Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Cyber Fusion: a next generation approach to NIS2 compliance

The NIS2 Directive, which came into force in October, imposes extensive cyber risk management, incident reporting, business continuity, and information sharing obligations on a much greater number of organisations – around 30,000 compared to the 3,000 previously affected by NIS1.

The directive also introduces significantly higher penalties and sanctions for organisations that fail to comply or maintain compliance. Directors and management can now be held personally liable for implementation failures, fines can be up to €10 million or 2% of total turnover, and regulators can suspend business operations if deemed necessary.

For organisations that now find themselves within scope of the NIS2 Directive, taking a proactive approach to compliance has become a must-have.

Understanding the requirements

Introduced to enhance and strengthen cybersecurity resilience within the EU and beyond, NIS2 sets out measures organisations must adhere to in four key areas: risk management, corporate accountability, reporting and business continuity. It also sets out specific requirements around information sharing.

This is not a one-off box ticking exercise. Organisations will need to persistently test their cybersecurity and response capabilities, conduct regular cyber risk assessments and ensure that clear lines of management and reporting responsibility are defined and in place. Ultimately, organisations need to ensure they can detect and respond faster and more effectively to cybersecurity events. The faster a possible threat is detected, the better an organisation can comply with the regulatory reporting requirements should this evolve into a full blown incident.

Importantly, NIS2 highlights the importance of incident reporting and information across industries and along supply chains as being essential for preparing against security threats. As a key requirement of the directive, the voluntary exchange of cybersecurity information is now enshrined as good security practice.

Navigating compliance: the key steps

NIS2 is the EU’s toughest cybersecurity directive to date and compliance depends on undergoing a multi-step process that includes understanding the scope; connecting with relevant authorities; undertaking a gap analysis; creating new and updated policies; training the right employees; and monitoring progress. All of which will enable businesses to track their supply chain for threats and vulnerabilities and stay on top of their risk management strategies.

However, organisations also need to ensure they’re able to deliver against the directive’s information sharing requirements. By sharing key information on vulnerabilities and threats, together with insights on how these are handled, organisations can protect themselves against cybercriminals exploiting an identified vulnerability multiple times.

Sharing information in a timely manner across their supply chain is essential for elevating the resilience of all. In much the same way, NSI2 now demands that organisations look beyond their own security boundaries and exchange cyber threat intelligence with industry peers.

By sharing information on indicators of compromise, tactics and techniques, and mitigation responses, firms will both contribute to, and benefit from, a wider collective defence approach that mitigates the likelihood and impact of incidents.

Achieving all this, however, depends on organisations finding a way to combine their cyber threat intelligence, security and defence operations. So they can undertake real-time threat intelligence sharing and reporting while responding faster and more cohesively to incidents.

Cyber fusion: a next-generation cybersecurity approach

Around 30 years ago, military intelligence agencies came up with the concept of cyber fusion as a way to foster enhanced information sharing between different intelligence communities and synthesise these insights to gain a deeper understanding of the threat ecosystem.

More recently the concept has been seized upon by the cybersecurity sector as a means to promoting greater collaboration between teams within – and beyond – the organisation.

By unifying security functions such as threat intelligence, security automation, threat response, security orchestration and incident response into a single connected unit, cyber fusion enables organisations to create an information-rich environment that makes it easier to detect, manage and respond to threats in a highly collaborative manner. With cyber fusion, knowledge transfer across disparate security operations becomes fast and seamless and teams can alert one another to potential problems and vulnerabilities.

Supporting the constant flow of threat intelligence across security teams through a shared platform, cyber fusion brings together a variety of security tools and technologies – SIEM (security information and event management), EDR (endpoint detection and response) and threat intelligence platforms – into a single unified system.

Alongside greater visibility, this integration gives organisations better control over their security operations, improves incident reporting and continuous compliance monitoring, while enabling automated threat detection and more comprehensive risk management.

Optimising NIS2 compliance with cyber fusion

As the saying goes, necessity is the mother of invention. Confronted by the need to re-think compliance frameworks, NIS2 is prompting organisations to evaluate the security posture of their enterprise, their supply chains, and the resilience of their wider industry sector.

Collaborating across the organisation and the entire sector is not an easy undertaking. However, by implementing a cyber fusion model, organisations will be able to tackle cyber threats more effectively and share real time threat information and resources on how to remediate and secure vulnerabilities as efficiently as possible. By putting cyber fusion into practice on a larger scale, organisations will be able to boost their ability to comprehensively meet NIS2 compliance requirements on multiple fronts. They will also be able to demonstrate they are responsible and proactive participants in industry-wide security collaboration efforts and defence actions.


About the Author

Jordan McPeek is VP of Security Technology at Cyware. Cyware helps enterprises transform security operations while breaking through silos for threat intelligence sharing, collaboration, and automated threat response. Its unique Cyber Fusion solutions enable lean security teams to proactively stop threats, connect the dots on security incidents, dramatically reduce response time, and reduce analyst burnout from repetitive tasks. Cyware improves security outcomes for enterprises, government agencies, and MSSPs, and provides threat intelligence sharing platforms for the majority of ISAC/ISAO information sharing communities globally.

more insights