The bar is being raised; are you ready for the new reality?
Author: Mr.drs. Jelmer Garretsen, Business Development Manager DEKRA
May 13, 2026Information security management system / Cyber Security / AuditWhat does this mean for your organization?
The world around us is changing rapidly, and organizations are facing an increasingly complex operating environment. For example, the new Cybersecurity Act, which will soon come into effect, presents a significant challenge for organizations seeking to ensure their digital resilience. In addition, the National QHSE Survey, published in late April, provided valuable insights into the current state of affairs regarding quality, health, safety, and the environment. In this blog, we discuss what these developments mean for your organization. Is your organization prepared for what lies ahead?
Humans as the greatest vulnerability
Continuous improvement as a foundation
Digital Resilience with NIS2 and ISO 27001
| Feature | ISO 27001 | NIS2 |
| Governance | Sets requirements for governance, but they are less strict. | Places strong emphasis on active involvement by the board, with the possibility of personal liability. |
| Incident Report | Requires an incident management process. | Requires a strict reporting procedure: an early warning within 24 hours, a detailed report within 72 hours, and a final report within one month. |
| Supply Chain Management | Lays the groundwork for supplier security. | Require thorough due diligence, contractual requirements, and periodic reviews of critical partners. |
| Supervision & Sanctions | Involves audits and certifications, without direct legal enforcement. | Involves active oversight by authorities and can result in heavy fines for noncompliance. |
A future-proof cybersecurity framework
Start with this combination


Information security

ISO 27001 certification

NIS2 directive

The difference between ISAE 3402 types 1 and 2

What is a CCV pentest?

NIS2 and IEC 62443

NEN 7510: Information security in Dutch healthcare

NIS2 requirements

ISO standards at DEKRA

Information security policy