NIS2
Preparing for NIS2: Embracing a Cultural Shift Towards Collaborative Cybersecurity
Jordan McPeek • Feb 4, 2025
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Jordan McPeek • Feb 4, 2025
The NIS2 Directive is reaching out and pulling in; unlike its predecessor, it extends cybersecurity mandates to more than just critical sectors, and puts a heavy emphasis on reaching across business borders and working together.
This begs a cultural shift in cybersecurity thinking across the EU. Whereas threat intelligence was once highly guarded proprietary information, NIS2 asks organizations (even competitors) to lay aside their differences. Instead of a “glad it wasn’t me” mentality, NIS2 encourages a shift towards “it could just as well be next,” and encourages EU teams to share what they know.
Moving forward, collective defense will play an increasingly large role in combating modern cyber threats. We might have to take a page out of cybercriminals’ books; they, after all, pilfer lists of names and addresses and share them indiscriminately on the dark web (for a price, of course). Omitting the cost, NIS2 captures the zeitgeist that if we are to survive against such a united opponent, we have to be united ourselves.
NIS2 not only calls for increased sharing, but increased security in key areas. Risk management is one of them.
Article 21 of NIS2 mandates that organizations establish a risk management framework, if they haven’t one already. Explicitly, essential and ‘important’ (that means non-critical infrastructure) entities are required to create “appropriate and proportionate technical, operational and organisational measures to manage the risks posed to the security of network and information systems...”
It sounds pretty straightforward, and ENISA (the European Network and Information Security Agency) offers some guidance to make it even more so. Though still in draft form, the ENISA Implementation Guidelines outline that a compliant risk management plan should include (at least):
This underscores the importance of adopting proactive measures over reactive approaches. The point is less surprises. The more companies know about their risks and the factors increasing them ahead of time, the less chance they’ll have of being introduced to them the hard way by attackers.
Digital infrastructure is largely interconnected across industries and borders. Remote devices draw from the same cell towers, use the same internet service providers, and share the same supply chains, cloud service vendors, email platforms, and SaaS applications. What affects one can quickly affect all (and cybercriminals are counting on it). The CrowdStrike Linux outage, SolarWinds compromise, and MOVEit Transfer tool attack are just a few examples.
NIS2 essentially argues that the rising rates of cyberattacks on ‘critical and important’ entities is more than enough reason ‘why’ and that it will actually keep sectors - and the organizations that make them up - healthier, safer, and more competitive.
Seeing the potential for catastrophic chain reactions – and the current climate of “fragmentation in scopes, tiering, and implementation approaches,” the European Cyber Security Organization (ECSO) issued the following call to action:
Why should the strong help the weak in a global digital economy? Because as far-reaching supply chain attacks have shown us, attackers often target the weak to get to the strong.
An all-in-one threat intelligence platform like Cyware Collaborate is a powerful enabler of collective defense. You can only (responsibly) share threat information that you know and understand, but with so many sources of threat information coming in (logs, alerts, global feeds, proprietary feeds, SIEMs, etc.), companies can be hard-pressed to keep up.
Many organizations are still using manual threat intelligence processes for collecting data, sifting through intel, compiling it all together, and creating reports. This is often a full-time job for several people, and many companies don’t have the cycles to dedicate to that. So, how will they comply with the NIS2 mandate (yes, mandate – complete with penalties) to engage in threat intelligence sharing?
First, let’s look at what NIS2 requires:
Cyware Collaborate is an all-inclusive threat intelligence platform that ingests data from a myriad of (practically all available) threat sources and combines them into a package that is easy to use. The result is actionable, well-informed, human-readable threat intelligence that companies in the EU (or anywhere) can use or share.
Collaborate takes in the following threat feeds (and these are just the big buckets):
Once Collaborate has ingested the above threat intelligence sources, it not only produces summarized, context-rich real-time threat intelligence but does so in standardized formats and templates that align with European Cyber Security Organization recommendations. Now, NIS2-compliant information sharing is easier than ever.
With Collaborate, you get:
And the peace of mind that comes from knowing you’re well aware of what’s out there – and that when cybercriminals come knocking, you’ll be ready.
Following the encouragement of NIS2 to build a more collaborative cybersecurity culture will require a cultural shift from an individualistic mindset to a cultural one. However, the two are not mutually exclusive; individual companies benefit from the collective safety of their digital ecosystem. As NIS2 not-so-subtly points out, keeping the EU’s digital ecosystem safe against today’s highly organized cybercriminals is going to take a wave of new cybersecurity improvements – and a big team effort.
Find out how to simplify NIS2 threat intelligence sharing mandates with Cyware Collaborate.