Our team specializing in cybersecurity, regulatory compliance, and law will guide you through a comprehensive assessment of your readiness in relation to the requirements arising from the new Cybersecurity Act No. 264/2025 Coll., which transposes the NIS2 Directive into national legislation and is in force starting from November 2025, representing a fundamental change in the field of cybersecurity in the Czech Republic and introducing new obligations for a wide range of organizations.
NIS2 is a European directive that sets rules and requirements for cybersecurity and ICT systems and networks. Following on the previously applicable NIS Directive, it improves cybersecurity across the European Union by harmonizing security requirements and reporting obligations. It extends the scope of requirements to other areas of interest, such as supply chain management, vulnerability management, and cyber hygiene, and strengthens cooperation and knowledge sharing among EU Member States. Alongside the Digital Operational Resilience Regulation (DORA) and the Critical Entities Resilience Directive (CER), NIS2 is another European Union legislative tool focused on increasing the digital operational resilience and cybersecurity of all relevant entities operating in the EU.
Although NIS2 has been in force at the European level since the beginning of 2023, its requirements affect individual entities in the Czech Republic only through the Cybersecurity Act.
The final version of the NIS2 Directive was published in the Official Journal of the EU in December 2022 in all official languages, and Member States were responsible for the implementation of the requirements into their national legislation by 17 October 2024. This deadline was not met in the Czech Republic – the final version of the Cybersecurity Act was published only on 4 August 2025 and signed by the President only in June 2025. Below is an overview of the new rules introduced by the Act.
The Cybersecurity Act applies to a wider range of entities than its previous version. Particularly, to providers of regulated services in key sectors such as energy, healthcare, transport, and digital services. This expansion is related to changes in the NIS2 Directive itself, which distinguishes between two categories of entities: Essential entities operating in sectors such as public administration, digital infrastructure, energy, finance, and transportation; and Important entities providing services in areas such as waste management, research, and manufacturing. In total, NIS2 affects more than 18 sectors and extends rules and obligations for businesses in four key areas, including risk management, corporate responsibility, business continuity, and reporting.
In line with the Cybersecurity Act, the entities concerned will encounter two regimes for meeting the legal requirements – a lower and a higher obligation regimes. The regime that each entity falls into depends mainly on the size of the entity and its business sector.
Entities subject to the Cybersecurity Act’s requirements are obliged to implement measures to address specific forms of cyber threats and minimize their impacts; ensure that their governing bodies oversee cybersecurity matters and are properly trained in the field; establish processes for incident reporting; prepare a comprehensive business continuity plan for major incidents. You can test your organization's compliance with the basic requirements arising from NIS2 a specified by the Cybersecurity Act using Deloitte's NIS2 Self-Assessment Tool.
It is crucial for all affected entities to start the process of achieving compliance with legal requirements as soon as possible, bearing in mind that compliance processes, including assessments of the overall state of cybersecurity, auditing, consultations, and implementation of tools, take several months and are relatively demanding. Even determining the regime of applicability itself can be challenging, given the different conditions in each business sector.
Our team of experts in cybersecurity, regulatory compliance
and law, risk management, and security controls implementation will help you
meet all requirements of the Cybersecurity Act. Our support includes a
comprehensive approach to cyber risk management and compliance, including:
If you want to be sure that your organization is prepared to comply with legal requirements, do not hesitate to contact us. We will conduct a gap analysis for you, prepare an action plan, and provide support in implementing the necessary measures.
An overview of our services by area can be found below.