NIS2 › NIS2 Compliance

NIS2 Training Requirements: Complete Guide to Cybersecurity Education

NIS2 requires cybersecurity training for both management and employees. Get an overview of the requirements, what the training should include, and how to get started with compliance.

Illustration of NIS2 training requirements displayed on a computer screen with checklist, shield icon and turquoise progress bar on a blue-to-lavender gradient background.

Table of Contents

    NIS2 requires that both management and employees in covered organisations receive proper training in cybersecurity.

    This article examines the training requirements in NIS2, including who must be trained, what the training should contain, and tips for getting started.

    You can read our introduction to NIS2 if you want an overview of the directive.

    Training is a Management Responsibility

    NIS2 places particular responsibility on management's involvement in steering the organisation's cybersecurity efforts, and therefore it is both a good idea and a requirement that members of management must have the necessary knowledge, which can come through participation in relevant cybersecurity courses. This ensures that management has a stronger professional foundation for managing these risks.

    At the same time, NIS2 requires that measures include basic cyber hygiene practices and cybersecurity training, which employees must therefore be educated in.

    Illustration of a governance dashboard with risk indicator, compliance status and reporting elements visualising management responsibility under NIS2.

    This requirement must be met continuously, which means that you cannot simply ask relevant employees to take a one-off course. You must instead ensure that everyone in the organisation has skills in 'basic cyber hygiene practices'. Therefore, the organisation should establish a plan for how knowledge and behaviour are developed and maintained over time.

    So there is both a NIS2 requirement for training for managers and the organisation as a whole, and that everyone has the necessary knowledge and practice in cybersecurity to fulfil their roles.

    What Should Management Training Contain?

    To comply with NIS2, management must have sufficient knowledge of cybersecurity so they can make qualified decisions about it. NIS2 therefore requires that members of management acquire knowledge and skills, for example through relevant courses on managing cybersecurity risks. There are no rigid requirements for how this should be met. What's important is that management as a whole gains the competencies to understand cybersecurity threats, assess the organisation's risks, and make qualified decisions on the subject.

    For example, it would be appropriate for management to be trained in general IT security courses, risk management, relevant legal requirements in the IT area, and relevant IT security standards.

    Examples of Relevant Training for Management

    • General courses in cyber and information security – Introduction to the cybersecurity landscape and threat picture
    • Targeted executive courses – Strategic cybersecurity leadership for directors and board members
    • Workshops on governance and strategy – Focus on the organisation's specific needs and sector
    • Certification courses – For example ISO 27001 or other information security standards
    • Internal courses – Teaching that focuses on management's specific organisation and sector

    NIS2 does not establish detailed requirements for the form and content of training, but it is important that training is seen in the light of NIS2, which concerns cybersecurity in critical infrastructure, and in light of the management requirements NIS2 sets regarding governance.

    What Should Employee Training Contain?

    It is employees who work daily with systems, data, and communication, and who are therefore also the most important in the organisation's daily cybersecurity efforts. NIS2 therefore also emphasises that cybersecurity is about behaviour and competencies in individual employees.

    Management should encourage employees to receive corresponding training, meaning that employees also receive education that corresponds to their role in the organisation, which may therefore be different from management's training.

    Awareness Training for All Employees

    For example, you can educate employees with awareness training, which all employees complete, and which lays a foundation for employees' awareness and knowledge of cybersecurity. This can happen through an e-learning course that explains the most common threats such as phishing and other social engineering attacks, password security, information sharing, and physical security.

    Training must be understandable and relevant to everyone with responsibility for delivering the critical service to end users. This can be operational staff who have direct access to production facilities, or administrative staff with access to central systems, as well as anyone with access to the organisation's facilities.

    Targeted Training for Critical Personnel

    You should ensure that staff with particular responsibility for the delivered service, such as operational staff or IT, receive training that aligns with the risk assessment. Critical personnel should therefore have targeted training, as their work entails greater risk for service delivery.

    Targeted training can also take place as e-learning courses with specialised courses, or with internal workshops on the topics, or through participation in external training courses. What's most important is that employees are continuously trained so they can each handle the risks that the organisation and sector face.

    Employee Group Training Needs Examples
    Management Strategic cybersecurity, governance, risk management Executive courses, ISO 27001, workshops
    All employees Basic cyber hygiene, phishing, passwords Awareness training, e-learning
    IT personnel Technical cybersecurity, incident response, network security Certifications, technical courses
    Operational staff Operational security, physical security, procedures Targeted workshops, on-the-job training
    HR & Administration Data protection, confidential information, social engineering GDPR courses, awareness training

    Documenting Training

    Training must be documented, for example with a course certificate or written confirmation of participation, so it can be provided to authorities during inspection.

    Illustration of a continuous training cycle with document, turquoise checkmarks and circular arrows on a light blue background.

    If you choose to conduct your own training courses, you can create a participant list, describe the learning objectives and course content, and save the training materials. It doesn't need to be complicated.

    What Should Be Documented?

    • Participant lists – Who has completed which courses
    • Course content – What was taught
    • Learning objectives – What participants should learn
    • Course certificates – Documentation of completed training
    • Training materials – Slides, manuals, e-learning
    • Evaluations – Tests or assessments of learning

    Use information security software to keep track of documentation and ensure all employees are up to date with their training.

    Training Policy: Structured Approach to NIS2 Requirements

    NIS2's requirements for the organisation's cybersecurity training are significant, and therefore it is also a good idea to take a structured approach to the requirement by creating a training policy or plan.

    Your training policy can describe the different employee groups and their tasks. You can use this to provide targeted training, so that tasks involving greater risks receive targeted training.

    What Should a Training Policy Contain?

    1. Purpose and scope – Why do we train, and who does it cover?
    2. Roles and responsibilities – Who is responsible for what in training work?
    3. Training needs per role – What competencies are required in different positions?
    4. Training content – Which topics should be covered?
    5. Frequency – How often should training be repeated?
    6. Delivery method – E-learning, workshops, external courses?
    7. Documentation and follow-up – How is training documented and evaluated?
    8. Updates – How is the policy kept current with new threats?

    You should specify the purpose of training for each employee group, and then organise their training accordingly, such as content, frequency, tests, and documentation.

    The training policy doesn't need to be long, and should simply be used as operational help for training work, and it also functions as documentation.

    Non-Compliance with NIS2 Training Requirements

    If your organisation does not meet NIS2's training requirements, it can have consequences for management, who can be sanctioned, and additionally the organisation can receive a fine.

    NIS2 involves personal management liability, which means that board members or directors can become personally liable in cases of gross negligence, including lack of cybersecurity training.

    Fines for non-compliance can be significant:

    • Essential entities: Up to €10 million or 2% of global annual turnover
    • Important entities: Up to €7 million or 1.4% of global annual turnover

    In addition to financial sanctions, lack of training can also weaken the organisation's actual cybersecurity and increase the risk of security incidents.

    Take Action: Getting Started with NIS2 Training

    NIS2 sets training requirements for both management and employees. Here's a practical approach to getting started:

    Step 1: Assess Current Competencies

    • Map existing cybersecurity knowledge in the organisation
    • Identify competency gaps in relation to NIS2 requirements
    • Prioritise which areas require most urgent training

    Step 2: Develop Training Policy

    • Define roles and their training needs
    • Establish frequency and delivery methods
    • Set up documentation procedures

    Step 3: Implement Training

    • Start with management training – it sends an important signal
    • Roll out awareness training to all employees
    • Provide targeted training to critical personnel

    Step 4: Document and Evaluate

    • Keep track of who has completed which courses
    • Evaluate the effectiveness of training
    • Update and adjust continuously based on new knowledge and threats

    Organise the organisation's training so it matches roles and needs, and describe all this in a training policy. This will make it easier to decide how the training requirement is continuously met, and adjust the training effort as needed.

    At .legal, we can help you structure your NIS2 compliance, including handling training requirements and documentation. See how our Frameworks module supports NIS2 compliance or book a demo.

     

    Frequently Asked Questions about NIS2 Training Requirements

    Who must be trained under NIS2?

    NIS2 requires training for both management bodies and all employees. Management must receive specific cybersecurity training to understand risks and assess cybersecurity measures. All employees must receive regular training to identify and respond to cyber threats relevant to their roles.

    What should management cybersecurity training contain?

    Management training should cover the organisation's threat landscape, NIS2 legal obligations and penalties, risk management frameworks, incident response procedures, their personal liability under NIS2, supply chain security, and how to evaluate cybersecurity investment decisions.

    How often should NIS2 training be conducted?

    NIS2 does not specify exact frequency, but training should be regular and ongoing. Best practice is annual training for all staff with supplemental sessions when threats change, after incidents, for new employees, and when policies or systems are updated.

    What topics should employee cybersecurity training cover?

    Employee training should include recognising phishing and social engineering, password security and multi-factor authentication, secure handling of data, incident reporting procedures, acceptable use policies, mobile and remote working security, and awareness of current threat trends.

    Can NIS2 training be delivered online?

    Yes, NIS2 does not mandate a specific delivery format. Online training, e-learning platforms, in-person workshops, and blended approaches are all acceptable. The key requirement is that training is effective, documented, and reaches all relevant personnel.

    What documentation do I need for NIS2 training compliance?

    Document your training programme including content descriptions, delivery schedules, attendance records, assessment results, and evidence that training is updated regularly. You should also document how training content addresses specific NIS2 requirements.

    What are the consequences of inadequate NIS2 training?

    Inadequate training can lead to regulatory fines, but more importantly, management can be held personally liable under NIS2. Authorities can issue compliance orders, impose fines, and in severe cases, temporarily ban individuals from management positions.

    Does NIS2 training need to be customised by role?

    Yes, training should be tailored to roles. Management needs strategic cybersecurity understanding, IT staff need technical security training, and general employees need practical awareness training. The depth and focus should match each role's responsibilities and risk exposure.

    How does NIS2 training relate to ISO 27001 awareness requirements?

    ISO 27001 also requires security awareness and training (Annex A 6.3). NIS2 training can build on ISO 27001 awareness programmes but must additionally cover NIS2-specific topics like incident reporting obligations, management liability, and sector-specific threats.

    What is the best way to measure training effectiveness under NIS2?

    Use a combination of knowledge assessments (quizzes/tests), phishing simulations, incident response exercises, tracking of security incident trends, and regular competency reviews. Document results to demonstrate continuous improvement in your organisation's security culture.

    Processing activities

    .legal compliance platform Organise Your NIS2 Training Programme

    NIS2 makes management personally accountable for cybersecurity training. Use .legal to plan, deliver, and document training programmes that satisfy NIS2 requirements and protect your organisation.
    • Create role-specific training plans for management and staff
    • Track training completion and maintain compliance records
    • Document training content aligned to NIS2 requirements
    • Schedule recurring training with automatic reminders
    • Generate training compliance reports for auditors
    +400 companies use .legal
    Region Sjælland
    Aarhus Universitet
    aj_vaccines_logo
    Realdania
    Right People
    IO Gates
    PLO
    Finans Danmark
    geia-food
    Vestforbrænding
    Evida
    Klasselotteriet
    NRGI1
    BLUE WATER SHIPPING
    Karnov
    Ingvard Christensen
    VP Securities
    AH Industries
    Lægeforeningen
    InMobile
    AK Nygart
    ARP Hansen
    DEIF
    DMJX
    Axel logo
    qUINT Logo
    KAUFMANN (1)
    SMILfonden-logo
    kurhotel_skodsborg
    nemlig.com
    Molecule Consultancy
    Novicell