A comprehensive assessment of your organisation’s readiness to meet the requirements of the NIS2 Directive and the National Cybersecurity System Act.
Entities that achieve a certain scale of activity (in principle: medium and large enterprises — 50 employees or €10 million in turnover/balance sheet for the previous year) and provide services whose disruption would have a significant impact on security, health, the economy or public order.
NIS2 also applies to entities that supply services or products to key or important entities. The main criterion for coverage is significance for the continuity of critical services or being part of the supply chain.
NIS2 is included in the Act on the National Cybersecurity System (KSC). The act has been signed by the President (as of February 2026). Vacatio legis: 14 days from the date of publication in the Journal of Laws. Start of provisions: expected in March 2026.
Parliament has extended the adjustment periods: 6 months for registration, 12 months for implementation, and introduced a 2-year moratorium on penalties.
The sector and role in the economy matter more than the legal form. Polish branches of corporations in regulated industries must comply with the Polish KSC/NIS2 Act.
Obligations and responsibility rest with the management / board of the entity — including financial responsibility.
Direct oversight: The board is responsible for implementing and ensuring the effectiveness of cybersecurity measures.
Formal obligations: Approval of IT policies, risk analysis and mandatory training for management.
Personal risk: Possibility of imposing financial penalties directly on managers for gross negligence.
Financial penalties: Up to €10 million or 2% of global turnover (for key entities).
Authority powers: Ability to impose orders, prohibitions and conduct ad-hoc audits.
Business consequences: Civil liability towards contractors and risk of reputational damage and supply chain contract loss.
The NIS2 Directive requires the implementation of comprehensive cybersecurity risk management measures.
Development and implementation of an IT security policy and methods, procedures and tools for assessing and managing cyber risk, e.g. in accordance with ISO/IEC 27005.
A set of actions and procedures for responding to security incidents — from detection to reporting and remediation. Reporting incidents to CSIRT within 24 hours.
Business Continuity Plan (BCP) and IT Disaster Recovery Plan (DRP). Daily backups, test restore from backup.
Managing risk arising from the use of subcontractor and IT supplier services. Supplier security audits, certificates (e.g. ISO 27001).
Security throughout the entire lifecycle of IT systems — procurement, development, updating, maintenance, decommissioning. “Security by Design”.
Internal and external audits, penetration tests, benchmarking against standards (ISO 27001, CIS Benchmark). Reporting to management.
Strong passwords and MFA, cybersecurity training, phishing simulations, principle of least privilege, awareness campaigns.
Encryption of data at rest (BitLocker) and in transit (TLS 1.3, VPN). Cryptographic key management (KMS). Digital signatures and PKI.
Multi-factor authentication (MFA), RBAC, IT asset inventory, data classification, asset lifecycle monitoring, DLP.
Our audit covers four key stages — from planning to delivering a report with recommendations for corrective actions.
Each of the individual and independent member firms of HLB Poland have a dedicated HLB Contact Partners.
Start the conversationMarch 15th, 2021
On the one hand, 2020 was a difficult and unpredictable year and on the other hand, it showed that modern technologies…
Learn moreOctober 21st, 2020
Recently Amazon announced that they are targeting Northern Europe and following on from that an Amazon marketplace in Sweden within the next year. Currently, Swed…
Learn moreOctober 12th, 2020
HLB is proud to announce that it has been named ‘Network of the Year’ at the 2020 Digital Accountancy Awards…
Learn more