Skip to main content
EU cybersecurity directive

What is NIS2 Cybersecurity Training

NIS2 (Directive (EU) 2022/2555) makes cybersecurity training a named technical and organisational measure for essential and important entities across the EU. Article 20 holds management body members personally liable for the program. Penalties run to EUR 10 million or 2% of global turnover for essential entities, with national competent authorities now scoping their first inspections.

By Last reviewed

NIS2 Article 21(2)(g) makes cybersecurity training a mandatory technical and organisational measure across essential and important entities

NIS2 is the European Union Network and Information Systems Directive 2, formally Directive (EU) 2022/2555. It entered into force on 16 January 2023 and replaced the 2016 NIS Directive, expanding coverage to roughly 160,000 organizations across 18 sectors. Member States had until 17 October 2024 to transpose the directive into national law. Most missed that deadline. Belgium published its NIS 2-Wet / Loi NIS 2 in time and brought it into force in October 2024. Germany is still legislating the NIS2UmsuCG. The Netherlands continues to advance the Cyberbeveiligingswet draft. France issued ANSSI guidance pending the formal transposition. Italy, Spain, and Ireland are at various stages of decree, real decreto, or general scheme. The operative deadline in any given country is whichever date the national transposition law sets, but the directive obligations apply to in-scope entities regardless of national delays.

Article 21(2)(g) names cybersecurity training explicitly. It requires entities to implement "basic cyber hygiene practices and cybersecurity training" as one of ten minimum risk-management measures. The wording is short, but the practical effect is large. Every essential and important entity has to put a named training program in place, document who completed it, refresh it on a regular cadence, and present the records when a national competent authority audits. The directive does not prescribe a curriculum, which means the burden of demonstrating that training is proportionate to the risk and to the size of the entity sits with the entity itself.

Article 20 raises the stakes. It requires the management body of each essential and important entity to approve the cybersecurity risk-management measures, oversee their implementation, and follow specific training to gain enough knowledge to identify risks and assess practices. The directive then makes management body members personally liable for infringements of the risk-management duty. National competent authorities can publicly disclose infringements, suspend certifications, and temporarily prohibit named individuals from exercising managerial functions. Training that stops at general staff fails Article 20. Training that ignores management body members fails Article 20.

The penalty regime is split by entity tier. Essential entities (energy, transport, banking, financial market infrastructure, healthcare, drinking water, wastewater, digital infrastructure including DNS, TLD registries, cloud, data centres, ICT-managed services, public administration, space) face administrative fines up to EUR 10 million or 2% of global annual turnover, whichever is higher. Important entities (postal and courier, waste management, chemicals, food, manufacturing of medical devices, computers, electronics, machinery, motor vehicles, transport equipment, digital providers including online marketplaces, search engines, social networks, research) face up to EUR 7 million or 1.4% of global annual turnover. The "cyber hygiene" framing in Article 21(2)(g) is the article auditors cite first when they sample a training program.

How NIS2 governs cybersecurity training and cyber hygiene

1

Stage 1: Scope determination (essential vs important entity)

The entity first checks whether it falls under NIS2 at all. Coverage runs across 18 sectors split into Annex I (essential) and Annex II (important), with size thresholds based on EU Commission Recommendation 2003/361/EC. Generally medium and large enterprises (50+ employees, EUR 10M+ turnover or balance sheet EUR 43M+ for important; 250+ employees, EUR 50M+ turnover for essential) are in scope. Sector-specific overrides catch some smaller entities regardless of size, including trust service providers, top-level domain name registries, DNS service providers, and providers of public electronic communications networks. Non-EU entities offering services in the EU under Article 26 fall in scope and must designate an EU representative.

2

Stage 2: Article 20 governance and management body training

Article 20 places approval and oversight of the cybersecurity risk-management measures on the management body itself. The same article requires each member of the management body to follow training that gives them sufficient knowledge to identify risks and assess practices. The directive then attaches personal liability for infringements, including the option for national competent authorities to temporarily prohibit a named individual from exercising managerial functions. A board-only briefing is no longer enough. The management body needs an evidenced, role-specific track that addresses governance responsibilities, the entity's risk posture, and the implications of non-conformance.

3

Stage 3: Article 21(2)(g) cyber hygiene practices and cybersecurity training program

Article 21(2)(g) requires basic cyber hygiene practices and cybersecurity training across the workforce. The most defensible interpretation pairs role-based scenario exercises (phishing, vishing, business email compromise, deepfake, OAuth consent abuse, mobile device security) with policy literacy modules (password and credential hygiene, encryption and lock discipline, incident reporting, acceptable use). Cyber hygiene language tracks the ENISA risk-management measures guidance. Auditors look for evidence the program is proportionate to the risk, refreshed on a regular cadence (annual is the floor, monthly cadence with role-based content is the practical benchmark), and that completion records survive a sample audit.

4

Stage 4: Article 21(2)(b) incident handling and Article 23 incident reporting cadence

Article 21(2)(b) requires named incident handling procedures spanning detection, response, and recovery. Article 23 then defines the reporting cadence: an early warning to the competent authority or CSIRT within 24 hours of becoming aware of a significant incident, an incident notification within 72 hours, and a final report within one month. Front-line staff need to recognize a significant incident and start the notification chain immediately. That recognition is a trained skill, drilled through reporting-culture exercises, general incident reporting modules, and personal data breach scenarios that mirror the actual notification path.

5

Stage 5: Article 21(2)(d) supply chain security and Article 21(2)(i) HR security

Article 21(2)(d) requires supply chain security measures including direct suppliers and service providers. Procurement, engineering, and security teams need scenario training on third-party app OAuth risks, vendor onboarding verification, and the wire-instruction-change patterns that drive most BEC losses. Article 21(2)(i) requires human resources security, access control policies, and asset management. Joiner-mover-leaver awareness, guest access management, verification procedures for help desk requests, and encryption and lock discipline all map directly to this measure. National competent authorities now sample whether the training program reaches across these adjacencies, not just the core phishing module.

6

Stage 6: National competent authorities, audits, and the penalty regime

Each Member State designates one or more national competent authorities. The CCB (Centre for Cybersecurity Belgium) supervises Belgian entities under the NIS 2-Wet / Loi NIS 2. The BSI fills that role for Germany under the pending NIS2UmsuCG. ANSSI handles France. NCSC supervises Ireland. AGID and ACN cover Italy. The penalty schedule allows administrative fines up to EUR 10 million or 2% of global annual turnover for essential entities, EUR 7 million or 1.4% for important entities, plus public reprimands, suspension orders, and personal liability for management body members. ENISA coordinates EU-wide guidance and runs the central CSIRT network. The first inspection cycle is now scoping in jurisdictions where the transposition law is in force.

How Member States are enforcing NIS2 training requirements

Belgium NIS 2-Wet / Loi NIS 2 in force since October 2024

Belgium became the first EU jurisdiction with a fully operational NIS2 transposition. The NIS 2-Wet / Loi NIS 2 entered into force in October 2024, on the directive deadline. The Centre for Cybersecurity Belgium (CCB) is the national competent authority and CSIRT. Its CyFun framework translates the Article 21(2) measures into auditable controls including training, with a maturity-based assessment that essential entities must reach within set windows. CCB audit powers include the EUR 10 million or 2% global turnover penalty schedule for essential entities and the EUR 7 million or 1.4% schedule for important entities. CCB published implementing royal decrees and a sector-specific registration portal. Belgian essential entities now operate under a working enforcement regime, which means the training-evidence question is no longer hypothetical.

Germany NIS2UmsuCG draft delays and the legal limbo for essential entities

Germany missed the 17 October 2024 transposition deadline. The NIS2-Umsetzungs- und Cybersicherheitsstaerkungsgesetz (NIS2UmsuCG) draft has moved through cabinet several times without entering force. The BSI continues to issue practical guidance under the existing IT-Sicherheitsgesetz framework, but German entities know the NIS2 obligations apply once the transposition law is published. Several large operators of essential services have built training programs in advance to be inspection-ready on day one. The directive itself is binding on Member States, not directly on private entities until national law transposes it, but European Court of Justice direct-effect doctrine means an in-scope entity that ignores Article 21(2)(g) entirely while waiting for German law cannot expect a sympathetic inspection on the day the law arrives.

CCB CyFun framework as a worked example of Article 21(2)(g) in practice

The Belgian CyFun framework is the cleanest published example of how a national competent authority translates the NIS2 risk-management measures into auditable controls. CyFun maps each Article 21(2) measure to a set of named controls, assigns a maturity level (Basic, Important, Essential), and requires the entity to demonstrate progress toward the target maturity within a sector-specific deadline. The training control sits inside the Awareness and Training capability and references both Article 20 (management body) and Article 21(2)(g) (workforce cyber hygiene). The framework also points to the role-based content other authorities now reference: phishing scenarios, incident reporting drills, supply chain awareness, and management body governance modules. Entities operating in multiple Member States increasingly use CyFun as a working baseline pending each national law.

How RansomLeak satisfies NIS2 cyber hygiene and training requirements

Article 21(2)(g): cyber hygiene practices and cybersecurity training

RansomLeak runs scenario-based phishing, vishing, smishing, BEC, deepfake, mobile device, and OAuth abuse exercises that map directly to the cyber hygiene practices Article 21(2)(g) requires. Each module ships as a SCORM 1.2 and SCORM 2004 package and as a hosted assignment, with completion records exportable in the format national competent authorities sample. The catalogue covers the workforce baseline plus role-specific tracks that demonstrate proportionality to the entity size and risk.

Article 21(2)(b): incident handling detection, response, and recovery

General incident reporting, reporting culture, and personal data breach response exercises drill the recognition and escalation path the Article 23 cadence depends on. Learners practice the actual decision: is this a significant incident under the directive, who do I notify, and what evidence do I preserve. The 24-hour early warning, 72-hour notification, and one-month final report are taught as a chained timeline, not a static slide.

Article 21(2)(d): supply chain security including direct suppliers

Third-party app OAuth risks, invoice and payment fraud, and verification procedures exercises cover the supply chain attack surface most national competent authorities flag in their first audit cycles. The procurement and engineering tracks include vendor onboarding verification, OAuth consent governance, and the wire-instruction-change pattern that drives most BEC losses. The training evidence ties each completion to a named supplier-touching role.

Article 21(2)(i): human resources security, access control, asset management

Joiner-mover-leaver awareness, guest access management, encryption and lock discipline, employee security responsibilities, and verification procedures exercises map to the HR security and access control measures. The catalogue addresses both joiners (provisioning hygiene) and leavers (deprovisioning and asset return) explicitly, which closes the gap most audit findings cite.

Article 21(2)(j): cryptography and encryption policies

Encryption and lock discipline, mobile device security, and VPN usage and safety exercises cover the cryptography and encryption obligations across endpoints, removable media, and remote access. Learners practice the everyday decisions that turn a written cryptography policy into observed behaviour, including device lock cadence, removable media handling, and trusted-network discipline.

Article 20: management body approval, oversight, and personal liability

A dedicated management body track addresses the governance responsibilities Article 20 places on leadership specifically. Content covers risk-management measure approval, oversight cadence, the personal liability regime, the public-disclosure and prohibition powers of national competent authorities, and the current-threat briefing the management body needs to assess practices. The track ships with a separate completion record so the management body evidence is never bundled with general staff records.

Article 23: incident reporting cadence (24 hours, 72 hours, one month)

Reporting culture and general incident reporting exercises rehearse the three-stage notification path against a working clock. Learners practice the 24-hour early warning content, the 72-hour notification structure, and the one-month final report scope, plus the recipient-of-service notification trigger. The drills mirror what the CSIRT and competent authority actually receive, not a textbook description.

Article 21(2)(e): security in the acquisition of network and information systems

AI security exercises (deepfake audio detection, prompt injection, third-party app OAuth risks, mobile app permissions) cover the AI-specific surface several national competent authorities now reference under Article 21(2)(e). Procurement and engineering tracks address the acquisition security questions for AI components, supply chain dependencies, and OAuth-based integrations into core systems.

How RansomLeak builds an audit-ready NIS2 program

NIS2 audits sample evidence, not intent. A scenario-based exercise that drops the learner into an inbox, a vishing call, a BEC pretext, or a deepfake video conference produces a completion record an auditor can map back to Article 21(2)(g) and to the specific risk it addresses. A 30-minute compliance video produces a completion record that says the learner watched a video. The directive does not prescribe a format, but national competent authorities tend to read "proportionate to the risk" as evidence that the training reflects current attacker tradecraft. The Verizon DBIR 2024 baseline (68% of breaches involve a non-malicious human element) and the EUR 25 million Arup deepfake wire fraud both sit inside the NIS2 risk picture competent authorities reference. Scenario-based content tracks that reality in a way recorded videos cannot.

Role-based assignments are how a NIS2 program demonstrates proportionality. The management body track satisfies Article 20: governance content, the personal liability regime, and the current-threat briefing required to assess practices. The general staff track satisfies the Article 21(2)(g) workforce baseline: phishing, password hygiene, mobile device security, lock and encryption discipline, incident reporting. The IT and help desk track addresses Article 21(2)(b) and Article 21(2)(i): vishing, MFA-reset social engineering, verification procedures, joiner-mover-leaver hygiene. The procurement and engineering track addresses Article 21(2)(d) and (e): third-party app OAuth risks, vendor verification, supply chain BEC patterns. Each track ships with its own completion roster, so the audit evidence is segmented by role from day one.

The export pack is what national competent authorities request during inspection. RansomLeak completion records export per learner, per role, per module, with policy acknowledgment timestamps, scenario-pass evidence, and module-content metadata that ties the exercise back to the specific Article 21 measure it supports. The data lands in the format the CCB, BSI, ANSSI, NCSC, AGID, ACN, and the rest of the EU competent-authority pool sample during their reviews. Programs that built the export pack before the first inspection cycle save days of audit response time over programs that try to assemble the evidence after the request lands.

What is NIS2 cybersecurity training and who has to do it?

NIS2 cybersecurity training is the named cyber hygiene practices and cybersecurity training program required by Article 21(2)(g) of Directive (EU) 2022/2555 across essential and important entities in the European Union. The directive entered into force on 16 January 2023 with a 17 October 2024 transposition deadline most Member States missed. The training mandate applies across roughly 160,000 organizations in 18 sectors including energy, transport, banking, healthcare, water, digital infrastructure, public administration, postal services, manufacturing, food, chemicals, and digital providers.

Article 20 holds management body members personally liable for the program. National competent authorities can publicly disclose infringements, suspend certifications, and temporarily prohibit named individuals from exercising managerial functions. Penalties under Article 34 reach EUR 10 million or 2% of global annual turnover for essential entities, and EUR 7 million or 1.4% for important entities, whichever is higher.

Audit-ready programs combine role-based scenario exercises (phishing, BEC, deepfake, OAuth abuse) with management body governance content and exportable completion records that map each module to the specific Article 21 measure it supports.

Recommended exercises

Scenario-based simulations that satisfy this framework.

Phishing

Workforce-baseline scenario for the Article 21(2)(g) cyber hygiene mandate, drilling inspect-and-verify against AI-generated email lures.

Try the exercise

Business Email Compromise

Finance and AP track for the Article 21(2)(d) supply chain measure, walking learners through wire-instruction-change patterns competent authorities flag in audits.

Try the exercise

Whaling With A Deepfake

Management body and executive content for Article 20 governance, putting leadership inside the deepfake video pretext that drove the 2024 Arup loss.

Try the exercise

General Incident Reporting

Drills the Article 23 reporting cadence (24-hour early warning, 72-hour notification, one-month final report) so front-line staff start the chain immediately.

Try the exercise

Reporting Culture

Builds the no-blame reporting reflex Article 21(2)(b) incident handling depends on, with metrics auditors recognize during competent authority reviews.

Try the exercise

Third-Party App OAuth Risks

Procurement and engineering track for Article 21(2)(d) supply chain security and Article 21(2)(e) acquisition of network and information systems.

Try the exercise

Verification Procedures

IT and help desk track for Article 21(2)(i) HR security and access control, drilling the callback and code-word reflex that defeats vishing and MFA-reset pretexts.

Try the exercise

Joiner-Mover-Leaver Awareness

Closes the Article 21(2)(i) HR security and access control gap most audit findings cite, addressing both provisioning and deprovisioning hygiene.

Try the exercise

Encryption & Lock Discipline

Workforce content for Article 21(2)(j) cryptography and encryption policies, drilling the everyday device-lock and removable-media discipline policies depend on.

Try the exercise

Handling a Personal Data Breach

Bridges the NIS2 Article 23 incident reporting cadence with the GDPR 72-hour data breach notification that often runs in parallel during the same incident.

Try the exercise

Frequently Asked Questions

What GRC and security leaders ask about this framework.

What is NIS2 Article 21(2)(g)?

Article 21(2)(g) of Directive (EU) 2022/2555 (NIS2) requires every essential and important entity to implement "basic cyber hygiene practices and cybersecurity training" as one of ten minimum cybersecurity risk-management measures. It is the article auditors cite first when they sample a training program.

The directive does not prescribe a curriculum. The burden of demonstrating the program is proportionate to the risk and to the size of the entity sits with the entity. National competent authorities sample completion records, content scope, and refresh cadence during inspections.

Does NIS2 require security awareness training?

Yes. NIS2 makes cybersecurity training a named technical and organisational measure under Article 21(2)(g) for the workforce, and Article 20 separately requires members of the management body to follow training that gives them enough knowledge to identify risks and assess practices.

Training that reaches general staff but skips the management body fails Article 20. Training that addresses leadership but not the workforce fails Article 21(2)(g). A compliant program covers both layers and documents completion separately for each.

Who counts as essential vs important under NIS2?

Essential entities are large organizations in sectors including energy, transport, banking, financial market infrastructure, healthcare, drinking water, wastewater, digital infrastructure (DNS, TLD registries, cloud, data centres), ICT-managed services, public administration, and space. Important entities are medium-sized organizations in those sectors plus postal and courier, waste management, chemicals, food, manufacturing of medical devices, computers, electronics, machinery, motor vehicles, transport equipment, digital providers (online marketplaces, search engines, social networks), and research.

Size thresholds follow EU Commission Recommendation 2003/361/EC. Essential entities are typically 250+ employees or EUR 50M+ turnover; important entities are 50+ employees or EUR 10M+ turnover or balance sheet EUR 43M+. Sector-specific overrides catch some smaller entities including trust service providers, TLD registries, DNS providers, and public electronic communications providers regardless of size.

What does "cyber hygiene" mean in NIS2?

Cyber hygiene in the Article 21(2)(g) sense is the everyday set of practices the workforce needs to keep the systems they touch safe. ENISA guidance and national competent authority frameworks generally read this as phishing recognition, password and credential hygiene, mobile and removable media discipline, lock and encryption habits, incident reporting reflexes, and access control basics.

The framing is deliberately practical. Training that teaches policy in the abstract without rehearsing the behaviour does not meet the Article 21(2)(g) bar in the way most national competent authorities now interpret it.

Are management body members personally liable under NIS2?

Yes. Article 20 requires the management body of each essential and important entity to approve the cybersecurity risk-management measures and to oversee their implementation. The same article makes management body members personally liable for infringements of that duty. National competent authorities can publicly disclose infringements and temporarily prohibit named individuals from exercising managerial functions.

The liability regime is structural, not symbolic. It is one of the most significant changes from the 2016 NIS Directive, and it is the reason a NIS2 program needs a dedicated management body training track with its own completion record.

What evidence do national competent authorities look for?

Granular records: who completed which module, when, what content the module covered, what role the learner holds, and how the module maps to a specific Article 21(2) measure. Auditors and competent authorities sample the records, they do not trust dashboard summaries.

Programs that ship per-learner, per-role, per-module export packs with policy acknowledgment timestamps and scenario-pass evidence respond to inspections in hours. Programs that have to assemble the evidence after the request lands tend to spend days, sometimes weeks, on the same response.

How does NIS2 affect supply chain training?

Article 21(2)(d) requires entities to manage supply chain security including direct suppliers and service providers. Training has to reach the procurement, engineering, and security teams that touch supplier onboarding, OAuth integration, vendor verification, and payment-instruction changes.

Third-party app OAuth risks, invoice and payment fraud, and verification procedures exercises cover the supply chain attack surface most national competent authorities flag in their first audit cycles. Generic phishing content alone does not satisfy the supply chain measure.

What is the timeline for NIS2 enforcement in 2025-2026?

The 17 October 2024 transposition deadline passed. Belgium had its NIS 2-Wet / Loi NIS 2 in force on the deadline and the CCB is supervising. Germany NIS2UmsuCG, the Dutch Cyberbeveiligingswet, the French ANSSI-led decree, the Italian transposition decree-law, the Spanish Real Decreto, and the Irish general scheme are all at various stages of national legislation.

The first inspection cycles are now scoping in jurisdictions where the transposition law is in force. In-scope entities should treat 2025-2026 as the year the audit evidence question moves from theoretical to operational, regardless of whether their specific Member State has finalized national law yet.

Sources & further reading

Primary sources cited above and adjacent guidance.

Make This Framework Audit-Ready

Book a 30-minute walkthrough. We will scope the exercise sequence, the assignment logic, and the evidence export your auditor expects.