Skip to main content
7

Important Entities Quiz

1 / 24

Is there a specific individual (e.g., a board member, senior manager) formally accountable for overall cybersecurity and compliance with NIS2?

Example: A board explicitly assigns the CFO to champion cybersecurity, ensuring it’s on every quarterly meeting agenda.
Regulatory Mapping: Article 20 (Management Body Responsibility).

2 / 24

Does the board (or top leadership) regularly review cybersecurity risks, incidents, and progress on NIS2-related actions?

Example: The board reviews a monthly or quarterly dashboard showing key risk indicators and ongoing security initiatives.
Regulatory Mapping: Article 20 (Top Management Engagement).

3 / 24

Are key security policies (e.g., incident response, data protection) officially approved by senior executives or the board?

Example: The CEO signs off on an updated cybersecurity policy, and it’s circulated to all staff with a covering note.
Regulatory Mapping: Article 21 (Information System Security Policies).

4 / 24

Are senior leaders aware of the key obligations under NIS2, including potential penalties for non-compliance?

Example: A short “NIS2 overview” briefing is held for top managers to clarify requirements and penalties.
Regulatory Mapping: Article 20 (Management Body’s Role).

5 / 24

Have you identified your main cyber risks (e.g., ransomware, data breaches) and ranked them in terms of likelihood and impact?

Example: A manufacturing firm recognizes ransomware as the top threat and invests in robust backups and endpoint security.
Regulatory Mapping: Article 21: (Risk Analysis & Security Policies).

6 / 24

Is there a process to evaluate, track, and address cybersecurity risks on a regular schedule (e.g., annually)?

Example: A risk register is updated quarterly, with action plans for each identified risk.
Regulatory Mapping: Article 21 (Appropriate Risk Management Measures).

7 / 24

Do you verify that critical suppliers (e.g., IT providers, cloud services) also follow reasonable security measures?

Example: A healthcare provider requires a cloud vendor to show ISO 27001 certification and sign breach notification clauses.
Regulatory Mapping: Article 21 & Recital 54 (Supply Chain Security).

8 / 24

Do you revisit your risk assessments and supply chain risks at least once a year or after major changes?

Example: After adopting a new CRM system, the company updates its risk assessment to account for SaaS-based exposures.
Regulatory Mapping: Article 21 (Continuous Risk Management).

9 / 24

Do employees have clear, written guidelines (e.g., a security policy) on acceptable use, data handling, and reporting incidents?

Example: Staff must confirm they’ve read the latest “Cybersecurity Policy” each year, covering do’s and don’ts.
Regulatory Mapping: Article 21 (Information System Security Policies).

10 / 24

Are user accounts unique (no shared logins) and tied to the correct level of access (e.g., least privilege)?

Example: The finance system requires each user to have a personal login with only the permissions they need.
Regulatory Mapping: Article 21 (Access Control Measures).

11 / 24

Do staff and administrators use at least one additional factor beyond passwords to access critical systems or data?

Example: Employees must enter a one-time code (via phone app) to log into the company’s HR portal.
Regulatory Mapping: Article 21 (Technical and Organizational Security Measures).

12 / 24

Are admin or “super-user” accounts carefully controlled, monitored, and restricted to specific personnel?

Example: Only two IT managers have server admin rights, and their access is logged and reviewed monthly.
Regulatory Mapping: Article 21 (Access Security).

13 / 24

Is there a written plan that explains what to do if a cyber incident occurs, who to contact, and how to contain the issue?

Example: A simple checklist shows “isolate infected machine, notify IT lead, inform top management, consider contacting law enforcement.”
Regulatory Mapping: Articles 23 (Incident Handling).

14 / 24

Do you know when and how to inform relevant authorities (e.g., national CSIRT) and affected customers/partners, as required by NIS2?

Example: A healthcare provider has a communication protocol for data breaches—who calls the data protection authority, how quickly, etc.
Regulatory Mapping: Articles 30–33 (Reporting Obligations).

15 / 24

Are there regular backups of critical data, and do you test restoring them to ensure quick recovery in events like ransomware?

Example: A construction firm takes daily encrypted backups to the cloud, with quarterly test restores to confirm data integrity.
Regulatory Mapping: Article 21 (Continuity of Operations).

16 / 24

Does your plan specify who communicates with staff, customers, media, and/or legal authorities during an incident, and in what order?

Example: A small retail chain’s IRP calls for the CEO to approve all external statements; an internal phone tree notifies store managers.
Regulatory Mapping: Article 23 (Incident Handling - Communication).

17 / 24

Do all employees (including contractors) receive basic cybersecurity training (e.g., phishing awareness) at least once a year?

Example: An annual 30-minute online course explains how to spot and report suspicious emails.
Regulatory Mapping: Article 20 (Training Requirements).

18 / 24

Do senior managers or executives receive enhanced training or briefings on strategic cyber risks and NIS2 obligations?

Example: Quarterly briefings for executives include recent incidents, major threat trends, and compliance updates.
Regulatory Mapping: Article 20 (Top Management Engagement).

19 / 24

Do you conduct simulated phishing exercises to test and improve staff vigilance?

Example: A marketing agency sends mock “phishing” emails once a quarter and tracks click rates to identify who needs extra training.
Regulatory Mapping: Article 20 (Security Awareness Measures).

20 / 24

Do employees periodically re-confirm they understand and will follow the organization’s security policies?

Example: Employees must digitally sign a short “responsible use” acknowledgment each year.
Regulatory Mapping: Article 21 (Information Security Policies).

21 / 24

Are critical systems (e.g., servers, financial databases) monitored with basic logging to detect unusual activity or breaches?

Example: A finance system records every login attempt and flags multiple failed attempts for immediate review.
Regulatory Mapping: Article 21 (Monitoring, Auditing, and Logging Requirements).

22 / 24

Do you promptly apply security updates (patches) for operating systems and software, and check for known vulnerabilities?

Example: A monthly patch cycle ensures all laptops, desktops, and servers run the latest security updates.
Regulatory Mapping: Article 21 (Technical Measures & Vulnerability Handling).

23 / 24

Is sensitive data (customer information, financial records) encrypted, especially during transmission (e.g., over email or web) and stored securely (e.g., in the cloud)?

Example: A law office uses an encrypted file transfer service and ensures client files are always stored on encrypted drives.
Regulatory Mapping: Article 21 (Protection of Data & Systems).

24 / 24

Have you classified the types of data you hold (e.g., confidential, internal, public) and given staff simple rules on how each category should be handled?

Example: A small marketing firm labels documents “Confidential,” “Internal,” or “Public,” with instructions on each label’s handling rules.
Regulatory Mapping: Article 21 (Information System Security Policies).