· Maciej Maciejowski · 8 min read

NIS2 for Finance & Insurance

NIS2

Learn how NIS2 affects Finance & Insurance companies. Requirements, implementation steps, and FAQ. Check Plan Be Eco.

NIS2 for Finance & Insurance

What is NIS2?

The Network and Information Security Directive 2 (NIS2) is a European Union cybersecurity regulation that came into force in January 2023, replacing the original NIS Directive from 2016. It establishes a comprehensive legal framework requiring organizations across critical sectors to implement robust cybersecurity measures, report significant incidents to national authorities, and maintain resilient digital infrastructure. NIS2 significantly expands the scope of its predecessor, bringing thousands of additional entities under mandatory compliance obligations across the EU.

NIS2 and the Finance & Insurance Industry

The Finance and Insurance sector sits at the intersection of critical infrastructure and high-value data, making it one of the primary targets of NIS2 enforcement. Banks, insurance companies, asset managers, payment processors, and credit institutions all fall within the directive's scope as "essential" or "important" entities, depending on their size and systemic relevance. The financial system's deep interconnectedness means that a cyberattack on a single institution can cascade across the entire economy, which is precisely why regulators have placed this industry under strict NIS2 obligations.

Consider a mid-sized insurance company processing thousands of policyholder claims daily. If ransomware disrupts its claims management system, the ripple effects extend beyond the company itself: reinsurers, brokers, and healthcare providers that depend on timely claim settlements are all affected. NIS2 addresses this systemic risk by requiring not only that organizations protect their own systems, but also that they manage risks introduced by third-party suppliers and service providers. A bank relying on a cloud-hosted core banking platform, for instance, must now actively assess and document the cybersecurity posture of that vendor.

The directive also intersects with existing financial sector regulations such as DORA (Digital Operational Resilience Act), which is specific to financial entities in the EU. Organizations subject to both frameworks must align their compliance programs carefully to avoid duplication and ensure coherent governance. In practice, NIS2 sets the baseline cybersecurity expectations, while DORA adds sector-specific resilience testing and ICT risk management requirements on top.

Key Requirements

  • Risk management and governance: Organizations must establish formal cybersecurity risk management processes, including documented policies, defined roles and responsibilities, and board-level oversight. For insurance companies, this means senior executives must be directly accountable for cybersecurity decisions and outcomes.
  • Incident reporting: Significant cybersecurity incidents must be reported to the relevant national authority within 24 hours of detection (initial notification), with a full report submitted within 72 hours. A bank that detects unauthorized access to customer account data must follow this timeline precisely or face regulatory penalties.
  • Supply chain security: Entities must assess and manage cybersecurity risks in their supply chains, including evaluating the security practices of software vendors, cloud providers, and third-party data processors. A payment processor relying on third-party fraud detection software must audit that vendor's security controls.
  • Business continuity and crisis management: Organizations must have tested business continuity plans that address major cyber incidents, including backup systems, disaster recovery procedures, and communication protocols. Insurers handling critical health or life policies must demonstrate they can maintain core operations even during an attack.
  • Access control and authentication: Strong authentication mechanisms, including multi-factor authentication (MFA), must be implemented across all systems handling sensitive data or critical operations. This is non-negotiable for financial institutions where unauthorized access can result in immediate financial loss.
  • Encryption and data protection: Sensitive data, both at rest and in transit, must be encrypted using current industry standards. Customer financial records, policy documents, and transaction logs all fall under this requirement.
  • Vulnerability management: Regular vulnerability assessments, penetration testing, and timely patching of identified security flaws are required. A securities firm, for example, must maintain a documented process for tracking and remediating vulnerabilities in its trading systems.
  • Employee security awareness training: All personnel must receive regular cybersecurity training appropriate to their roles. This includes recognizing phishing attempts, handling sensitive data correctly, and following incident response procedures.
  • Network security monitoring: Continuous monitoring of network traffic and system activity is required to detect anomalous behavior indicative of a breach or ongoing attack.

Implementation Steps for Finance & Insurance Companies

  1. Determine your entity classification: Establish whether your organization qualifies as an "essential entity" (larger banks, financial market infrastructures) or an "important entity" (mid-sized insurers, asset managers) under NIS2. This classification determines the intensity of supervision and the scale of penalties for non-compliance. Review the directive's size thresholds and sector classifications with your legal counsel.
  2. Conduct a gap analysis against NIS2 requirements: Compare your current cybersecurity policies, controls, and procedures against the directive's requirements. Map existing frameworks such as ISO 27001, NIST CSF, or DORA compliance programs to identify what already meets NIS2 standards and where gaps remain. Document findings clearly so remediation efforts can be prioritized.
  3. Establish or update your governance structure: Assign clear ownership of NIS2 compliance at the board or executive level. Create or revise your cybersecurity committee structure to ensure direct accountability. Many financial institutions appoint a Chief Information Security Officer (CISO) with a mandate that explicitly covers NIS2 obligations.
  4. Develop and formalize risk management processes: Build a structured cybersecurity risk register that identifies, assesses, and prioritizes threats specific to your organization. For an insurance company, this includes risks from legacy policy administration systems, third-party claims processors, and cloud-based actuarial tools.
  5. Audit your supply chain and third-party vendors: Compile a complete inventory of all third-party providers with access to your systems or data. Issue security questionnaires, review contracts to ensure cybersecurity obligations are included, and conduct or request evidence of third-party audits. Prioritize vendors with access to core banking, payment, or policyholder data.
  6. Implement or upgrade technical controls: Roll out MFA across all critical systems, deploy endpoint detection and response (EDR) tools, enforce encryption standards, and establish centralized logging and monitoring. Prioritize systems that process or store customer financial data and those involved in transaction settlement.
  7. Build and test your incident response plan: Draft a detailed incident response playbook that covers detection, containment, eradication, recovery, and regulatory notification. Run tabletop exercises simulating realistic scenarios such as a ransomware attack on your core banking system or a data breach affecting policyholder records. Verify that your 24/72-hour reporting workflow functions correctly.
  8. Train all staff and simulate phishing campaigns: Launch a mandatory training program that covers NIS2 obligations, phishing recognition, social engineering, and incident reporting procedures. Conduct simulated phishing campaigns to measure and improve employee awareness levels over time.
  9. Register with the relevant national authority: NIS2 requires entities to register with their member state's competent authority. Identify the correct body in your jurisdiction (for example, the national cybersecurity agency or financial sector regulator with delegated NIS2 responsibility) and complete the registration process before the applicable deadline.
  10. Establish continuous compliance monitoring: Treat NIS2 compliance as an ongoing operational discipline, not a one-time project. Schedule regular internal audits, review your risk register quarterly, and update your incident response plan after each exercise or real-world event. Build NIS2 compliance metrics into your regular board reporting.

Frequently Asked Questions

Which financial institutions are covered by NIS2?
NIS2 covers a broad range of entities in the financial sector, including credit institutions (banks), trading venues, central counterparties, payment service providers, and electronic money institutions. Insurance companies, insurance intermediaries, and investment firms above the directive's size thresholds are also included. Even smaller organizations may fall under the "important entities" category if they provide services deemed critical to the financial system in their member state. If you are uncertain about your classification, consulting your national supervisory authority or a specialized legal adviser is the recommended first step.

How does NIS2 interact with DORA for financial entities?
DORA (Digital Operational Resilience Act) applies specifically to financial entities and sets detailed requirements for ICT risk management, digital resilience testing, and ICT incident reporting. NIS2 applies more broadly but covers many of the same entities. The EU has designed these regulations to be complementary rather than contradictory: where DORA provides lex specialis (sector-specific law) for financial entities on matters such as ICT incident reporting, it takes precedence over the equivalent NIS2 requirements in those specific areas. Financial institutions should conduct a dual-framework analysis to map which requirements are satisfied under DORA and which additional obligations NIS2 introduces.

What are the penalties for non-compliance with NIS2?
Penalties under NIS2 are significant and scale based on entity classification. Essential entities can face fines of up to 10 million euros or 2% of total annual global turnover, whichever is higher. Important entities face fines of up to 7 million euros or 1.4% of global annual turnover. Beyond financial penalties, national authorities have the power to impose temporary bans on senior management from exercising management functions in cases of serious breaches. This personal liability dimension makes board-level engagement with NIS2 compliance a matter of individual professional risk, not just corporate governance.

What counts as a "significant incident" that must be reported?
NIS2 defines a significant incident as one that causes or is capable of causing severe operational disruption to the organization or financial loss to the entity, or that affects other natural or legal persons by causing considerable material or non-material damage. In the finance and insurance context, this would include events such as a successful ransomware attack that disrupts payment processing, unauthorized access to a database containing policyholder personal and financial data, or a DDoS attack that renders online banking services unavailable for an extended period. Organizations should define internal thresholds and classification criteria in advance so that incident responders can make rapid reporting decisions without ambiguity during an active event.

Summary

NIS2 represents a fundamental shift in how cybersecurity is governed across the European Union, and the Finance and Insurance sector faces some of the most stringent obligations under this framework. The combination of systemic importance, large volumes of sensitive customer data, and complex third-party dependencies makes proactive compliance not just a legal necessity but a strategic imperative. Organizations that begin their NIS2 implementation now, building on existing frameworks and addressing gaps systematically, will be far better positioned than those that wait for enforcement pressure to force action.

Check which regulations apply to your company

Take a quick quiz and get a free personalized regulatory analysis.

Regulatory Quiz Try for free