Cybersecurity

Our company must comply with 

cybersecurity regulations (NIS2)

Understand your obligations, assess your risks and achieve compliance quickly with the support of our experts.


What is the NIS2 Directive?

NIS2 is a European regulation that requires thousands of companies, small and large, to strengthen their cybersecurity.

Its objective is simple: to prevent a cyberattack on one company from disrupting an entire business chain, an essential service or public safety.

From 2024–2025 onwards, NIS2 imposes a series of concrete obligations:

  • Better protection of IT systems
  • Strict access management
  • Reliable backups
  • Continuous monitoring
  • Team training
  • Ability to respond in the event of an incident

This framework is no longer reserved for very large organisations: many SMEs are now concerned, sometimes even indirectly when they work for an essential or important entity. Many are still unaware of it.

 

How do you know if your company is affected by NIS2?​

Several criteria determine whether you fall within the scope of NIS2.

The size of your company : 
NIS2 applies to organisations of at least medium size. 

Your business sector : 
In its annexes, NIS2 divides the economy into 18 so-called “critical” sectors: energy, transport, health, water, digital infrastructure, banking, public administration, production of chemical, medical or electronic products, food sector, waste management, digital services, etc.

Companies working with a partner from one of these sectors are also concerned.

On this basis, NIS2 classifies the organisations covered into two categories: 
Essential entities (the largest and most critical)
Important entities. It is therefore clear that far more companies than one might think are affected by these directives. 

The ABAKUS solution

The ABAKUS cybersecurity team provides end-to-end support for your NIS2 compliance, from the precise identification of your status through to the operational implementation of the required measures.

NIS2 diagnosis

Implementation of NIS2 obligations

CyFun & ISO 27001 certification

01

Structured NIS2 diagnosis

We start with a structured NIS2 diagnosis, enabling us to confirm whether your company is classified as an essential or important entity, assess your current level of security and define the priority actions required to bring you into compliance quickly and effectively.

02

Concrete implementation

Based on this diagnosis, our experts guide you through the concrete application of NIS2 obligations: risk management, securing your infrastructure, network hardening, access and identity management, backups, vulnerability management, encryption, documentation and training of management and teams... You benefit from pragmatic support, adapted to SMEs as well as more complex organisations, and focused on immediately applicable solutions.

03

Recognised certifications

Finally, ABAKUS prepares you for and leads you towards one of the two recognised certifications to prove your compliance:

CyFun, a Belgian framework recognised by the Centre for Cybersecurity Belgium, fast and perfectly suited to SMEs;
ISO 27001, the international reference standard for structured and proven information security management.

We support you through all stages (gap analysis, preparation, documentation, best practices, audit) until certification is achieved and you gain peace of mind regarding legal requirements.

Work with our cybersecurity team

Frédérick Georges

Frédérick Georges

Partner – Administration & Control

Marc Cormann

Marc Cormann

Senior Security Engineer

Anthony Marpaux

Anthony Marpaux

Senior Security Engineer

Tim Kistemann

Tim Kistemann

Security Engineer

Ready to secure your business?

Let's talk about your cybersecurity needs

Our experts are available to support you in your cybersecurity transformation.

Expert
Expert available

Cybersecurity needs?

Our experts are available to support you with your compliance.

Book a meeting
Free resource

30 things to check in your company

The majority of cyberattacks affecting SMEs could be avoided with a few simple checks. This checklist allows you to quickly assess your security level.

Receive the checklist
                            Expert
                            Expert available

                            Cybersecurity needs?

                            Book a meeting
                            Not ready for a call yet? Download our resources