NIS2 and DORA: Essential Cybersecurity Rules for Leaders

Sep 29, 2025
Interview
NIS2 and DORA: Essential Cybersecurity Rules for Leaders

Short introductionToday, we’re diving into the critical world of cybersecurity and regulatory compliance with Vernon Yai, a renowned data protection expert specializing in privacy protection and data governance. With a deep focus on risk management and innovative techniques for safeguarding sensitive information, Vernon offers invaluable insights into the evolving landscape of cyber threats and the stringent EU regulations like NIS2 and DORA that are reshaping how businesses operate. In this conversation, we’ll explore the urgency of cybersecurity strategies, unpack the complexities of these regulations, and discuss practical steps for compliance and resilience in an increasingly digital world.

How have the rising cyber-attacks, with stats showing 67% of medium-sized and 74% of large businesses affected in 2024, changed the way companies view the need for a robust cybersecurity strategy?

The sheer scale of these attacks has been a wake-up call for many businesses. When over two-thirds of medium-sized companies and nearly three-quarters of large ones are hit in a single year, it’s clear that no one is immune. This has shifted cybersecurity from a “nice-to-have” to an absolute necessity. Companies are realizing that without a solid strategy, they’re not just risking data loss or downtime, but potentially their entire reputation and financial stability. The urgency now is to move from reactive measures to proactive planning, embedding cybersecurity into every aspect of their operations.

What are some of the most significant dangers businesses face if they lack a strong cybersecurity framework?

Without a strong framework, businesses are exposed to a cascade of risks. First, there’s the immediate impact of data breaches—loss of sensitive customer information or intellectual property can lead to lawsuits and eroded trust. Then there’s operational disruption; ransomware can halt operations for days or weeks, costing millions. Beyond that, non-compliance with regulations can bring hefty fines and even operational bans. But perhaps the biggest danger is the long-term damage to reputation. Once trust is broken with customers or partners, it’s incredibly hard to rebuild.

How are new technologies like AI and quantum computing adding layers of complexity to cybersecurity challenges?

AI and quantum computing are double-edged swords. On one hand, they offer powerful tools for defense, like predictive threat analysis with AI. On the other, they’re being weaponized by attackers. AI can automate sophisticated phishing campaigns or generate deepfakes for social engineering, while quantum computing threatens to break traditional encryption methods in the near future. For businesses, this means staying ahead of the curve—constantly updating defenses and rethinking strategies to counter these advanced threats. It’s a race against innovation on both sides.

Can you break down what NIS2 is and why it matters so much for businesses in the EU?

NIS2 is the EU’s updated directive on network and information security, essentially a tougher, broader version of its predecessor. It aims to boost cybersecurity across essential services and key industries by mandating stricter measures for risk management, incident reporting, and supply chain security. For businesses in the EU, it’s critical because it’s not just about protection—it’s about resilience. NIS2 ensures that vital sectors like energy or healthcare can withstand attacks without collapsing, which protects the wider economy. It’s a framework that forces companies to prioritize cybersecurity or face serious consequences.

Which sectors are labeled as “essential” under NIS2, and what makes them so critical to this regulation?

Essential sectors under NIS2 include areas like energy, transport, healthcare, and utilities—basically, the backbone of society. These are prioritized because a disruption in any of them could have catastrophic ripple effects. Think about a cyber-attack on a power grid: it’s not just about lights going out; it impacts hospitals, emergency services, and entire communities. NIS2 targets these sectors to ensure they have ironclad defenses, as their stability is non-negotiable for public safety and economic security.

How does NIS2 categorize “important” entities, and what kinds of businesses fit into this group?

Important entities under NIS2 are typically medium and large businesses in sectors that, while not as critical as essential ones, still play a significant role in the digital and economic landscape. This includes digital and ICT services, waste management, and postal or courier services. They’re categorized as important because their operations, if disrupted, could still cause notable harm to markets or communities, though not on the same existential level as essential sectors. NIS2 holds them to high standards, just with slightly less severe penalties than essential entities.

What are the core obligations NIS2 imposes on medium and large organizations to strengthen their cybersecurity?

NIS2 lays out a pretty comprehensive set of obligations. Organizations must adopt robust risk management practices, identifying and mitigating potential threats before they materialize. They’re required to have incident response plans in place and report major breaches within tight deadlines, often 24 hours. There’s also a big emphasis on supply chain security—ensuring that vendors and partners meet cybersecurity standards. Essentially, it’s about building a holistic defense system where every link in the chain is secure.

How do the steep penalties for NIS2 non-compliance, such as fines up to €10 million or 2% of annual turnover, elevate cybersecurity to a boardroom issue?

These penalties are a game-changer. When a fine could hit €10 million or 2% of global turnover for essential entities, it’s no longer just an IT problem—it’s a business survival issue. Boards can’t ignore numbers like that, as they directly impact the bottom line and shareholder confidence. It forces executives to take ownership, allocate budgets, and integrate cybersecurity into strategic planning. It’s a clear message: neglect this at your peril, because the cost of non-compliance could be crippling.

Why do you think, as seen with 38% of businesses in Ireland feeling unprepared for NIS2, this lack of readiness might be a widespread issue across the EU?

I think the unpreparedness stems from a mix of factors. First, NIS2 is broader and stricter than its predecessor, catching many businesses off guard, especially smaller ones or those outside traditionally regulated sectors. There’s also a knowledge gap—many leaders simply aren’t aware of the specifics or assume it’s just an IT issue. Resource constraints play a role too; with understaffed teams and tight budgets, as seen in recent surveys, companies struggle to prioritize compliance. I suspect this is mirrored across the EU, particularly in regions where digital maturity varies.

What’s the primary purpose of DORA, and how does it support financial institutions in the EU?

DORA, or the Digital Operational Resilience Act, is designed to ensure that financial institutions in the EU can handle digital disruptions like cyber-attacks with minimal impact. Its primary purpose is to build resilience, not just in preventing incidents, but in withstanding and recovering from them quickly. It supports these institutions by setting clear standards for managing ICT risks, testing their systems regularly, and enforcing rapid incident reporting. This creates a safety net that keeps the financial sector stable, even under attack, which is crucial for economic trust.

Beyond financial services firms, which other organizations are impacted by DORA, and why are they included?

DORA extends to critical third-party tech providers, like cloud service providers or software vendors that support financial institutions. They’re included because the financial sector heavily relies on these external partners for digital operations. If a tech provider gets hit by a cyber-attack, it can directly disrupt financial services, creating a domino effect. DORA ensures that these providers are held to the same high standards, closing potential weak links in the ecosystem.

What specific steps must financial institutions take under DORA to address digital risks and disruptions?

Under DORA, financial institutions need to implement comprehensive ICT risk management frameworks, identifying vulnerabilities and preparing for worst-case scenarios. They must conduct regular resilience testing to ensure systems can bounce back from disruptions. Incident reporting is also key—major ICT incidents must be reported within incredibly tight windows, like four hours. It’s about being proactive, transparent, and ready to act fast to minimize damage and maintain trust in the system.

How serious are the repercussions of failing to comply with DORA, such as potential operational bans or loss of authorization?

The repercussions are severe and meant to be a deterrent. Non-compliance can lead to operational bans, meaning a firm could be barred from certain activities temporarily or permanently. In extreme cases, persistent failures could result in losing authorization to operate regulated financial services altogether. These aren’t just slaps on the wrist—they’re existential threats to a business, designed to force compliance and protect the integrity of the financial sector. It underscores how seriously the EU takes digital resilience.

How does DORA’s requirement for rapid incident reporting, such as within four hours for major ICT incidents, differ from standard practices in most businesses today?

Most businesses today aren’t used to such tight timelines. Typically, incident reporting might take days or even weeks as companies assess damage, notify internal stakeholders, and draft communications. DORA’s four-hour window for major ICT incidents is a radical shift—it demands near-immediate action and pre-established protocols to classify and report issues. This speed is meant to ensure quick containment and industry-wide learning, but it’s a huge adjustment for firms without streamlined processes in place.

What initial actions should a business take to figure out how NIS2 or DORA applies to their operations?

The first step is a thorough assessment of their operations and geographic scope. Businesses need to map out whether they fall under the definitions of essential or important entities for NIS2, or if they’re in the financial sector or a critical provider under DORA. This involves reviewing their sector, size, and supply chain connections within the EU. From there, engaging with legal or compliance experts to interpret specific obligations and conducting a gap analysis against current practices is crucial. It’s about knowing where you stand before you can plan where to go.

How can businesses transform cybersecurity from an IT department task to a priority at the board level?

It starts with education. Boards need to understand the stakes—both the regulatory penalties and the broader business risks of cyber threats. Bringing in experts or consultants to brief executives on real-world impacts can be eye-opening. Then, it’s about accountability—assigning clear roles for oversight and integrating cybersecurity metrics into board reporting. Budget allocation is key too; if the board sees cybersecurity as a strategic investment rather than a cost, it naturally rises on the agenda. It’s a cultural shift, driven from the top down.

Why is ongoing training so vital for businesses to stay compliant with regulations like NIS2 and DORA?

Training is the backbone of compliance because regulations and threats evolve constantly. Without regular, role-specific training, employees—from leadership to frontline staff—can’t recognize risks or follow protocols effectively. It’s not just about ticking a box; it’s about building a culture of awareness where everyone knows their part in preventing and responding to incidents. Scenario testing, for instance, helps teams react under pressure. Without this, even the best policies are useless if people don’t know how to apply them.

What is your forecast for the future of cybersecurity regulations in the EU and beyond?

I see cybersecurity regulations becoming even more stringent and interconnected globally. In the EU, frameworks like NIS2 and DORA are setting a high bar, and I expect other regions to adopt similar models as cyber threats ignore borders. We’ll likely see more harmonization of rules to manage cross-border risks, especially with supply chains. There’s also a growing push for real-time compliance monitoring, possibly leveraging AI for oversight. For businesses, the future will demand agility—staying compliant won’t just be about meeting today’s rules, but anticipating tomorrow’s challenges.

Trending

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later