NIS2 (Network and Information Security Directive) is a European Union (EU) directive aimed at strengthening cybersecurity across the EU, particularly concerning critical infrastructure and essential services. In Latvia, this directive has been transposed into national legislation by the adoption of the National Cybersecurity Law (NCL). Right now, companies should have clarity about their status (whether NCL subject or not) and should have registered by 1 April 2025, at the National Cybersecurity Centre (NCC). Organisations are due to appoint a cybersecurity manager and submit their first self-assessment report by 1 October 2025 and begin reporting cybersecurity incidents from 1 July this year.
The Digital Trust – 2025 survey, conducted by PwC, included over 4,000 business and IT executives from 77 countries and focused on cybersecurity. Only 2% of executives believed their companies had taken sufficient measures to ensure cyber resilience. Fewer than half of the respondents said their cybersecurity leaders were involved in strategic planning or in preparing reports for company management. This highlights a clear gap between words and actions when it comes to cybersecurity.
The NIS2 Directive aims to legally require approximately 100,000 companies across the EU to strengthen their cyber resilience, enhance the role of the cybersecurity officer within the company, and reduce threats. In Latvia, the NCL would apply to around 1,500 companies; currently, about 600 companies have begun registration with the National Cybersecurity Centre (NCC).
The introduction of NIS2 and NCL is certainly not a step towards cutting red tape. The introduction of requirements will increase the administrative burden on businesses due to the need for cyber risk policies, procedures for identifying and reporting incidents, and a plan to ensure continued operation. However, the law requires a change in the attitude of business executives toward cybersecurity. Enforcing NIS2 requirements will improve cyber resilience, yet will not guarantee full protection from incidents. For example, incident response and business continuity plans help businesses recover quickly from cyber threats. Companies will be better positioned for partnerships and access to the EU market, improving the protection of their systems, reducing the risk of expensive data leaks and downtime, and boosting customer loyalty.
Compliance with the requirements of the NIS2 Directive is an important step in strengthening corporate cybersecurity, and its implementation requires the active participation of all stakeholders. While administrative burdens may cause difficulties, companies that have successfully implemented the requirements of the NIS2 Directive will be better prepared for future cyber threats and able to remain competitive in the EU market.
If you have any comments on this article please email them to lv_mindlink@pwc.com
Ask questionManual procurement documentation is time-consuming and prone to human error. Employees often use previous procurement documentation to create new documentation, which, if not thoroughly reviewed, can harbour risks. According to Gartner, 65% of procurement leaders are actively investing in artificial intelligence (AI) to improve productivity rates and reduce the risk of human error. AI is a useful tool for tasks such as analysing historical procurement data, preparing documentation and evaluating candidates.
For more than a year, PwC has been supporting its customers implement artificial intelligence (AI) solutions that streamline day-to-day work with Microsoft's Copilot technology. We do not code anything in particular, but we help you find a solution that works well by using the customisation options available. Such technologies enable companies to increase their efficiency and adapt to the dynamic market environment.
On taking a closer look at the findings of PwC’s corporate cyber resilience survey 2024 (Global Digital Trust Insights Survey) I realise that business leaders are greatly concerned about the potential costs of cyberattacks. These include a potential ransom payment in the event of a ransomware attack, system recovery, and potential compensations to customers for the company’s inability to supply its goods or services while it’s dealing with the consequences. Small companies may find such costs unaffordable.
We use cookies to make our site work well for you and so we can continually improve it. The cookies that keep the site functioning are always on. We use analytics and marketing cookies to help us understand what content is of most interest and to personalise your user experience.
It’s your choice to accept these or not. You can either click the 'I accept all’ button below or use the switches to choose and save your choices.
For detailed information on how we use cookies and other tracking technologies, please visit our cookies information page.
These cookies are necessary for the website to operate. Our website cannot function without these cookies and they can only be disabled by changing your browser preferences.
These cookies allow us to measure and report on website activity by tracking page visits, visitor locations and how visitors move around the site. The information collected does not directly identify visitors. We drop these cookies and use Adobe to help us analyse the data.
These cookies help us provide you with personalised and relevant services or advertising, and track the effectiveness of our digital marketing activities.