ISMS and risk management
We design an information security management system (ISMS) appropriate to the scale of risk and the business model.
We guide organisations from entity status qualification through ISMS implementation, the 24h/72h/1 month incident process and supervisory readiness.
We support companies in moving from applicability analysis to operational compliance: ISMS, governance, incidents, audits and supply chain obligations.
We design an information security management system (ISMS) appropriate to the scale of risk and the business model.
We build procedures for the 24-hour, 72-hour and 1-month obligations along with ready-made notification templates.
We organise the role of the entity's head, the supervisory model and the annual training required by the act.
We assess IT vendor risks, design contractual clauses and plan migration scenarios following HRV (high-risk vendor) decisions.
Entry into force: 1 month from publication in the Journal of Laws; if published in late February 2026, this means the end of March 2026 (estimate).
Administrative sanctions: essential entity up to EUR 10 million or 2% of turnover, important entity up to EUR 7 million or 1.4% of turnover; in critical situations up to PLN 100 million.
Legal status/material: 21 February 2026.
First we determine the organisation's legal status, because it dictates the supervisory model, the scope of audit and the level of sanctions. In practice the key decision is: are you an essential entity (often referred to as „critical”) or an important entity.
We check whether the activity falls within the sectors listed in Annex 1 (essential sectors) or Annex 2 (important sectors).
We verify the medium-sized enterprise threshold: at least 50 employees or at least EUR 10 million in turnover and EUR 10 million in total balance sheet.
Some entities fall under the regime regardless of size, e.g. DNS/TLD, selected ICT services, qualified trust service providers, CER critical entities and some public entities.
The result is either essential or important entity status, which determines the mode of supervision, audit and the scope of evidentiary obligations.
As a rule: large entities from essential sectors and the categories designated by statute regardless of size (including some ICT providers and critical entities).
Typically medium and large entities from important sectors, plus some entities from essential sectors that do not meet the criteria for essential status.
For financial entities we separate DORA and KSC obligations and design a single integrated compliance model to avoid duplicated processes.
The entity classifies its own status and submits an entry to the list. After the act enters into force, the typical timelines are 6 months to register entities that already meet the criteria, and 2 months from the moment the criteria are met later on.
legal status / content as of: 21 February 2026
We show both confirmed and conditional dates to avoid sending the wrong message about when the rules take effect.
The Sejm passed the KSC amendment implementing NIS2.
The Senate adopted the act without amendments.
Vacatio legis: 1 month from the date of publication.
Indicative scenario assuming publication in late February 2026.
Deadline for registering the entity in the list.
Deadline for full implementation of the system requirements.
legal status / content as of: 21 February 2026
We close each stage with a document that can be used both operationally and as evidence before the supervisory authority.
We check whether KSC applies to the organisation and whether it is an essential or important entity. It ends with an applicability assessment.
We enter the entity into the list, set up contact roles and the management responsibility model. A registration package is delivered.
We build the Information Security Management System (ISMS), the risk methodology and a set of security policies.
We assess vendors, run due diligence and prepare the organisation for an HRV scenario. A supply chain security package is delivered.
We design the notification and escalation process for significant incidents — the result is an incident reporting procedure.
We set up internal functions or select an outsourced SOC/CSIRT model. A cyber governance charter is delivered.
We create programmes for the management board and teams together with a training register. A training matrix is delivered.
We prepare the organisation for periodic audit and for the ordered audit mode. The result is an audit readiness package.
We tie KSC together with DORA, GDPR, AI Act and the remaining regulations into a single regulatory matrix.
We implement a review mechanism, change management and readiness for protective orders. A continuous compliance maintenance plan is delivered.
We review compliance on a regular basis, optimise costs and use it as a competitive edge. An annual review report is delivered.
Procedural readiness is key. In practice, the biggest risks are late notification and inconsistent communication with the CSIRT and customers.
Early warning after a significant incident is detected.
Incident notification with an updated impact assessment and indicators of compromise.
Final report or progress report if the incident is still being handled.
We integrate the process with GDPR obligations to avoid conflicting messages in incidents involving personal data.
The most expensive area can be replacing vendors and technologies. That is why we plan contractual, operational and migration risks before any crisis-driven decisions.
We assess critical vendors, technical dependencies and concentration risk.
We implement SLA, audit, notification and vendor exit-plan clauses.
We build a migration scenario for high-risk vendor (HRV) decisions.
We implement a single compliance model covering cyber, data and operations, rather than parallel silos.
Delineation of IT obligations for financial entities and their providers.
Consistent incident handling and aligned communication with regulators and users.
Cybersecurity of AI systems and governance of model usage.
A shared resilience architecture for critical entities.
A cybersecurity model for CASPs and crypto-asset services.
Coordinated requirements for trust services and digital infrastructure.
We tailor the implementation scope to the organisation's maturity and the level of regulatory risk.
A quick assessment of status, gaps and action priorities.
Workshop for the management board: personal liability and decision model.
Full NIS2/KSC implementation: documentation, procedures, training and a compliance maintenance model.
Incident reporting and handling model with ready-made templates.
Vendor assessment and migration plan for HRV scenarios.
Continuous compliance maintenance, change monitoring and supervisory support.
In NIS2 projects we combine the legal and operational perspectives to reduce management risk and keep services running.
Managing Partner
FinTech navigator. Lawyer.
The most common questions from management boards, compliance and IT teams during NIS2 implementations.
No. Qualification depends on the sector of activity and size thresholds, and some entities are covered regardless of size because of the nature of their services.
First we identify the sector (Annex 1/2), then size thresholds and the exceptions that apply regardless of size. Essential status usually means a higher level of supervision and audit.
It is a multi-stage incident reporting process: an early warning, a more detailed notification and a final or progress report to the relevant CSIRT.
Yes. Management is responsible for implementing and overseeing the security system, so the governance model and evidence of compliance must be in order.
No. In the financial sector, obligations from both regimes need to be properly separated and integrated to avoid gaps or duplicated work.
You need a migration plan, a management decision path and contractual safeguards for service continuity, before operational pressure builds up.
Essential entities undergo periodic audits, while important entities may be audited at the regulator's request, after an incident, or once breaches are identified.
With status qualification and a gap map. This sets the order of stages 0-10, the scope of documentation and the implementation priorities.
A resource for organisations that want to quickly bring order to their cyber activities and team responsibilities. Download the PDF and work from ready-made control points.
In the first call we determine the project stage: diagnosis, implementation or compliance maintenance after the system goes live.