Get our NIS2 Guide

NIS2 vs. DORA: The Ultimate Guide to the New EU Cybersecurity Rules for 2026

Key takeaways at a glance
- Scope: NIS2 is the “horizontal” directive covering 18 sectors (energy, healthcare, etc.), while DORA as a “lex specialis” regulates the financial sector exclusively.
- Lex specialis principle: Where DORA sets specific rules, it overrides the general NIS2 requirements for financial institutions.
- Reporting obligations: DORA is significantly stricter, with an initial reporting deadline of just 4 hours, compared to 24 hours under NIS2.
- Liability: Both frameworks place direct responsibility on management – violations can trigger personal liability and multi-million-euro fines.
- Third-party risk: DORA introduces direct oversight of critical ICT third-party providers (e.g., cloud providers).
Why this topic is critical for SMEs in 2026
Cybersecurity is no longer an optional “add-on” – it’s a legal condition for survival. In 2026, transition periods have expired for many sectors. Companies that qualify as “important” or “essential” entities under NIS2, or that operate as service providers to banks (under DORA), face a major implementation challenge.
The focus has shifted: away from purely preventive measures (firewalls) and toward operational resilience. It’s no longer just about whether an attack happens, but how quickly the organization can withstand it—and report it.
Table of Contents:
NIS2: The foundation of European cybersecurity
The NIS2 Directive (Network and Information Security) is the EU’s response to the increased threat level from state actors and cybercriminals. It significantly expands the number of affected companies.
The two NIS2 categories:
- Essential entities: Large companies in sectors with high criticality (energy, transport, banking, healthcare).
- Important entities: Providers in sectors such as waste management, food production, or the chemical industry.
SMEs are often affected indirectly: If a small supplier works for an energy corporation, it may be contractually required to meet NIS2 standards to secure the supply chain.

Get our NIS2 Guide
DORA: The specialist fortress for the financial sector
The Digital Operational Resilience Act (DORA) is a regulation – meaning it applies directly, without national transposition. DORA assumes that an IT outage in the financial system can trigger a chain reaction that threatens the entire EU economy.
The five pillars of DORA:
- ICT risk management: A robust framework for identifying and mitigating risks.
- Reporting ICT-related incidents: Classification and reporting of major incidents.
- Digital operational resilience testing: Regular penetration testing (TLPT).
- Third-party risk: Oversight of cloud providers and software vendors.
- Information sharing: Promoting cooperation between financial institutions.
The relationship between NIS2 and DORA: Which one takes precedence?
This is the key question for compliance teams. The governing principle is “lex specialis derogat legi generali.”
Because DORA is more specifically tailored to the financial sector, its rules take precedence over NIS2. Financial institutions must therefore primarily comply with DORA. But note: in areas DORA does not explicitly cover (e.g., certain physical security aspects of infrastructure), NIS2 may still apply as a complementary layer.
The reporting cascade: Why every minute counts
This is where the most serious operational differences become visible.
| Feature | NIS2 | DORA |
| Early warning | Within 24 hours | Within 4 hours (for major incidents) |
| Incident notification | Within 72 hours | Within the same business day (or the next day) |
| Final report | After 1 month | As soon as root-cause analysis is completed |
For SMEs, DORA’s 4-hour deadline means manual processes are no longer sufficient. Automated monitoring tools become essential.
Sanctions and personal liability
Both NIS2 and DORA take accountability seriously. The days when cybersecurity could be “dumped” on the IT department are over.
- Management liability: Senior leadership must approve cybersecurity measures and oversee their implementation. Negligence can lead to personal liability.
- Fines: Under NIS2, up to €10 million or 2% of global annual turnover. DORA provides for similar magnitudes, plus daily penalty payments for critical third-party providers.
Practical implementation guide
To avoid drowning in complexity, SMEs should follow this path:
- Scope analysis: Am I an “essential entity” (NIS2) or an “ICT third-party provider” (DORA)?
- Gap analysis: Compare the current state against ISO 27001 or NIST standards (a strong foundation for both).
- Incident response plan: Build playbooks that reflect DORA’s extremely short deadlines.
- Supply chain audit: Review your own subcontractors—because their security is now your security.
Conclusion: Resilience as a competitive advantage
NIS2 and DORA are not just bureaucratic hurdles. They force organizations to build digital resilience that is essential for survival in an era of AI-driven cyberattacks. Companies that integrate these requirements early not only protect themselves from fines, but also secure the trust of customers and partners.
FAQ
Does DORA also apply to small insurance intermediaries?
Yes. DORA has a very broad scope, but includes proportionality rules for micro-enterprises.
Do I need to implement an ISMS for NIS2?
In practice, yes. Even if the law does not prescribe a specific system, an Information Security Management System (ISMS) aligned with ISO 27001 is the safest route to compliance.
Can authorities shut down my business for DORA violations?
DORA allows supervisors to impose far-reaching sanctions, up to and including license withdrawal or bans on certain services.
Important: The content of this article is for informational purposes only and does not constitute legal advice. The information provided here is no substitute for personalized legal advice from a data protection officer or an attorney. We do not guarantee that the information provided is up to date, complete, or accurate. Any actions taken on the basis of the information contained in this article are at your own risk. We recommend that you always consult a data protection officer or an attorney with any legal questions or problems.


