Our approach on NIS2 and how we comply
Our approach on NIS2 and how we comply
The new European NIS2 directive sets stricter requirements for cybersecurity within critical sectors and digital service providers. We fully support this development. Our approach combines NIS2 with recognized standards such as ISO/IEC 27001 and IEC 62443-4. Not only to comply with legislation, but to make our organization, supply chain and customers more resilient.
Our Position
We fall under the category of Essential / Significant Entity according to NIS2. That classification brings with it clear obligations. We are ready for that. We do not see NIS2 as a burden, but as an opportunity to structurally strengthen our cyber security. By combining it with the risk-based approach of ISO 27001 and the technical depth of IEC 62443-4, we are building a strong and future-proof foundation.
This is how we ensure compliance
Our cybersecurity approach rests on three pillars:
- NIS2: Legislation and obligations around risk management, incident reporting and chain security.
- ISO/IEC 27001: A certified information security system that ensures continuous risk management and improvements.
- IEC 62443-4: Industry standard for cybersecurity in OT environments (operational technology).
Specifically:
- Risk Management and Governance
Our information security is ISO 27001 certified. Risks are periodically assessed and addressed. Cybersecurity is managed at the executive level and is part of our broader risk management. - Secure Development and Systems
For our OT environments, we follow IEC 62443-4-1 (secure development) and 62443-4-2 (system security). Security is integrated into the design from the start. - Incident Detection and Reporting
We have 24/7 monitoring and clear response procedures. We comply with the NIS2 reporting obligation and regularly test our processes with realistic scenarios. - Supply Chain Security
Suppliers and partners are assessed for their security level. We apply requirements based on ISO 27001 and – where relevant – IEC 62443. - Continuity and Recovery
We have business continuity and recovery plans that are regularly tested. These are aligned with ISO 27001 and adapted for OT risks. - Technical Security Measures
We use strong authentication, segmentation, encryption, and monitoring. Everything is aligned with ISO 27001 and IEC 62443-4-2 and is regularly checked. - Awareness and Training
Everyone in the organization plays a role in cybersecurity. We provide structured training and specific sessions for IT and OT teams. - Audit and Improvement
We document everything carefully and are always audit-ready. Our approach is focused on continuous improvement, not just minimal compliance.
Looking Ahead
Cybersecurity is a strategic priority. By working according to NIS2, ISO 27001, and IEC 62443-4, we not only ensure compliance with regulations – we actively strengthen the resilience of our organization.
This is not a cost, but an investment in stability, continuity, and trust.

