
The 2026 Regulatory Collision: Navigating NIS2, DORA, and Personal Liability for Boards
NIS2 and DORA make cybersecurity failures a personal liability for board members, not just their organisations. Here's what senior leaders must know before regulators come knocking.
Your board's cybersecurity ignorance just became a personal liability. Not your CISO's. Not your legal team's. Yours. Two EU regulatory frameworks, NIS2 and DORA, now place direct accountability for cybersecurity failures on senior management and governing bodies, with penalties attached to individuals, not just the organizations they lead. If that sentence makes you want to forward this article to your legal counsel before you finish reading it, that instinct is exactly right.
DORA has been directly applicable since January 17, 2025.
NIS2 enforcement is accelerating across EU member states, with its obligations already active through local laws where transposition is complete. These two frameworks are not parallel lanes on the same highway; they are converging, and the collision point sits squarely on the boardroom table. The financial sector faces the sharpest exposure, operating under both regimes simultaneously, but any organization providing critical infrastructure or digital services to EU markets cannot afford to treat this as a European subsidiary's problem.
The business case for acting now is not abstract.
For essential sectors, NIS2 penalties for breaches of cybersecurity measures and notification obligations may reach a maximum of at least €10 million or 2% of global turnover.
DORA carries fines of up to 2.5% of annual global turnover for financial entities. Neither figure accounts for the reputational damage, lost contracts, and operational disruption that accompany public enforcement action.
The Transposition Mess Your Legal Team Hasn't Fully Mapped
As of mid-February 2025, the number of countries that had transposed NIS2 into national legislation increased from four to nine, but the implementation process was marked by a substantial divergence in adoption timelines and requirements, creating operational and compliance challenges for entities providing services in multiple jurisdictions.
The situation has since evolved, but not cleanly.
On May 7, 2025, the European Commission sent a reasoned opinion to 19 Member States, including Germany, France, Spain, and Ireland, for failing to notify full transposition of the NIS2 Directive.
Those 19 Member States had two months to respond and take the necessary measures; otherwise, the Commission could decide to refer the cases to the Court of Justice of the European Union.
What this means operationally: your organization may face different enforcement regimes, different reporting thresholds, and different liability standards depending on which EU member state has jurisdiction over a given entity.
Reporting obligations under NIS2 vary significantly across member states, creating a fragmented compliance landscape for cross-border entities. Definitions of "significant incidents," reporting thresholds, and timelines differ, with some countries imposing stricter requirements than NIS2 does.
For example, entities in Cyprus must submit early warnings within six hours of detection, well ahead of NIS2's 24-hour requirement.
Germany illustrates how national variation can amplify board exposure.
Implementing Article 20(1) of NIS2, the German BSI Act introduces personal liability for members of management bodies under Section 38. Under NIS2, management bodies must approve their entity's cybersecurity risk-management measures and oversee their implementation; the wording of Section 38 goes further, requiring management bodies to "implement" such measures.
Where NIS2 and DORA Collide: The Reporting Gap That Breaks Incident Response
The incident reporting requirements under these two frameworks present the most operationally dangerous divergence for organizations subject to both. The table below shows where the timelines and obligations separate:
| Dimension | NIS2 | DORA (Financial Entities) |
|---|
| Initial notification | 24 hours of awareness | 4 hours after incident classification |
| Structured report | 72 hours | 24 hours after detection |
| Intermediate report | Upon CSIRT request | 72 hours with root cause update |
| Final report | 1 month after submission | 1 month after resolution |
| Reporting target | National CSIRT/competent authority | Competent financial authority |
| Principle | Directive (varies by member state) | Regulation (uniform EU-wide) |
| Personal liability | Management body (Art. 20) | Management body (Art. 13) |
| Maximum fine (entities) | €10M or 2% global turnover | 2.5% annual global turnover |
DORA mandates a four-stage reporting process: initial notification within 4 hours, initial report within 24 hours, intermediate report within 72 hours, and final report one month after resolution.
NIS2 requires an early warning within 24 hours, an incident notification within 72 hours, and a final report within one month.
The headline numbers look similar. The operational reality is not. A financial entity that also qualifies as a critical infrastructure operator must manage two parallel reporting chains from the moment an incident is classified as major, with DORA's 4-hour initial notification clock starting before most organizations' incident response teams have assembled in a bridge call.
DORA takes precedence over NIS2 for financial entities under the lex specialis principle.
That is the legal answer. The operational answer is more complex: both frameworks still impose obligations, and your incident response playbook must account for both reporting tracks simultaneously.
The board's liability under NIS2 and DORA is not contingent on a breach occurring. It attaches to the failure to approve, oversee, and demonstrate governance of cybersecurity risk management measures, regardless of whether an incident ever materializes.
Personal Liability: What "Management Body" Actually Means for Your Board
The NIS2 Directive imposes direct obligations and liability on senior management for companies in scope, meaning senior management individuals could face administrative fines and/or a potential ban or discharge from managerial functions.
Under both DORA and NIS2, managers and executives can be held accountable for cybersecurity breaches if they are found to have failed to take reasonable steps to prevent or mitigate such incidents or to implement appropriate cybersecurity policies and risk-based programs.
NIS2 deliberately leaves the composition of the "management body" undefined at the directive level, delegating specificity to member states.
While at the time of writing only around half of EU Member States have implemented NIS2 into national law, the trend almost universally adopted so far is to align the management body with the existing board of directors or equivalent of the relevant in-scope entity registering in that jurisdiction.
The result for groups with many entities in scope of NIS2 could be the allocation of multiple management bodies across the enterprise. This is causing a particular headache for group companies whose existing cybersecurity management is centralized at the level of a global headquarters. If management bodies in each local entity are required to approve and supervise cybersecurity risk management measures, there is a risk that cybersecurity decisions could become fragmented across the group.
For U.S. companies with EU operations or customers, this is not a theoretical concern. The question your board needs to answer: who, by name and role, constitutes the "management body" for each in-scope EU entity? If that answer requires a conversation to produce, your liability exposure is already material.
The CTPP Designation: When Your Vendor Relationship Becomes Your Regulator's Business
On November 18, 2025, the European Supervisory Authorities (ESAs) published a list of 19 critical ICT third-party providers (CTPPs) that will be subject to direct oversight under DORA. The list includes hyperscale cloud providers, data center providers, infrastructure and network providers, and providers of financial services-specific technology.
CTPPs that are not based in the EU will be required to establish a presence in the EU within 12 months of designation, and financial entities may be unable to use the services of such providers if they have not complied with this requirement.
For CTPPs, the ESAs have direct oversight powers to assess whether they have appropriate risk management and governance frameworks pursuant to DORA, including assessing procedures on incident reporting, subcontracting, and ICT security.
This creates a compounding risk for financial entities: designation of a key ICT provider as a CTPP does not transfer the financial entity's DORA obligations to that provider.
Being a financial entity triggers the full suite of DORA obligations, regardless of whether the firm uses a designated critical ICT third-party provider. Financial entities remain fully responsible for operational resilience and third-party risk management, including where a CTPP is directly overseen by ESAs.
Emerging Board-Level Obligations Boards Should Anticipate
Training Is Not Optional for Management Bodies
Article 20 of NIS2 is particularly disruptive: it makes managers directly responsible for non-compliance, even requiring them to undergo training.
This is not a delegation to the CISO. Board members must acquire sufficient familiarity with cyber risk to evaluate proposed measures and assess potential organizational damage. Regulators assessing "gross negligence" audit decisions, not job titles.
Framework Alignment Is Evidence of Due Diligence
No single framework satisfies NIS2 and DORA simultaneously, but structured alignment substantially reduces the gap. The NIST Cybersecurity Framework provides a widely recognized foundation for governance and risk management mapping. ENISA's guidance documents, published on June 26, 2025, set out the security measures regulated organizations should have in place under NIS2. ISO 27001:2022 functions as the primary certification standard for demonstrating due diligence to regulators across both frameworks. The CISA Cross-Sector Cybersecurity Performance Goals offer a baseline that maps reasonably well to NIS2's risk management requirements for non-financial entities.
The Lex Specialis Rule Requires Legal, Not Technical, Clarity
Where an entity falls under both NIS2 and DORA, DORA's more specific regime governs for financial sector obligations. But this principle requires legal analysis on a jurisdiction-by-jurisdiction basis. A financial entity operating in Germany, Italy, and Belgium faces three distinct NIS2 national transpositions overlaid on a uniform DORA regime. That matrix is not self-managing.
Your Board's 90-Day Readiness Checklist
The following actions are appropriate for governing bodies of EU-connected organizations to complete before enforcement intensity increases in 2026.
How I Help
The NIS2/DORA collision is not a compliance project that can be delegated to a junior legal associate or resolved by purchasing a GRC tool. It requires someone who can translate regulatory obligation into board-level governance decisions, while simultaneously advising on the technical and operational controls that give those decisions legal defensibility.
With 20+ years of experience advising senior leadership through exactly this type of regulatory convergence, I offer engagements structured around the board's specific exposure:
If your board is not yet certain who holds personal liability under NIS2 and DORA in each EU jurisdiction where you operate, that uncertainty is itself a governance failure. The right time to resolve it was before DORA's January 2025 enforcement date. The next best time is now.
Schedule a discovery call to discuss your organization's specific exposure and what a 90-day readiness sprint would look like for your board.
Adil Karam
Security & AI Governance Advisor
Helping organizations navigate security leadership and AI governance challenges.
Related Articles
CISA's Cybersecurity Performance Goals 2.0: What Boards Need to Know About the New 'Govern' Function
Board Cyber Reporting That Actually Works
The Real-Time Compliance Era: How NIS2 and DORA Are Changing Executive Accountability in 2026
Ready to Put These Insights Into Action?
Whether you need AI governance, security leadership, or compliance guidance—let's discuss how to apply these strategies to your organization.