Skip to main content
FORTISEU
Blog

FortisEU Blog — NIS2, DORA & Compliance Insights

for security and compliance teams

Practical guidance for teams who need provable evidence and procurement-ready answers, without the theatre.

Featured Articles

NIS2 Transposition Gap: From Legal Deadline to Operational Proof visual
NIS28 October 2025

NIS2 Transposition Gap: From Legal Deadline to Operational Proof

Having a national law does not mean entities are compliant. This guide addresses the entity-level operational readiness gap: how to move from legal awareness to demonstrable compliance with documentation, evidence, and operational capability.

Cadence: weekly

Attila Bognar 13 min read
Read More
Exposure Management Is Becoming a Board-Level Discussion visual
Exposure Management11 February 2026

Exposure Management Is Becoming a Board-Level Discussion

Boards increasingly ask where the business is exposed, not only whether the organization is compliant. Here is why exposure management belongs in the boardroom and how to report it.

Cadence: weekly

Attila Bognar 9 min read
Read More
Identity Governance Is Becoming the Central Risk Vector visual
Identity Governance13 February 2026

Identity Governance Is Becoming the Central Risk Vector

Identity is the #1 attack vector in 2026. Credential-based attacks, MFA bypass, and identity sprawl make identity governance a regulatory requirement under NIS2 and DORA, not just a security best practice.

Cadence: weekly

Attila Bognar 11 min read
Read More
From Audit Readiness to Control Confidence visual
Compliance Operations16 February 2026

From Audit Readiness to Control Confidence

Audit readiness proves a control existed at review time. Control confidence proves the control is functioning continuously. Here is how to make the transition under NIS2 and DORA.

Cadence: weekly

Attila Bognar 11 min read
Read More
Cyber Resilience Act Article 14: September 2026 Vulnerability Reporting Preparation Guide visual
Cyber Resilience Act16 February 2026

Cyber Resilience Act Article 14: September 2026 Vulnerability Reporting Preparation Guide

CRA Article 14 vulnerability reporting obligations start September 2026. This guide covers what manufacturers must report to ENISA, the 24-hour notification window, SBOM requirements, and how to prepare.

Attila Bognar 10 min read
Read More
Regulatory Horizon: Why Time-to-Non-Compliance Is the KPI Boards Actually Need visual
Compliance Strategy15 February 2026

Regulatory Horizon: Why Time-to-Non-Compliance Is the KPI Boards Actually Need

Static compliance scores hide trajectory risk. Time-to-non-compliance tells boards when they will fall out of compliance if nothing changes — a leading indicator that transforms governance from status reporting to timing decisions.

Attila Bognar 10 min read
Read More

All Articles

ISO 27001:2022 and NIS2: Why the Transition Is Your Best Compliance Investment thumbnail
Compliance11 March 2026

ISO 27001:2022 and NIS2: Why the Transition Is Your Best Compliance Investment

ISO 27001:2022's new Annex A controls align closely with NIS2 Article 21 measures. Organisations doing both simultaneously save 30-40% effort vs sequential implementation. A detailed mapping of control overlaps and practical efficiency gains.

ISO 27001 NIS2 transition Annex A
Read
Cyber Insurance Meets EU Regulation: How NIS2 and DORA Are Reshaping Underwriting thumbnail
Resilience7 March 2026

Cyber Insurance Meets EU Regulation: How NIS2 and DORA Are Reshaping Underwriting

Cyber insurers increasingly use NIS2 and DORA compliance status as underwriting criteria. Organisations with demonstrable compliance get better premiums. This post analyses the convergence between regulatory evidence and insurance evidence, and why compliance automation reduces both regulatory risk and insurance costs.

cyber insurance NIS2 DORA risk transfer
Read
EU AI Act Risk Classification: A Practical Decision Tree for Your AI Systems thumbnail
AI Governance4 March 2026

EU AI Act Risk Classification: A Practical Decision Tree for Your AI Systems

The EU AI Act's four-tier risk classification sounds simple on paper. In practice, classifying your AI systems requires navigating prohibited practices under Art. 5, high-risk pathways through Annex I and III, GPAI obligations, and transparency requirements. This decision tree gives you a structured approach.

EU AI Act risk classification high-risk AI prohibited AI
Read
EU Data Sovereignty in 2026: Moving Beyond the Cloud Act Debate to Practical Architecture thumbnail
Procurement1 March 2026

EU Data Sovereignty in 2026: Moving Beyond the Cloud Act Debate to Practical Architecture

The EU data sovereignty conversation has matured. Data location alone is insufficient. Operational sovereignty — who controls encryption keys, who can access data — matters more. A practical architecture guide with three sovereignty tiers and regulatory grounding.

data sovereignty EU cloud Schrems II CLOUD Act
Read
DORA TLPT: When Threat-Led Penetration Testing Is Required and How to Prepare thumbnail
DORA25 February 2026

DORA TLPT: When Threat-Led Penetration Testing Is Required and How to Prepare

DORA Articles 26-27 require certain financial entities to conduct threat-led penetration testing every three years. This is not a standard pentest. Here is who must do it, how it works, and how to prepare.

DORA TLPT TIBER-EU resilience testing
Read
Multi-Cloud Security Under DORA: Managing Concentration Risk Without Losing Your Mind thumbnail
DORA18 February 2026

Multi-Cloud Security Under DORA: Managing Concentration Risk Without Losing Your Mind

DORA Articles 28-29 require financial entities to assess ICT concentration risk, but multi-cloud isn't always the answer. A nuanced analysis of when diversification makes sense, when single-cloud with exit planning is smarter, and what supervisors actually look for.

DORA multi-cloud concentration risk cloud security
Read
Third-Party Risk Is No Longer a Questionnaire Problem thumbnail
TPRM16 February 2026

Third-Party Risk Is No Longer a Questionnaire Problem

Annual vendor questionnaires fail under NIS2 and DORA. Modern TPRM requires continuous monitoring, event-driven assessment, and concentration risk analysis — not thicker spreadsheets.

TPRM Vendor risk Continuous monitoring Supply chain
Read
The Hidden Cost of Fragmented Security Platforms thumbnail
Security Architecture15 February 2026

The Hidden Cost of Fragmented Security Platforms

The biggest cost of platform fragmentation is not license spend. It is delayed decision-making, data silos, duplicate effort, and increased compliance risk across every domain.

Cadence: weekly

Platform fragmentation Risk architecture GRC Security operations
Read
DORA Incident Reporting: Templates, Deadlines, and the Operational Guide to Getting It Right thumbnail
DORA14 February 2026

DORA Incident Reporting: Templates, Deadlines, and the Operational Guide to Getting It Right

DORA incident reporting under Art. 17-23 requires staged, structured submissions. This operational guide covers the classification taxonomy, the three-report cycle, ESA templates, common mistakes, and parallel reporting with NIS2.

DORA Incident reporting Operational resilience Regulatory evidence
Read
AI Act Code of Practice (February 2026): What Signatory Status Means for Enterprise Risk thumbnail
AI Governance12 February 2026

AI Act Code of Practice (February 2026): What Signatory Status Means for Enterprise Risk

The AI Office published signatory updates for the GPAI Code of Practice in February 2026. Learn what procurement and security teams should require from AI vendors now.

AI Act GPAI Vendor risk Procurement
Read
188 Major Telecom Security Incidents in the EU: What 2026 CISO Boards Should Do Next thumbnail
Cyber Resilience12 February 2026

188 Major Telecom Security Incidents in the EU: What 2026 CISO Boards Should Do Next

ENISA recorded 188 major telecom security incidents in 2024 — dominated by human error, cascading failures, and reporting delays. Here is why these patterns preview NIS2 enforcement for every regulated sector, and what boards should change now.

ENISA Telecom security Board reporting Operational resilience
Read
From Questionnaire Fatigue to Revenue Engine: The Trust Center Playbook thumbnail
Trust Center11 February 2026

From Questionnaire Fatigue to Revenue Engine: The Trust Center Playbook

Security questionnaires cost 8-12 hours each and stall pipeline. A properly built Trust Center reduces inbound requests by 60-70%, shortens procurement cycles, and turns compliance overhead into a revenue accelerator.

Security questionnaires Trust Center B2B sales Compliance operations
Read
NIS2 for SMEs: How Proportionality Works in Practice (Not Just in Theory) thumbnail
NIS211 February 2026

NIS2 for SMEs: How Proportionality Works in Practice (Not Just in Theory)

Most NIS2 guidance targets large enterprises. But medium-sized entities are in scope too. Here is how the proportionality principle under Article 21(1) translates to different implementation depths for smaller organisations.

NIS2 SME proportionality compliance
Read
Continuous Control Monitoring Is Replacing Periodic Compliance thumbnail
Compliance Strategy10 February 2026

Continuous Control Monitoring Is Replacing Periodic Compliance

Periodic compliance gives management a snapshot. Continuous control monitoring gives leadership operational truth. Here is how to make the shift.

Continuous control monitoring Compliance Audit readiness Control integrity
Read
From GRC to Operational Risk Intelligence thumbnail
Risk Intelligence10 February 2026

From GRC to Operational Risk Intelligence

Traditional GRC documents risk. Operational risk intelligence surfaces risk while there is still time to act. Here is why the old model fails under NIS2 and DORA and what replaces it.

Cadence: weekly

GRC Operational risk Continuous compliance Exposure management
Read
NIS2 in 2026: What enforcement looks like now (and what boards ask) thumbnail
NIS210 February 2026

NIS2 in 2026: What enforcement looks like now (and what boards ask)

NIS2 enforcement is live across Europe. This guide covers which national competent authorities are active, what supervisory interactions look like, and how to prepare for the questions boards are asking their CISOs.

NIS2 Board reporting Incident reporting Supply chain
Read
EUVD Operational Playbook: From CVE Noise to EU-Prioritized Remediation thumbnail
Vulnerability Management9 February 2026

EUVD Operational Playbook: From CVE Noise to EU-Prioritized Remediation

ENISA's European Vulnerability Database (EUVD) changes how EU organizations triage and prioritize vulnerabilities. An operational playbook for integrating EUVD into your vulnerability management workflow and satisfying NIS2 Art. 21(2)(e).

EUVD ENISA CVE NIS2
Read
Supply Chain Attacks in 2025: What Three Major Incidents Taught Us About NIS2 and DORA Readiness thumbnail
Resilience4 February 2026

Supply Chain Attacks in 2025: What Three Major Incidents Taught Us About NIS2 and DORA Readiness

A retrospective analysis of three supply chain security incidents from 2025, examined through the lens of NIS2 Art. 21(2)(d) and DORA Chapter V. For each incident: would compliance have prevented or mitigated it? What controls were missing? What does this mean for 2026 compliance programmes?

supply chain NIS2 DORA third-party risk
Read
Board-Ready Cyber Resilience Metrics for 2026: Beyond Green Dashboards thumbnail
Board Reporting3 February 2026

Board-Ready Cyber Resilience Metrics for 2026: Beyond Green Dashboards

CISOs need decision-grade cyber metrics in 2026. This framework shows which metrics matter, how to avoid metric theater, and how to support board-level defensibility.

Board reporting Cyber resilience Risk metrics Governance
Read
NIS2 Article 20: What Personal Liability Actually Means for CISOs and Board Members thumbnail
NIS228 January 2026

NIS2 Article 20: What Personal Liability Actually Means for CISOs and Board Members

NIS2 Article 20 creates management body accountability for cybersecurity, not automatic personal fines. Here is what the liability actually looks like, how it varies across Member States, and what documentation protects you.

NIS2 Article 20 CISO liability board governance
Read
DORA-UK MoU (January 2026): The Cross-Border Oversight Playbook for Dual-Jurisdiction Financial Entities thumbnail
DORA27 January 2026

DORA-UK MoU (January 2026): The Cross-Border Oversight Playbook for Dual-Jurisdiction Financial Entities

The ESAs and UK FCA/PRA signed a DORA cooperation memorandum in January 2026, creating new cross-border oversight obligations. A practical playbook for financial entities operating in both EU and UK jurisdictions.

DORA Cross-border oversight UK-EU cooperation TPRM
Read
The ROI of Compliance Automation: Real Numbers from EU-Regulated Organisations thumbnail
Compliance21 January 2026

The ROI of Compliance Automation: Real Numbers from EU-Regulated Organisations

An honest analysis of where compliance automation delivers ROI and where it does not. Evidence collection saves 70-80% of manual effort. Regulatory interpretation and board communication remain human-dependent. Here is how to calculate your real return — including the setup costs most vendors do not mention.

ROI compliance automation efficiency cost reduction
Read
ENISA NIS360 in Practice: A Prioritization Playbook for Regulated EU Entities thumbnail
NIS218 January 2026

ENISA NIS360 in Practice: A Prioritization Playbook for Regulated EU Entities

ENISA's NIS360 methodology reveals uneven maturity across NIS2 sectors. A practical playbook for using NIS360 insights to prioritize controls, benchmark sector maturity, and build an executable compliance program.

NIS2 ENISA NIS360 Risk prioritization Compliance strategy
Read
TPRM for DORA: Registers, Criticality Assessment, and Exit Strategies thumbnail
TPRM15 January 2026

TPRM for DORA: Registers, Criticality Assessment, and Exit Strategies

An operational guide to DORA's specific TPRM requirements: building the register of information under Article 28(3), designing a criticality assessment methodology, writing exit strategies that survive supervisory scrutiny, and implementing the contractual provisions of Article 30.

TPRM DORA Third parties Exit strategies
Read
GDPR at Eight: What €4.5 Billion in Fines Has Actually Changed thumbnail
GDPR14 January 2026

GDPR at Eight: What €4.5 Billion in Fines Has Actually Changed

Eight years of GDPR enforcement have shifted the regulatory focus from privacy policies to technical controls. Analysis of cumulative fines, DPA activity, and what the enforcement trajectory means for 2026-2027.

GDPR enforcement fines DPA trends
Read
EU AI Act Governance: The Control Model You Actually Need thumbnail
AI Governance8 January 2026

EU AI Act Governance: The Control Model You Actually Need

The EU AI Act is not just a legal framework — it is an operating model problem. Map Art. 9-15 high-risk requirements to practical controls covering risk management, data governance, documentation, transparency, human oversight, and robustness.

AI Act AI governance Risk management High-risk AI
Read
Identity Governance Under NIS2 and DORA: Access Reviews as Evidence, Not Ceremony thumbnail
Identity Governance8 January 2026

Identity Governance Under NIS2 and DORA: Access Reviews as Evidence, Not Ceremony

Access reviews and offboarding are becoming core audit artifacts under EU cyber regulation. This operational guide shows how to implement evidence-based identity governance that satisfies NIS2 Art. 21(2)(i) and DORA Art. 9(4)(c).

Cadence: weekly

Identity governance NIS2 DORA Access reviews
Read
SOC 2 for EU Companies: When It Makes Sense, When It Doesn't, and How to Approach It thumbnail
Compliance7 January 2026

SOC 2 for EU Companies: When It Makes Sense, When It Doesn't, and How to Approach It

SOC 2 is a US-originated framework, but EU SaaS companies selling to US enterprises increasingly need it. An honest analysis of when SOC 2 is worth the investment, how it interacts with GDPR and NIS2, and the practical path for EU companies with existing ISO 27001 certification.

SOC 2 EU companies US customers trust
Read
One Incident Response Plan for NIS2, DORA, and GDPR: A Practical Framework thumbnail
Resilience30 December 2025

One Incident Response Plan for NIS2, DORA, and GDPR: A Practical Framework

Organisations subject to NIS2, DORA, and GDPR do not need three incident response plans. They need one unified IRP that triggers all applicable notifications from a single incident record. Here is how to build it.

incident response NIS2 DORA GDPR
Read
Compliance Debt: Why CISOs Need to Borrow a Concept from Engineering thumbnail
Compliance23 December 2025

Compliance Debt: Why CISOs Need to Borrow a Concept from Engineering

Every deferred control gap, stale evidence artefact, and unreviewed policy is compliance debt — and it compounds. Here is how CISOs can measure it, communicate it to the board, and pay it down strategically.

compliance debt technical debt CISO risk management
Read
EU Compliance 2025 Year in Review: The Regulatory Tsunami Arrived thumbnail
Compliance17 December 2025

EU Compliance 2025 Year in Review: The Regulatory Tsunami Arrived

2025 was the year EU cybersecurity regulation moved from theory to enforcement. DORA applied, NIS2 transposition happened (mostly), and AI Act prohibited practices kicked in. Here is what mattered, what surprised us, and what 2026 brings.

year in review NIS2 DORA AI Act
Read
Security Questionnaires: How to Cut Response Time From Weeks to Days Without Introducing Risk thumbnail
Questionnaires10 December 2025

Security Questionnaires: How to Cut Response Time From Weeks to Days Without Introducing Risk

A practical guide to reducing security questionnaire response time using knowledge base building, AI-assisted drafting, template standardisation, and approval workflows — without sacrificing accuracy or creating contractual exposure.

Security questionnaires Trust center Procurement Evidence
Read
EU AI Act Prohibited Practices: What Actually Changed on February 2nd thumbnail
AI Governance2 December 2025

EU AI Act Prohibited Practices: What Actually Changed on February 2nd

Article 5 of the EU AI Act — the prohibited practices ban — became enforceable on February 2, 2025. Ten months in, here is what actually changed in practice, which systems were affected, and what the enforcement landscape looks like.

EU AI Act prohibited practices Article 5 compliance
Read
Vendor Risk After DORA: Why Annual Questionnaires Are No Longer Enough thumbnail
TPRM25 November 2025

Vendor Risk After DORA: Why Annual Questionnaires Are No Longer Enough

DORA Chapter V transformed vendor risk from an annual assessment exercise into continuous operational oversight. Here is why the old questionnaire model fails, what continuous oversight actually means, and how to transition in 90 days.

TPRM DORA vendor risk continuous monitoring
Read
DORA CTPP Designation (November 2025): Concentration Risk and Exit Readiness thumbnail
DORA22 November 2025

DORA CTPP Designation (November 2025): Concentration Risk and Exit Readiness

The ESAs designated critical ICT third-party providers under DORA in November 2025. This article explains what changes for financial entities and ICT dependency strategy.

DORA CTPP Third-party risk Concentration risk
Read
Why FortisEU Is Building the Continuous Control Security Category thumbnail
Strategy21 November 2025

Why FortisEU Is Building the Continuous Control Security Category

The gap in the market is real: US-centric GRC tools do not serve EU-regulated entities. Compliance should be continuous, not periodic. EU sovereignty is a requirement, not a feature. This is the thesis behind FortisEU.

FortisEU Category strategy Continuous control security Risk convergence
Read
Building a Compliance Team for the EU Regulatory Wave: Roles, Skills, and Structure thumbnail
Compliance4 November 2025

Building a Compliance Team for the EU Regulatory Wave: Roles, Skills, and Structure

NIS2, DORA, and the EU AI Act are creating unprecedented demand for compliance professionals. Here is what a modern EU compliance team looks like — roles, skills, team structures by org size, and what to automate versus hire for.

compliance team hiring skills GRC
Read
EU Data Sovereignty: Cloud Act and FISA 702 Risk Explained for Procurement thumbnail
Data Sovereignty24 October 2025

EU Data Sovereignty: Cloud Act and FISA 702 Risk Explained for Procurement

Data residency is not data sovereignty. A procurement-grade explanation of Cloud Act and FISA 702 exposure, the EU-US DPF's limitations, and practical criteria for evaluating cloud providers under GDPR Art. 44-49 transfer safeguards.

Data sovereignty Procurement Cloud Act FISA 702
Read
DORA at Nine Months: What Supervisors Are Actually Asking thumbnail
DORA14 October 2025

DORA at Nine Months: What Supervisors Are Actually Asking

Nine months after DORA's January 17, 2025 application date, the supervisory approach is taking shape. Here is what national competent authorities and ESAs are focusing on in their first reviews — and where financial entities are falling short.

DORA supervision ESA financial services
Read
DORA After Go-Live: What Auditors and Regulators Request First thumbnail
DORA8 October 2025

DORA After Go-Live: What Auditors and Regulators Request First

DORA has been in effect since January 17, 2025. Here are the first artifacts auditors and regulators ask for, and how to respond with evidence instead of narrative.

DORA ICT risk TPRM Resilience testing
Read
ENISA NIS Investments 2025: The Talent-vs-Technology Execution Gap thumbnail
Cyber Strategy30 September 2025

ENISA NIS Investments 2025: The Talent-vs-Technology Execution Gap

ENISA's 2025 NIS Investments report reveals a persistent gap between cybersecurity technology spending and talent investment. Why tools without people fail, and how to allocate budgets that actually build resilience.

ENISA NIS investments Cybersecurity strategy Talent
Read
ENISA as CVE Root in 2025: What EU Security Leaders Should Change Immediately thumbnail
Vulnerability Intelligence18 September 2025

ENISA as CVE Root in 2025: What EU Security Leaders Should Change Immediately

ENISA became a CVE Numbering Authority root in 2025, launching the EUVD and shifting EU vulnerability coordination. Here is what security leaders need to change in their vulnerability management programs.

ENISA CVE Vulnerability disclosure Cybersecurity governance
Read
NIS2 Transposition at Six Months: Which Member States Are Ready? thumbnail
NIS29 September 2025

NIS2 Transposition at Six Months: Which Member States Are Ready?

Six months after the October 2024 transposition deadline, only a handful of EU Member States have fully transposed NIS2 into national law. Here is the scorecard, the reasons for delay, and what cross-border entities should do now.

NIS2 transposition member states enforcement
Read
ENISA Threat Landscape 2025: Convert Threat Trends into a Board Priority Stack thumbnail
Threat Intelligence2 September 2025

ENISA Threat Landscape 2025: Convert Threat Trends into a Board Priority Stack

How to translate ENISA's 2025 Threat Landscape report into board-level investment priorities. A framework for converting ransomware, supply chain, and AI-enabled threat trends into defensible executive decisions.

ENISA Threat Landscape Board reporting Cyber risk CTEM
Read
AI Act GPAI Rules Since August 2, 2025: How to Operationalize Compliance Without Chaos thumbnail
AI Governance12 August 2025

AI Act GPAI Rules Since August 2, 2025: How to Operationalize Compliance Without Chaos

The EU AI Act's general-purpose AI obligations started on August 2, 2025. This guide shows how security and compliance teams can turn legal text into an auditable operating model.

EU AI Act GPAI AI governance Compliance operations
Read
Newsletter

Stay Updated on EU Compliance

Monthly insights on NIS2, DORA, and procurement-ready security reviews. No spam.

By subscribing, you agree to our Privacy Policy.