis, geen spam.

Bedankt voor je inschrijving op onze nieuwsbrief!
Oops! Something went wrong while submitting the form.
Only one email per month — No spam!