Skip to content
Gini Logo
  • Solutions
    • Spacing column
    • Menu image 1
    • Banks
      • Snap Pay
      • Payment Initiation
      • Mobile wallet
    • Insurance
      • In-App Payment
      • Mobile capture
      • Smart Claims Folder
    • Spacing column
  • Products
    • Spacing column
    • Menu image 2
    • Extract
      • Gini Smart
      • Gini Smart OCR+
      • Gini Smart Mobile Input
    • Payment
      • Gini Pay Connect
      • Gini Pay Photo Payment
      • Gini Request-to-pay
    • Spacing column
      • Screenshot Payments
      • PDF Payments
      • QR Code Payments
  • About us
    • Spacing column
    • Menu image 3
    • Spacing column
    • About Gini
      • Jobs
      • Blog
      • Press
    • Spacing column
  • Developer
  • Contact
  • DE
  • EN
  • Solutions
    • Banks
      • Snap Pay
      • Payment Initiation
      • Mobile wallet
    • Insurance
      • Mobile capture
      • In-App Payment
      • Smarter Einreichungsordner
  • Products
    • Extract
      • Gini Smart
      • Gini Smart OCR+
      • Gini Smart Mobile Input
    • Payment
      • Gini Pay Connect
      • Gini Pay Photo Payment
      • Gini Pay Screenshot Payments
      • Gini Pay PDF Payment
      • Gini Pay QR Code Payments
      • Mobile wallet
  • About us
    • About Gini
    • Jobs
    • Blog
    • Press
  • Developer
  • Contact
  • DE
  • EN

NIS-2: Consequences for banks, insurance companies and IT partners

NIS-2

Michael Poprat

Jul 21, 2023 • 

4.2 min read

NIS-2 Directive: What's in store for banks and insurance companies?

NIS-2 is an EU directive that builds on the first Network and Information Security Directive (NIS-1) and must be transposed into national law by October 17, 2024, at the latest. The EU’s introduction of NIS-2 has significantly tightened security requirements for critical infrastructure operators (such as banks and insurance companies) and digital service providers. These new regulations not only have a direct impact on the affected companies themselves but also on the suppliers and service providers they use. NIS-2 aims to make the EU and its member states more resilient to cyber-attacks and digital threats, thereby increasing confidence in digital services and the online sector. In this blog article, we will look closer at the implications of NIS-2 for Gini as a partner for banks and insurance companies.

What does the introduction of NIS-2 mean for banks and insurance companies?

NIS-2 applies to operators of essential services and providers of digital services, which undoubtedly include banks and insurance companies (see Annex I, NIS-2). In this context, the directive specifies requirements that fundamentally concern the security of networks and information systems. It includes measures for preventing security incidents, implementing security policies, implementing effective risk management (identifying risks, assessing them according to their impact, implementing and monitoring risk-reducing measures), and introducing regular security controls. Also essential to NIS-2 is the obligation to report significant security breaches within 24 hours and, along with this, the obligation to cooperate with national authorities to address significant security incidents. In detail, this involves the obligation to report and provide information and assist in the investigation.
The national authorities, in turn, are responsible for ensuring that the NIS-2 requirements are met by the organizations concerned. They, thus, must monitor and impose sanctions in the event of violations.
Companies affected by NIS-2 are well advised to deal with the requirements early and implement an auditable management system.

What does the introduction of NIS-2 mean for Gini?

1. Enhanced security requirements

NIS-2 significantly increases the security requirements for affected companies. This means that their suppliers and service providers, such as Gini, now also have an increased obligation to ensure that their products and services meet the latest standards for data processing security. Suppliers must, for example, review their network and server infrastructure security measures and permanently ensure that they have implemented appropriate technical and organizational measures to sustainably guarantee the security of the products and services provided.

2. Contractual conditions and adjustments

With NIS-2, affected companies must revise their contracts with suppliers and service providers to meet the new security requirements. Suppliers and service providers must include additional clauses in their contracts requiring them to meet certain security standards and conduct regular security audits. This may require suppliers and service providers to adapt their business practices and internal processes to meet the requirements.

3. Audit of the supply chain

Under NIS-2, affected companies will be required to assess and monitor the security of their entire supply chain. This means that they must improve their network security and ensure that their suppliers and service providers have implemented appropriate security measures and regularly review them for effectiveness. As a result, companies will need to scrutinize their suppliers and service providers more closely and require them to disclose their security measures or demonstrate appropriate certifications.

4. Risk mitigation and collaboration

Suppliers and service providers should be aware that customers affected by NIS-2 may require them to develop and submit risk mitigation plans. This could include, for example, measures to strengthen network security and business continuity, regular security audits, or training for employees. Close collaboration between affected companies and their vendors and suppliers is critical to ensure security throughout the supply chain.

5. Cooperation in reporting obligations

Companies and organizations affected by NIS-2 must report significant security incidents and service disruptions to the appropriate national authority. The reporting obligations are bound to strictly defined periods, which must also be observed on weekends or holidays. For example, for significant security incidents, an early warning must be issued within 24 hours, and a detailed report within 72 hours of becoming known. A final report on a security incident must be submitted within one month. Suppose companies depend on their suppliers’ and service providers’ services or support. In that case, they should contractually obligate their suppliers and service providers to take measures to ensure compliance with the reporting obligations.

This is the conclusion we draw from the new NIS-2 guidance

.
NIS-2 directly impacts our partners in the banking and insurance environment and us as Gini. We must meet heightened security standards throughout the network and supply and service chain. Fortunately, from the beginning, Gini assures its customers and partners that it maintains a very high level of security for systems and data. With ISO 27001 certification and, in particular, by aligning its processes and documentation with the new version of ISO 27001:2022, which places even more emphasis on cybersecurity, Gini already considers itself capable of meeting the stringent security requirements of NIS-2. By continuously developing and improving its internal processes and security facilities, Gini continues to be a reliable partner in cybersecurity and will continue to be so in the future.

Michael Poprat

At Gini, we want our posts, articles, guides, white papers and press releases to reach everyone. Therefore, we emphasize that both female, male, and other gender identities are explicitly addressed in them. All references to persons refer to all genders, even when the generic masculine is used in content.

Related Posts

Image binarization at Gini

Sep, 26 2022

How we do OCR with deep learning

Jun, 22 2022
How we predict confidences of our extractions

How we predict confidences of our extractions

May, 29 2020
Certificates

Footer list slide 1

10+ years on the market

Data center in Germany

Footer list slide 2

Implementation via SDK

ISO 27001 certified

Footer list slide 3

Real-time data extraction

Encrypted data transfer

Footer list mobile slide 1

10+ years on the market

Data center in Germany

Implementation via SDK

Footer list mobile slide 2

ISO 27001 certified

Real-time data extraction

Encrypted data transfer

Solutions

  • Banks
  • Insurance

Resources

  • Input Channel
  • Developer resources
  • Status

Company

  • About Gini
  • Jobs
  • Press
  • Gini Handbook

Legal

  • Imprint
  • Privacy policy
  • LinkedIn
  • Instagram
  • Instagram
  • Kununu
  • Blog
  • Twitter
  • YouTube
  • Github

Contact

Thank You!

How may we address you?

We'd like to show up prepared for our first talk. That's why we appreciate if you could share some insights on your automagic idea:

Thank you for your message. It has been sent.
An error occurred during sending this message. Please try again later.

Contact

Hi – nice to meet you.

How may we address you?

We'd like to show up prepared for our first talk. That's why we appreciate if you could share some insights on your automagic idea:

Thank you - your message has been sent.
There was an error sending the message - please try again later.

Support request

Support ticket

How may we address you?

Please describe your request including your environment and versioning of the modules in use.

Danke für deine Nachricht. Es wurde gesendet.
Danke für deine Nachricht. Es wurde gesendet.
Page load link
Go to Top