Tailored compliance solutions for Important Entities under NIS2. We help medium-sized organizations implement proportional cybersecurity measures that meet regulatory requirements without exceeding budgets.
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
Or contact us directly:










Medium-sized organizations (50-249 employees or €10-50M turnover) in critical sectors are classified as Important Entities with proportional compliance requirements.
Years of Experience
Employees
Projects
We follow a structured, cost-effective approach to help Important Entities achieve NIS2 compliance efficiently.
**Classification Verification**: Confirm Important Entity status and applicable requirements
**Gap Assessment**: Identify compliance gaps with focus on proportional requirements
**Prioritized Roadmap**: Develop cost-optimized implementation plan based on risk and resources
**Phased Implementation**: Roll out security measures in manageable, budget-conscious phases
**Continuous Support**: Provide ongoing guidance and monitoring to maintain compliance
"ADVISORI helped us achieve NIS2 compliance as an Important Entity without breaking the bank. Their pragmatic approach and understanding of SME constraints made all the difference."

Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
We offer you tailored solutions for your digital transformation
Comprehensive evaluation of your organization's NIS2 compliance status with focus on proportional requirements for Important Entities.
Implementation of scaled cybersecurity controls appropriate for Important Entities, balancing compliance requirements with resource constraints.
Looking for a complete overview of all our services?
View Complete Service OverviewOur expertise in managing regulatory compliance and transformation, including DORA.
Stärken Sie Ihre digitale operationelle Widerstandsfähigkeit gemäß DORA.
Wir steuern Ihre regulatorischen Transformationsprojekte erfolgreich – von der Konzeption bis zur nachhaltigen Implementierung.
Important Entities are medium-sized organizations (50‑249 employees or €10‑50M annual turnover) operating in critical sectors defined by NIS2. They face proportional compliance requirements that are less stringent than those for Essential Entities but still require robust cybersecurity measures. The classification considers both organizational size and sector criticality.
Important Entities face proportional requirements that account for their smaller size and resources. While they must implement the same categories of security measures as Essential Entities, the depth and sophistication can be scaled appropriately. Supervision is less intensive, penalties are lower (up to €7M vs €10M), and reporting obligations are somewhat simplified while maintaining core compliance standards.
Important Entities can operate in any of the
18 sectors covered by NIS2, including energy, transport, banking, healthcare, digital infrastructure, water supply, waste management, and public administration. The sector classification is identical to Essential Entities, but the size thresholds determine whether an organization is classified as Essential or Important.
Important Entities must implement proportional cybersecurity risk management measures, including risk analysis, incident handling, business continuity, supply chain security, and security in network and information systems. They must report significant incidents within
24 hours, maintain appropriate documentation, and ensure management accountability. The measures should be appropriate to the organization's size and risk profile.
Cost-effective implementation focuses on risk-based prioritization, leveraging existing security investments, using scalable cloud-based solutions, and implementing controls incrementally. Important Entities should focus on essential security measures first, utilize open-source or cost-effective tools where appropriate, and consider shared services or managed security providers for specialized capabilities. Proper planning and phased implementation help spread costs over time.
Important Entities face administrative fines of up to €
7 million or 1.4% of global annual turnover (whichever is higher) for non-compliance. While lower than Essential Entity penalties, these fines are still significant for medium-sized organizations. Additional consequences can include operational restrictions, reputational damage, and increased supervisory oversight. Proactive compliance is far more cost-effective than facing penalties.
Important Entities must report significant incidents within
24 hours (early warning), followed by a detailed incident notification within
72 hours, and a final report within one month. The reporting should be proportional to organizational capabilities while meeting regulatory requirements. Establishing clear incident classification criteria, reporting procedures, and communication channels is essential. Automated reporting tools can help streamline the process.
Important Entities must maintain proportional documentation including risk assessments, security policies, incident response procedures, business continuity plans, and evidence of implemented security measures. Documentation should be appropriate to organizational size and complexity. Focus on essential documents that demonstrate compliance and support operational security. Regular reviews and updates ensure documentation remains current and useful.
Important Entities should implement risk-based supply chain security by identifying critical suppliers, assessing their security posture, and establishing appropriate contractual security requirements. Focus on suppliers with access to critical systems or data. Use standardized security questionnaires, require basic security certifications where appropriate, and establish incident notification requirements. The approach should be proportional to the risks and organizational resources.
Management of Important Entities bears responsibility for overseeing cybersecurity risk management and ensuring compliance with NIS 2 requirements. This includes approving security measures, allocating adequate resources, and participating in security training. Management can be held personally liable for non-compliance. Clear governance structures, regular reporting, and documented decision-making help demonstrate management accountability and support effective security oversight.
Important Entities should prioritize security investments based on risk assessment results, focusing first on measures that address the highest risks to critical services. Start with foundational controls (access management, patch management, backups), then add detection and response capabilities. Consider quick wins that provide significant risk reduction at low cost. Align investments with business priorities and regulatory requirements while maintaining budget constraints.
Important Entities must provide appropriate cybersecurity training to staff and management. Training should be proportional to roles and responsibilities, covering basic security awareness for all staff, specialized training for IT personnel, and governance training for management. Regular refresher training and updates on emerging threats are essential. Cost-effective options include online training platforms, shared training sessions, and leveraging industry resources.
Proportionality is demonstrated through risk-based decision-making, documented justifications for security measure selection, and alignment of controls with organizational size and resources. Important Entities should document their risk assessment methodology, explain how measures are scaled to their context, and show that investments focus on the most critical risks. Regular reviews and adjustments based on changing circumstances further demonstrate a proportional approach.
Common challenges include limited budgets and resources, lack of specialized cybersecurity expertise, competing business priorities, and complexity of regulatory requirements. Important Entities often struggle with balancing compliance costs against operational needs. Solutions include phased implementation, leveraging managed services, focusing on essential controls first, and seeking expert guidance. Collaboration with industry peers and utilizing shared resources can also help overcome resource constraints.
Important Entities should develop proportional business continuity and disaster recovery plans focusing on critical services and systems. Start with business impact analysis to identify critical processes, establish recovery time objectives appropriate to organizational needs, and implement cost-effective backup and recovery solutions. Plans should be tested regularly but can use tabletop exercises rather than full-scale tests. Cloud-based solutions often provide cost-effective continuity capabilities for medium-sized organizations.
Important Entities face less intensive supervision than Essential Entities, typically including periodic compliance assessments, incident-based reviews, and responses to reported incidents. Authorities may conduct on-site inspections, request documentation, and issue recommendations or orders. The supervision approach is generally proportional and risk-based. Maintaining good compliance records and proactive communication with authorities helps minimize supervisory burden.
Important Entities should implement proportional security measures including network segmentation, access controls, encryption, secure configuration, and monitoring. Focus on protecting critical systems and data first. Use cost-effective solutions like cloud-based security services, open-source tools where appropriate, and managed security services for specialized capabilities. Regular vulnerability assessments and patch management are essential. The approach should balance security needs with available resources.
Early compliance provides competitive advantages including reduced risk of penalties, improved security posture, enhanced customer trust, and potential business opportunities with partners requiring NIS 2 compliance. It allows time for phased implementation, spreading costs and minimizing disruption. Early adopters can learn from initial experiences and adjust approaches before enforcement intensifies. Proactive compliance also demonstrates management commitment to security and regulatory responsibility.
Important Entities should conduct a gap analysis to identify how existing security measures align with NIS 2 requirements. Many organizations already have foundational controls that can be enhanced rather than replaced. Existing ISO 27001 certifications, security tools, policies, and procedures often provide a strong starting point. Focus investments on filling gaps and strengthening weak areas rather than rebuilding from scratch. This approach maximizes return on existing investments while achieving compliance.
Important Entities must maintain continuous compliance through regular risk assessments, security measure reviews, incident monitoring and reporting, staff training updates, and documentation maintenance. Annual compliance reviews help identify gaps and necessary adjustments. Monitoring regulatory developments and updating measures accordingly is essential. Establishing a compliance calendar and assigning clear responsibilities helps ensure ongoing activities are completed consistently. Regular management reporting maintains visibility and accountability.
Discover how we support companies in their digital transformation
Bosch
KI-Prozessoptimierung für bessere Produktionseffizienz

Festo
Intelligente Vernetzung für zukunftsfähige Produktionssysteme

Siemens
Smarte Fertigungslösungen für maximale Wertschöpfung

Klöckner & Co
Digitalisierung im Stahlhandel

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Our clients trust our expertise in digital transformation, compliance, and risk management
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
Direct hotline for decision-makers
Strategic inquiries via email
For complex inquiries or if you want to provide specific information in advance