Time to transition to NIS2: stepping up to a new era in cybersecurity
29th April, 2026 • Vienna, Austria
Austria is finally going to implement NIS2 in 2026. Between 4,000 and 6,000 organisations will be affected.
From cybersecurity laggard to leader?
EU Member States had until 17 October 2024 to implement NIS2 into national law. Austria still hasn't. So, the current legal framework remains the outdated NIS Act of 2018, which covers only a fraction of the entities that will be subject to the broader NIS2 requirements. There is currently an updated draft law, the Network and Information Systems Security Act 2026 (NISG 2026), but it is not clear when this will actually come into force in 2026.
It is therefore not surprising that, according to a recent survey, Austria is a great place to be a hacker. Why? Because every 7th cyberattack in Austria is successful. That strike rate makes cyberattacks incredibly profitable, for economic actors, and devastatingly effective, if you are intent on disruption.
The same survey revealed that:
• 55% say that Austria is not well prepared to respond to serious cyberattacks against critical infrastructure.
• More than 1 in 4 attacks (28%) can be traced back to state-backed actors.
• 1 in 3 companies (32%) had suppliers or service providers that were victims of cyberattacks which had a significant impact on their own company.
• 62% were able to identify cyberattacks with the help of their own employees - ahead of technical solutions and systems.
• 1 in 10 social engineering attempts already uses deepfake for voice and video messages.
All this suggests that organisations still need to invest more in security. It is also clear that when the NIS2 law is finally implemented, a very large number of organisations currently not mandated to take cybersecurity seriously, will soon have to do so.
This means, for example, that:
• Incident response plans must cover prolonged disconnection scenarios - not just recovery and restoration.
• Visibility into endpoint and third-party environments must improve, especially for government agencies that may be targets of nation-state actors or politically motivated hacktivists.
• Cyber supply chain risks must be re-evaluated, and vendors continuously assessed.
• Critical operations should be decoupled from external systems wherever possible.
• CISOs must improve real-time threat detection and internal threat hunting capabilities.
• Incident response and resilience must go beyond disaster recovery and into sustained continuity planning.
In Austria, the government wants higher levels of digital public service delivery. Corporations have also committed to high levels of digitalisation.
But these levels of digitalisation must be backed up by solid security. Without this, public trust in institutions and companies will be eroded, and the benefits of digitalisation will be damaged by the costs of repeated clean-ups.
