Skip to main content
Back to overview

NIS2 and Personal Board Liability: What Every Director Needs to Know

By NIS2Certify
nis2board-liabilitygovernancearticle-20directors

Most cybersecurity regulations target the organisation. NIS2 goes a step further: it targets you personally as a board member.

Article 20 of the NIS2 Directive places responsibility for cybersecurity explicitly with the management body. This means that if your organisation fails to implement adequate cybersecurity measures, you — as an individual director — can be held personally accountable.

This article explains what NIS2 requires from board members, what the consequences of non-compliance look like, and what you should do now.


What does Article 20 actually say?

Article 20 establishes four specific obligations for management bodies:

Does NIS2 Apply to Your Organisation?

1

Does your organisation operate in an essential or important sector (energy, transport, health, digital infrastructure, etc.)?

YesNo
2

Does your organisation have 50 or more employees, or an annual turnover exceeding €10 million?

YesNo
3

Is your organisation a critical infrastructure provider or a qualified trust service provider?

YesNo

NIS2 does not directly apply to your organisation.

NIS2 applies to your organisation as an Essential or Important Entity.

!

NIS2 may apply to your organisation — seek legal advice to confirm your status.

Applies
Possibly applies
Does not apply

Let's break these down:

1. Approve risk management measures

The board must formally approve the cybersecurity risk management measures required under Article 21. This means signing off on security policies, risk assessments, incident response plans, and the allocation of resources to implement them.

This is not a one-time event. As threats evolve and the organisation changes, the board must review and re-approve these measures regularly.

2. Supervise implementation

Approval alone is not enough. The board must actively oversee that the measures they approved are actually being implemented. This means regular reporting from the CISO or IT security team, reviewing progress against milestones, and addressing gaps when they arise.

If a breach occurs and the board can show they were actively supervising implementation, their position is significantly stronger than if they simply signed a document and forgot about it.

3. Be personally liable

This is the provision that changes everything. If the organisation fails to comply with the cybersecurity obligations under NIS2, individual board members can be held personally liable.

The directive does not specify exact penalties for individuals — this is left to national implementation. However, member states must ensure that management bodies can be held accountable, and several countries are implementing provisions that include:

  • Personal fines for directors
  • Temporary bans from exercising management functions
  • Public disclosure of compliance failures attributed to management

4. Undergo cybersecurity training

Board members are required to undergo training to ensure they have sufficient knowledge to identify cybersecurity risks and assess the adequacy of the measures in place.

This does not mean every director needs to become a technical expert. But they must understand the organisation's risk landscape well enough to ask the right questions and make informed decisions.


Why is this different from other regulations?

Most regulatory frameworks hold the organisation responsible. NIS2 holds individuals responsible.

Consider the contrast:

GDPRNIS2
Who is liable?The organisation (data controller/processor)The organisation and individual board members
Personal consequences?Rarely — in extreme cases of negligenceExplicitly written into the directive
Board training required?No specific requirementYes — mandatory
Active supervision required?Implied through accountability principleExplicitly required

This personal liability model is similar to what exists in financial services regulation, where individual directors can face personal sanctions for compliance failures. NIS2 brings this same level of accountability to cybersecurity.


What are the penalties?

For the organisation

  • Essential entities: fines up to €10 million or 2% of global annual turnover
  • Important entities: fines up to €7 million or 1.4% of global annual turnover

For individual board members

National implementation varies, but the directive requires member states to ensure management bodies can be held accountable. Consequences may include:

  • Personal financial penalties — separate from corporate fines
  • Temporary prohibition from exercising management functions in the entity
  • Reputational damage — public disclosure of non-compliance and the role of management
  • Civil liability — potential lawsuits from shareholders or affected parties

The "I didn't know" defence does not work

Because NIS2 explicitly requires board members to undergo training and actively supervise implementation, claiming ignorance is not a viable defence. The directive is designed to prevent exactly this scenario.


What board members should do now

Immediate actions

  1. Understand your obligations — read this article, review Article 20 and 21 of the NIS2 Directive, and consult with your legal and compliance teams
  2. Assess your current state — do you know which Article 21 measures your organisation has in place? Where are the gaps?
  3. Undergo cybersecurity training — this is not optional under NIS2. Invest in board-level training that covers risk assessment, incident response, and governance
  4. Formalise your oversight — establish regular cybersecurity reporting to the board. Set up a clear escalation path for security issues

Ongoing governance

  1. Review and approve security policies — make this a standing agenda item, not an annual checkbox
  2. Allocate adequate resources — cybersecurity requires investment. If the budget is insufficient, the board shares responsibility for the consequences
  3. Document everything — NIS2 requires demonstrable compliance. Keep records of board decisions, risk assessments, training completed, and measures implemented
  4. Monitor supply chain risks — Article 21 requires securing your supply chain. The board must understand key supplier dependencies and their security posture

The bottom line

NIS2 personal liability is not a theoretical concept — it is EU law. The directive explicitly names the management body as responsible for cybersecurity governance, requires individual training, and mandates that member states ensure personal accountability.

The organisations that will navigate this best are those where the board treats cybersecurity as a core governance responsibility — not an IT problem to delegate and forget.


Start with a free NIS2 quickscan

Want to know how prepared your organisation is? Our free NIS2 quickscan assesses your readiness across all 10 Article 21 measure categories in just a few minutes.

Share the results with your board — it's the fastest way to start an informed conversation about what needs to happen.


Read also


Take the free quickscan →

    NIS2 and Personal Board Liability: What Every Director Needs to Know — NIS2Certify