Centripetal, the global leader in intelligence powered cybersecurity, is operationalizing the world’s largest collection of threat intelligence, in real-time, to protect organizations from every known cyberthreat through its innovative patented technologies. The company’s CleanINTERNET® service delivers the only proactive approach to intelligence powered cybersecurity, leveraging the latest computing
technology and skilled operations intelligence analysts, at dramatically lower cost. We are experts in threat intelligence, with a team comprised of cryptologists, and security analysts from the U.S. Intelligence & Defense community who have protected the most sensitive assets in the world. Centripetal is based in Reston, VA with offices in Portsmouth, NH and Galway, Ireland.
The Network and Information Security Directive II (NIS2 Directive) is a comprehensive EU-wide piece of cybersecurity legislation designed to strengthen cybersecurity and resilience across the European Union. NIS2 replaces the earlier Network and Information Security Directive (NIS1), which was found inadequate in responding to the rising frequency and sophistication of cyber threats. Effective from 16 January 2023, NIS2 seeks to enhance collective cybersecurity among Member States by imposing rigorous obligations on critical infrastructure sectors. These obligations include expanded security requirements, enhanced cybersecurity risk management practices, and stricter reporting responsibilities, accompanied by tougher penalties for non-compliance. Member States were required to transpose the NIS2 Directive into national law by 17 October 2024, with the new regulations coming into effect on 18 October 2024.
The NIS2 Directive will expand the number of sectors impacted by the regulation from 7 to 18, categorizing them into essential and important entities. It will introduce new cybersecurity risk management measures and incident reporting obligations. The directive will intensify regulatory oversight including proactive supervision and enforcement. Furthermore, it will introduce a more stringent fine for failing to comply with requirements. Accountability will be imposed on top level management for non-compliance with cybersecurity obligations. In the event of a significant cyber incident, strict reporting requirements will be imposed. NIS2 mandates that essential and important entities adopt supply chain risk management reducing the risk of supply chain attacks.
As an EU directive, the NIS2 Directive requires each member state to transpose its provisions into their national or local legal frameworks. In Ireland, this process will be implemented through the National Cybersecurity Act 2024. Although the directive’s transposition deadline was October 17, 2024, Ireland has not yet met this deadline. Once enacted, the Act will serve as the primary legal instrument for incorporating the NIS2 Directive into Irish law. While NIS2 establishes baseline compliance standards, the National Cybersecurity Act will integrate these standards and introduce additional requirements tailored to Ireland’s specific national context.
Currently, the General Scheme of the National Cybersecurity Bill has been
published and is progressing through the legislative process in the Oireachtas.
Once it has completed the pre-legislative process, it will be brought forward through the legislative process in the Oireachtas:
Bill signed by the President into law
Chapter 1
What Sectors are included in the Scope?
The NIS2 Directive broadens the scope of its predecessor, NIS1, to include additional sectors and subsectors.
This expanded scope covers critical infrastructures that are vital for the functioning of the economy and society.
The graphic below provides an overview of the sectors listed in Schedule I and Schedule II of the NIS 2 Directive and forthcoming cybersecurity legislation, which are within the scope of the Directive and are required to comply with its provisions.
Schedule 1
DORA
Schedule 2
The NIS2 Directive applies to all medium and large entities operating within its covered sectors or services. Small and micro enterprises are generally exempt unless their activities are deemed critical to society. Large enterprises are defined as those with annual revenue of €50 million and 250 + employees, while medium enterprises have an annual revenue of €10 million and 50 + employees.
In the vast playing field of cyber protection, leveraging expert knowledge and AI technology is a game-changer. Collaborate with top-tier cybersecurity specialists who bring AI and human intelligence together. This partnership fortifies your defenses against a multitude of threats, allowing sports organizations to stay secure without stretching resources thin.
In the vast playing field of cyber protection, leveraging expert knowledge and AI technology is a game-changer. Collaborate with top-tier cybersecurity specialists who bring AI and human intelligence together. This partnership fortifies your defenses against a multitude of threats, allowing sports organizations to stay secure without stretching resources thin.
In the vast playing field of cyber protection, leveraging expert knowledge and AI technology is a game-changer. Collaborate with top-tier cybersecurity specialists who bring AI and human intelligence together. This partnership fortifies your defenses against a multitude of threats, allowing sports organizations to stay secure without stretching resources thin.
The NIS2 Directive categorizes entities into two groups: essential and important. This directive primarily focuses on medium and large sized organizations but also extends to smaller entities when their operations are deemed vital to societal and economic activities.
Essential Entities
Entities that fall under Schedule I of the NIS2 Directive and are classified as large organizations are deemed essential entities.
These include critical infrastructure sectors such as energy, transport, and healthcare. Additionally, any organization designated by the Minister or previously identified as an Operator of Essential Services or Digital Service Provider under the original NIS1 Directive will be classified as an essential entity. In Ireland, these designations will also be governed by the National Cyber Security Act 2024.
The Directive also includes small enterprises and microenterprises if their services are critical to the public or economy. Notably, qualified trust service providers, top-level domain (TLD) name registries, and DNS service providers are categorized as essential entities regardless of their size due to the importance of their services in ensuring internet security and stability.
All other entities that do not meet the criteria for essential entities but are covered under Schedule I or Schedule II, and are medium or large-sized organizations, are classified as important entities. Additionally, the Minister can designate an entity as important, even if it does not fit the standard classification. Public electronic communications network providers, public administration entities, and non-qualified trust service providers are considered important regardless of their size, given their significant role in the provision of critical services.
Scope and Inclusions of Small organisations
Summary of the Key
Criteria for Inclusion:
To determine whether your
organization falls under the NIS2
Directive, consider the following:
01
Is your company operating within any of the sectors listed above?
02
Does your company meet the size thresholds for medium or large enterprises?
03
Beyond general sector and size applicability, certain entities are specifically included due to their critical role or potential impact on society and the economy. These include:
Chapter 2
Effective cybersecurity governance is a top-level responsibility, and the NIS2 Directive and the National Cyber Security Bill emphasizes the accountability of senior leadership and management bodies in Essential and Important entities. The management board – the group responsible for overseeing and controlling the organization – must approve and monitor the implementation of cybersecurity risk-management measures. Failure to comply with these measures has serious consequences for top executives, including CEO’s, Directors, and Secretaries, who can be held personally accountable under the Act and the NIS2 Directive.
Chapter 3
The NIS2 Directive specifies a range of cybersecurity risk management measures that essential and important entities must implement as a minimum requirement. When your organization evaluates these measures, it’s beneficial to reference International Standards to guide implementation. When assessing the relevant cybersecurity risk management measures, consider factors such as the level of risk associated with your network and information systems, the size of your organization, the likelihood of an incident occurring, and the potential severity of such an incident. These measures include:
a. Policies for risk analysis and information system security;
b. Incident response and handling procedures;
c. Business continuity planning, including backup management, disaster recovery, and crisis management;
d. Supply chain security, covering the security aspects of relationships with direct suppliers or service providers;
e. Security in the acquisition, development, and maintenance of network and information systems, including vulnerability management and disclosure;
f. Policies and procedures to assess the effectiveness of cybersecurity risk management measures;
g. Basic cyber hygiene practices and cybersecurity training;
h. Policies and procedures for the use of cryptography and, where applicable, encryption;
i. Human resources security, access control policies, and asset management;
j. The use of multi-factor authentication, continuous authentication solutions, secured communication systems (voice, video, text), and secured emergency communication systems within the organization, where appropriate.
Currently, there are no specific guidelines or frameworks designed exclusively for implementing NIS2 requirements. However, the NIST Cybersecurity Framework 2.0 (NIST CSF 2.0), updated in February 2024, and ISO 27001:2022 are two internationally recognized frameworks that provide organizations with a structured, risk-based approach to managing and mitigating cybersecurity risks. Both frameworks align closely with the goals of the NIS2 Directive.
ISO 27001:2022
The ISO 27001:2022 framework enables organizations to establish, manage, and monitor an information security management system (ISMS). It addresses cybersecurity risk management measures through comprehensive risk assessments, the implementation of security controls across people, processes, and technology, and the application of organizational measures.
NIST CSF 2.0
The NIST CSF 2.0, widely adopted globally, offers practical guidance to organizations on how to identify, protect, detect, respond to, and recover from cyber incidents. Its most recent update includes enhanced emphasis on governance, risk management, supply chain risk management, and threat intelligence, making it even more relevant to the objectives of the NIS2 Directive.
To help you bridge any gaps and achieve compliance with NIS2 cybersecurity risk management measures, we’ve provided a comparison table of these frameworks, enabling a clear gap analysis and actionable insights.
SO 27001:2022 Requirements
Policies on risk analysis and information system security
4.4 Information Security Management System
5.2. Policy
5.3. Organizational Roles, Responsibilities, and Authorities
5.7 Threat intelligence
6.1.1. General – Identify and Manage Security Risks
6.1.2. Information Security Risk Assessment
6.1.3. Information Security Risk Treatment
9.3.2. Management Review Inputs
GV.RM-02: Risk appetite and risk tolerance statements are established, communicated and maintained.
GV.RM-06: A standardized method for calculating, documenting, categorizing and prioritizing cybersecurity risks is established and communicated
GV.PO-01: Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced.
GV.PO-02: Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission.
GV.OV-03: Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed.
5.24 Information security incident management planning and preparation
5.25 Assessment and decision on information security events
5.26 Response to information security incidents
5.27 Learning from information security incidents
8.20 Network security
8.21 Security of network services
ID.IM-04: Incident Response Plans and Cybersecurity Plans
RS.MA-01: Incident Response Plan Execution
RS.MI-01: Incident Containment
RS.MI-02: Incident Eradication
RS.MA-03: Incident Categorization and Prioritization
RS.MA-04: Incident Escalation
RS.MA-05: Criteria for Incident Recovery
RS.AN-07: Incident Data Collection and Integrity
RS.AN-03: Incident Analysis for Root Cause and Impact
DE.AE-02: Potentially Adverse Events Analyzed
DE.AE-03: Information Correlation from Multiple Sources
DE.AE-06: Information on Adverse Events Provided to Authorized Staff and Tools
DE.AE-08: Incidents Declared Based on Criteria
GV.SC-08: Cyber Supply Chain Risk Management
RC.RP-06: End of Incident Recovery Declaration
RS.AN-08: Incident Magnitude Estimation and Validation
Business Continuity, such as backup management, disaster recovery, and crisis management
5.30 ICT Readiness for Business Continuity
5.29 Information Security During Disruption
8.13 Information Backup
8.14 Redundancy of Information Processing Facilities
GV.SC-07 (Cyber Supply Chain Risk Management)
ID.IM-02 (Improvement – Security Tests & Exercises)
ID.IM-04 (Incident Response & Cybersecurity Plans)
PR.DS-11: Backups of data are created, protected, maintained, and tested
5.19 Information Security in Supplier Relationships
5.20 Addressing Information Security within Supplier Agreements
5.21 Managing Information Security in the ICT Supply Chain
5.22 Monitoring, Review, and Change Management of Supplier Services
GV.SC-01: A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders
GV.SC-03: Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes
GV.SC-05: Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties.
GV.SC-09: Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle
GV.SC-10: Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement
5.23 Information security for use of cloud services
8.25 Secure development life cycle
8.28 Secure coding
8.29 Security testing in development and acceptance
7.13 Equipment maintenance
8.22 Segregation of networks
8.32 Change management
8.8 Management of technical vulnerabilities
8.9 Configuration management
PR.PS-06: Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle
ID.RA-09: The authenticity and integrity of hardware and software are assessed prior to acquisition and use
ID.RA-10: Critical suppliers are assessed prior to acquisition
ID.RA-07: Changes and exceptions are managed, assessed for risk impact, recorded, and tracked
ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded
6.1.1. General – Identify and Manage Security Risks
6.1.2. Information Security Risk Assessment
6.1.3. Information Security Risk Treatment
GV.PO-02: Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission.
PR.AT-01: Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind
Policies and Procedures regarding the use of cryptography and encryption
8.24 Use of cryptography
PR.AA-01: Identities and credentials for authorized users, services, and hardware are managed by the organization
PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected
PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected
6.1 Screening
6.2 Terms and conditions of employment
6.4 Disciplinary process
6.5 Responsibilities after termination or change of employment
6.6 Confidentiality or non-disclosure agreements
5.15 Access control
5.18 Access rights
5.11 Return of assets
5.10 Acceptable use of information and other associated assets
5.9 Inventory of information and other associated assets
PR.AA-01: Identities and credentials for authorized users, services, and hardware are managed by the organization
GV.RR-04: Cybersecurity is included in human resources practices
ID.AM-05: Assets are prioritized based on classification, criticality, resources, and impact on the mission
PR.AA-06: Physical access to assets is managed, monitored, and enforced commensurate with risk
Multi-Factor Authentication, Secured Voice, Video, Text Communications
PR.AA-03: Users, services, and hardware are authenticated
s organizations begin to understand the scope of the NIS2 Directive, there is a strong emphasis on adopting a risk-based approach to cybersecurity, which requires Essential and Important entities to implement ‘proportional and appropriate’ security measures.
This aligns closely with globally recognized frameworks such as ISO 27001 and NIST CSF 2.0, which emphasize continuous risk assessment, threat intelligence integration, and proactive security controls. However, traditional cybersecurity measures often struggle to keep pace with the scale and sophistication of modern threats, leaving organizations exposed to increasingly complex attacks. Effective cyber risk management demands a strategic, intelligence-driven approach—one that not only identifies risks, but actively mitigates them in real-time.
A key requirement under the NIS2 Directive is the establishment of a risk management framework (Article 21(2), Point (a)), which mandates relevant entities to identify, assess, and address cybersecurity risks to their network and information systems. This includes conducting documented risk assessments, establishing risk treatment plans, and integrating cyber threat intelligence into the risk analysis process. Organizations must analyze threats by assessing their likelihood, impact, and overall risk level, while also ensuring that risk decisions and residual risks are formally accepted by accountable leadership.
Centripetal revolutionizes cybersecurity risk management by operationalizing the world’s largest collection of cyber threat intelligence
Our CleanINTERNET® service delivers real-time protection at line speed, filtering out millions of known threats before they reach an organization’s network. By continuously monitoring and shielding against malicious traffic, Centripetal helps businesses comply with ISO 27001:2022 (5.7 Threat Intelligence) by collecting, analyzing, and applying threat intelligence to enhance security posture. This approach results in the elimination of malicious traffic at the perimeter, preventing threats from ever reaching the network.
By eradicating harmful activity before it can infiltrate internal systems, organizations significantly reduce the likelihood and impact of security incidents, strengthening the overall security posture. This proactive approach significantly reduces alert fatigue, allowing security teams to focus on critical incidents rather than being overwhelmed by redundant alerts. By enforcing intelligence-driven protection at the network perimeter, reducing the attack surface and lowering overall cyber risk exposure,
Chapter 4
Incident reporting plays a crucial role in ensuring cybersecurity and operational resilience. Under the NIS2 Directive, organizations must report “significant incidents” to the Computer Security Incident Response Team (CSIRT) or the relevant authority without delay (Article 23). In Ireland, the National Cyber Security Centre (NCSC), which includes CSIRT-IE, has primary responsibility for incident reporting and acts as the national competent authority. NIS2 requires both mandatory and voluntary incident notifications (Articles 23 and 30), aimed at ensuring timely reporting and promoting proactive engagement with the CSIRT to safeguard critical services.
Under the NIS2 Directive, organizations must report incidents that are deemed “significant,” but what does that mean in practice?
According to Article 6(6), an incident is any event that compromises the availability, authenticity, integrity, or confidentiality of data or the services provided through network and information systems.
However, an incident is classified as “significant” under Article 23(3) if it either (a) causes or has the potential to cause severe operational disruption or financial loss to the affected entity, or (b) results in considerable material or non-material damage to other individuals or organizations.
According to Article 3 of the implementing regulation, an incident is considered significant if it meets one or more of the following conditions:
The incident results in or could result in the death of a person or considerable damage to a person’s health.
A successful and potentially malicious unauthorized access to network and information systems.
Even if individual incidents are not significant, they are considered significant when they recur at least twice within six months and share the same apparent root cause.
The regulation also includes additional specific criteria for different sub-sectors, such as cloud computing service providers, DNS service providers, and data centre service providers, which must also be considered when determining the significance of an incident (see Table 1).
Content Delivery Network Providers
Providers of Social Networking Services Platforms
Planned maintenance-related service downtimes are not considered significant incidents. This distinction separates routine service interruptions from genuine security or operational failures that require reporting.
Entities affected by significant incidents based on the criteria above are required to notify their CSIRT or relevant competent authority. They must also inform service recipients about significant cyber threats that could impact them and suggest any appropriate response measures (Article 23(1)).
All relevant entities must submit the following reports to the CSIRT or competent authority:
An early warning within 24 hours of becoming aware of the significant incident, indicating whether the incident is suspected of being caused by unlawful or malicious acts or could have a cross-border impact.
An incident notification within 72 hours of becoming aware of the significant incident, updating information provided in the early warning and including, indicate an initial assessment including its severity and impact, and the indicators of compromise.
An intermediate report if requested by the CSIRT, providing relevant status updates.
A final report no later than one month after the submission of the incident notification, detailing the incident, its severity, impact, the likely threat or root cause, mitigation measures applied or ongoing, and the cross-border impact of the incident where applicable.
In the event of an ongoing incident, entities must provide a progress report at the time of the submission of the final report and a final report within one month of handling the incident.
With NIS2’s strict reporting requirements—demanding early warnings within 24 hours and full reports within 72 hours—organizations must detect, assess, and report cybersecurity incidents quickly. Centripetal’s CleanINTERNET® alleviates this pressure by delivering real-time threat intelligence, automated shielding, and actionable reporting to prevent threats from escalating into reportable incidents.
Security Analysts work closely with clients to tailor risk models, alerts, and reporting procedures, ensuring incidents are accurately categorized and documented in compliance with NIS2. With detailed reporting and executive insights, organizations can track potential incidents and submit timely, accurate notifications to CSIRTs or national cybersecurity agencies.
By leveraging over 100 billion indicators of compromise, CleanINTERNET® proactively detects and blocks threats.
100
billion cyberattacks
attempts per week
15 min.
With threat intelligence updated every 15 minutes, Centripetal also supports NIS2’s information-sharing requirements by ensuring organizations have access to the most current cyber threat data. CleanINTERNET® enhances collaborative cyber defense efforts, enabling essential and important entities to share actionable intelligence while strengthening overall security.
By continuously monitoring, enforcing proactive security measures, and streamlining compliance processes, Centripetal ensures organizations have the critical information they need—when they need it—so they can meet NIS2 deadlines with confidence.
Indicators of Compromise (loCs)
CleanINTERNET® generates
a wide range of loCs, including:
Threat Intelligence Data Centripetal
provides real-time insights into the
tactics, techniques, and procedures
(TPs) used by threat actors, including:
01
Identify the Scope of
Assets and Services:
02
Implement an Incident
Response Plan:
03
04
Provide Ongoing Training:
05
Conduct Incident Response Tabletop Exercises:
06
07
Stay Up to Date with NCSC Incident Response Forms:
By integrating CleanINTERNET® into your cybersecurity strategy, Centripetal enables you to meet the NIS2 Directive’s strict incident reporting requirements while enhancing your overall incident detection, response, and mitigation capabilities.
Chapter 5
Overview
The NIS2 Directive stands out as a landmark regulatory framework aimed at strengthening the security and resilience of network and information systems across the European Union (EU). One of its key provisions—outlined in Recital 116 and Article 26 of the NIS2 Directive—addresses a critical compliance requirement: non-EU entities offering digital services within the EU must designate a representative established in the Union. This chapter explores the geographical implications of this requirement and provides practical guidance on interpreting jurisdiction, determining obligations, and appointing a representative.
The NIS2 Directive is designed to account for the cross-border nature of digital services. It establishes clear jurisdictional rules for determining which Member State oversees regulatory compliance.
Main Establishment Rule:
Jurisdiction is attributed to the Member State where the entity has its main establishment in the Union—defined as the location where decisions on cybersecurity risk management are predominantly taken.
Fallback Criteria:
If the above cannot be determined, jurisdiction falls to the Member State where cybersecurity operations are carried out or, failing that, the location with the highest number of employees.
Non-EU Entities:
If an entity is not established in the Union but offers services within it, it must designate a representative in an EU Member State where those services are provided. This representative acts as the official point of contact for authorities and CSIRTs.
To help you bridge any gaps and achieve compliance with NIS2 cybersecurity risk management measures, we’ve provided a comparison table of these frameworks, enabling a clear gap analysis and actionable insights.
These “relevant entities” must assess whether they are actively offering services within the Union.
The Directive outlines several indicators for
determining intent to offer services within the Union:
Indicators that trigger compliance:
Use of a language or currency commonly used in one or more Member States
Availability of service ordering in an EU language
References to EU-based customers or testimonials
Marketing or targeting users within the Union
Merely having a website accessible from the EU or listing contact information is not sufficient to establish intent.
The Role of the Designated Representative
The designated representative is formally appointed through a written mandate and acts on behalf of the non-EU entity.
Their responsibilities include:
The representative must be formally appointed by a written mandate and be established in a Member State where services are offered.
Strategic and Legal Implications
Appointing a representative is not just a formality. It signifies operational and legal accountability in the EU.
Furthermore:
What This Means for US
and UK-Based Companies
To maintain access to EU markets and ensure legal compliance, companies in both the US and UK must align their cybersecurity practices with NIS2 standards, prepare for increased regulatory scrutiny, and treat the designation of a representative as a foundational compliance step—not a formality.
Final Reflections
By ensuring clear jurisdiction and local representation, organizations:
As cybersecurity continues to grow in importance, aligning with NIS2 is not only a legal necessity—it’s a business advantage.
Chapter 6
Ireland’s National Cyber Security Centre (NCSC) has taken centre stage in the country’s implementation of the NIS 2 Directive. The NCSC has been formally established on a statutory basis under the proposed National Cyber Security Bill 2024 (“the Bill”), which defines its legal mandate and powers. As the designated competent authority for cybersecurity in Ireland under NIS 2, the NCSC is charged with both regulatory oversight and operational cyber defense roles. As we provide a deeper insight into how the role of the NCSC affects Irish businesses, we aim to provide an understanding of the practical implications for compliance and cybersecurity risk management in your organisation.
What is the National Cyber Security Centre?
The NCSC is an executive office within the Department of the Environment, Climate and Communications. It was originally created in 2011 but lacked formal legislative authority. The new 2024 Bill (Head 3) gives the NCSC a statutory basis and significantly expands its functions.
The NCSC also acts as a trusted liaison between the Irish State and international cyber agencies.
It’s primary responsibilities include:
The NCSC is the Lead Competent Authority, guiding the implementation of NIS2 across all sectors.
It serves as Ireland’s national CSIRT, leading incident response and coordination
It is designated as the Single Point of Contact for EU-level cooperation
Other sectoral regulators, such as Commission for Communications Regulation (ComReg) for ICT Service Management, Digital providers, Space and Digital Infrastructure Sectors act as competent authorities within their domains. The NCSC is designated as the competent authority for “all other sectors” covered by NIS2 that are not explicitly assigned to sectoral regulators. Therefore, the NCSC oversees coordination and fills in for sectors without dedicated regulators. This centralised role means that many businesses—particularly those in public administration—will engage directly with the NCSC for regulatory and operational matters.
As Ireland’s lead authority under NIS2, the NCSC plays a central role in both coordinating and enforcing cybersecurity obligations. Under the National Cyber Security Bill 2024, it holds legal powers to supervise compliance and, where necessary, impose penalties.
Essential and Important Entities are required to report significant cyber incidents promptly—within 24 hours of detection, followed by a detailed report within 72 hours, and a final submission within one month. These timelines, outlined in Head 15 of the Bill, align with EU requirements.
Enhanced Operational Powers of the NCSC under the Bill
The National Cyber Security Bill 2024 grants the NCSC significant operational powers, enabling it to take a proactive role in national cyber defense. These capabilities reflect the Centre’s evolving mission—from reactive incident responder to active guardian of Ireland’s digital infrastructure. For business leaders, especially those operating essential or important services, understanding these powers is vital for preparedness and compliance.
Some of the key powers provided by the Bill include:
Chapter 7
As Ireland moves to implement the NIS2 Directive through the National Cyber Security Bill 2024, the pressure on
business leaders to elevate cybersecurity readiness is intensifying. Compliance is no longer a future goal-it’s
a present priority. But beyond avoiding fines or passing audits, the real opportunity lies in building smarter, more
resilient organisations.
Centripetal’s CleanINTERNET® services offer a powerful solution at the intersection of innovation and
cybersecurity, redefining how organisations protect their networks. More than just a cybersecurity solution,
CleanINTERNET® enables organisations to proactively defend against threats, align with regulatory expectations,
and drive operational confidence in an era of heightened risk.
01
Organizations must implement technical and organizational measures that effectively manage cybersecurity risks. These include, but are not limited to:
The expectation is that cybersecurity is governed at board level, embedded into enterprise risk frameworks-not delegated solely to IT. This may require material investment in capabilities, including dedicated cybersecurity leadership (e.g., CISO), continuous monitoring technologies, and alignment with industry standards like ISO/IEC 27001.
02
Entities must notify the NCSC (or sectoral competent authority) of any incident that significantly impacts the provision of services:
This represents a major shift for many organizations previously unaccustomed to regulated breach reporting. To comply, businesses must have incident detection and escalation processes in place-often necessitating managed detection services, or for larger organizations, the implementation of a Security Operations Centre (SOC) .. While reporting is non-punitive in principle, failure to notify is a breach, and subject to enforcement.
03
The NCSC and relevant sectoral authorities will conduct supervisory activities to verify compliance. These may include:
Ongoing regulatory engagement is expected, particularly for Essential Entities. Boards should be prepared for formal accountability, and compliance teams must ensure readiness for audit at any time.
Penalties for Non-Compliance:
In short, NIS2 elevates cybersecurity from operational risk to a regulated obligation. Boards, executives, and GRC leaders must now view cyber resilience as a core part of business continuity, legal compliance, and reputational protection.
Compliance and Challenges: What Business
Leaders must anticipate
Costs and Impact
Implementing NIS2 will require ongoing investment in security infrastructure, governance,
and personnel. While the NCSC is state-funded, other regulators such as ComReg and the CRU are expected to recover supervision costs through sector-specific levies-enabled under Head 19 of the National Cyber Security Bill.
For organizations near the “Important Entity” threshold-especially SMEs or mid-sized
digital providers-these costs can be material. Compliance is not a one-time project; it
becomes an operational expense, with costs incurred annually for:
To manage this effectively, organizations should align with international standards such as
ISO/IEC 27001, Cyber Essentials, or NIST CSF-allowing for structured controls that can
serve multiple compliance regimes at once.
Timeline and Transition
While initial supervisory approaches may focus on education and cooperation, organisations
will be expected to demonstrate clear progress in key areas:
A gap assessment against NIS2 obligations is essential. Most non-compliant organisations
will fall short due to a lack of centralised monitoring, unclear incident ownership, or
inadequate supplier and third-party security management.
The NCSC and sectoral regulators have been granted enforcement powers that include:
A gap assessment against NIS2 obligations is essential. Most non-compliant organizations
will fall short due to a lack of centralized monitoring, unclear incident ownership, or
inadequate supplier and third-party security management.
Those that act early-investing in the right controls,
governance structures, and partnerships-won’t just
avoid penalties. They will be better positioned to lead
in a digital economy that rewards transparency,
accountability, and preparedness.
For businesses, this creates a dual imperative:
As the enforcement of the NIS2 Directive and Ireland’s National Cyber Security Act draws near, one
thing is clear: reactive cybersecurity is no longer sufficient. Organizations must now demonstrate
continuous, intelligence-powered cybersecurity. This is where Centripetal delivers exceptional value.
A recognized global leader in threat intelligence-powered network defence, Centripetal’s CleanINTERNET® service operationalizes over 10 billion threat indicators offering a level of protection and visibility that aligns directly with NIS2’s core risk management requirements.
CleanINTERNET® Enterprise integrates into existing network
infrastructure to enforce custom security policies based on threat intelligence relevance. It continuously filters inbound and outbound traffic, preventing malicious communications without degrading performance or interrupting legitimate operations.
CleanINTERNET® DNS blocks access to known malicious domains -ransomware, phishing, botnets, and command-and-control infrastructure-before connections are even established. CleanINTERNET® DNS is a cost-effective enterprise solution that protects remote users by blocking access to malicious sources and ensuring the integrity of network and data from remote assets. This capability significantly enhances an organisation’s DNS-layer visibility and defence, offering broader scale and more granular insights that complement existing measures such as those provided by the NCSC.
Reducing Organizational
Risk & Enabling Compliance
CleanINTERNET® plays a direct role in helping Irish organisations reduce cyber exposure, meet regulatory requirements, and enhance operational maturity under NIS2.
By blocking verified threats at the edge, CleanINTERNET® supports NIS2's requirement for technical controls that reduce risk at source- preventing attacks before they impact systems or services.
CleanINTERNET® provides granular visibility into attempted intrusions, helping security teams detect events early and respond within the 24/72-hour incident notification windows defined by the NIS2 Directive.
Where NCSC sensor deployment is voluntary and limited by consent, Centripetal delivers advanced threat detection and enforcement- across the full network perimeter, with tailored threat profiles and policy-based controls.
Why Leading Organizations
Choose Centripetal
CleanINTERNET® filters billions of packets daily, ensuring that only clean traffic reaches your environment. This drastically reduces exposure to known threats and attack infrastructure.
Unlike the limited, consent-based NCSC scans, Centripetal performs enterprise-grade network monitoring continuously, customized to your threat landscape.
Integrating threat intelligence, policy enforcement, and managed detection into one service can streamline operations and maximises ROI on security investments.
Take Control of Your
Cyber Risk
With the compliance deadline fast approaching, there’s no time for half-measures. Centripetal enables you to move beyond checkbox compliance-toward a defensible, intelligence-led security posture that reduces risk and inspires confidence among stakeholders, regulators, and customers.
Visit www.centripetal.ai to learn more about CleanINTERNET® services and how we can help your business meet and exceed NIS2 expectations.