Blog Series: Cybersecurity & NIS2

Cybersecurity as a business enabler: How NIS2 elevates strategic value

Cybersecurity is no longer a siloed IT concern, it is a boardroom imperative. The European Union’s NIS2 Directive marks a shift in how organizations must approach cyber resilience. Far from being a compliance burden, NIS2 offers a unique opportunity to reframe cybersecurity as a business enabler, aligning it with strategic growth, operational agility, and stakeholder trust.

In this article, Kim Høse shares how NIS2 can catalyze this transformation, leveraging the existing risk management perspective of Boards of Directors (BoD), and outlines the strategic and tactical pathways to embed cybersecurity into the core of business value creation.

Kim Hoese | January 5, 2026

NIS2 is more than a compliance directive - it's a strategic opportunity

Kim Høse NTT DATA Business Solutions

From cost center to strategic asset

Historically, cybersecurity has been viewed as a necessary expense: An insurance policy against digital threats.

However, NIS2 reframes this narrative by mandating risk-based governance, supply chain security, and incident response readiness. These requirements align closely with business continuity, reputation management, and operational efficiency – areas where the BoD already exercises oversight.

Strategic alignment

NIS2’s emphasis on governance and accountability elevates cybersecurity to a strategic concern. Boards are now required to ensure that cybersecurity risks are integrated into enterprise risk management frameworks. This shift enables organizations to:

  • Protect revenue streams by minimizing downtime and data breaches.
  • Enhance brand trust through demonstrable compliance and resilience.
  • Accelerate digital transformation by securing cloud, AI, and IoT environments.

Tactical enablement

On the tactical front, NIS2 encourages organizations to adopt pre-emptive security measures such as:

  • Automated threat detection and response.
  •  Zero Trust architectures.
  • Cyber deception and observability.

These technologies not only reduce risk but also optimize operations, streamline compliance, and enable faster innovation cycles.

By aligning cybersecurity with business goals, organizations can drive innovation, enhance resilience and build trust with customers, partners, and regulators

Kim Høse NTT DATA Business Solutions
Create an effective SAP strategy and IT roadmap with SAP consulting services from itelligence.

The board’s hidden advantage: Business acumen as risk competence

One of the most overlooked aspects of NIS2 is its implicit recognition that Boards already possess the core competencies needed for cyber risk oversight. These include:

Strategic risk thinking

BoDs routinely evaluate market, financial, and operational risks. Cyber risk, under NIS2, is simply another dimension—albeit one with unique technical characteristics. The ability to prioritize risks, allocate resources, and balance trade-offs is already embedded in boardroom decision-making.

Stakeholder management

Cyber incidents can erode stakeholder trust. Boards understand reputational dynamics and are well-positioned to navigate post-incident communications, regulatory disclosures, and investor relations.

Governance structures

Boards oversee internal controls, audit functions, and compliance programs. These structures can be extended to include cybersecurity KPIs, incident reporting, and third-party risk assessments, as required by NIS2. Read more

Our expert experience with SAP ensures you receive the best IT strategy consulting.

NIS2 as a catalyst for business outcomes

Operational efficiency

Preemptive cybersecurity strategies—such as automated moving target defense (AMTD) and network observability—reduce manual overhead and improve threat detection. Case studies show that organizations adopting these measures have:

  • Reduced domain administrator privileges from 350 to zero.
  • Accelerated remediation timelines. · Improved executive confidence in security controls. Read more

Cost optimization

Cybersecurity investments under NIS2 can yield measurable ROI. For example:

  • Consolidating security portfolios can save millions annually.
  • Pay-as-you-use models for cloud security reduce CapEx.
  • Automated compliance reduces audit costs and penalties. Read more

Business continuity

NIS2 mandates incident response planning and supply chain security. These requirements directly support:

  • Faster recovery time objectives (RTO).
  • Reduced system downtime.
  • Enhanced resilience against geopolitical and environmental disruptions.

Strategic element: Turning NIS2 into a competitive advantage

NIS2 is not just about compliance – it’s a catalyst for business transformation. By embedding cybersecurity into enterprise risk management, organizations can:

  • Protect revenue streams through reduced downtime and faster recovery objectives.
  • Enhance trust and reputation by demonstrating resilience and regulatory alignment.
  • Accelerate digital transformation with secure adoption of cloud, AI, and IoT.

From a strategic lens, this shift moves cybersecurity from a cost center to a value driver. For example, companies that consolidated fragmented security portfolios achieved multi-million-dollar savings annually while improving detection-to-response times from days to minutes. Similarly, adopting Zero Trust architectures and automated moving target defense (AMTD) not only mitigated risk but also improved operational agility—critical for scaling in volatile markets.

Frameworks like Playing to Win help operationalize this vision:

  • Where to play: Focus on critical assets, high-risk geographies, and vulnerable supply chains.
  • How to win: Invest in AI-powered threat intelligence, secure cloud workloads, and endpoint protection.
  • Capabilities required: Build internal cyber expertise, partner with MSSPs, and deploy scalable security architectures.
  • Management systems: Integrate cybersecurity KPIs into board dashboards and governance reviews.

ADKAR change management

The ADKAR model (Awareness, Desire, Knowledge, Ability, Reinforcement) supports cultural transformation:

  • Awareness: Educate BoD and executives on NIS2 implications.
  • Desire: Link cybersecurity to business outcomes.
  • Knowledge: Provide training on cyber governance and risk metrics.
  • Ability: Equip teams with tools and processes.
  • Reinforcement: Embed cyber KPIs into board agendas and audit cycles.

Overcoming organizational biases and limitations

Despite the strategic potential, cognitive biases and structural limitations often slow progress:

Cognitive biases

  • Status quo bias: Many organizations cling to legacy perimeter defenses because “it worked before.” In one engagement, this delayed adoption of AMTD, leaving critical workloads exposed to AI-driven attacks.
  • Optimism bias: Leadership assumes “we’re too small to be targeted,” yet red-team exercises repeatedly show attackers exploiting overlooked IoT endpoints to pivot into core systems.
  • Anchoring bias: Budget decisions anchored to last year’s IT spend ignore the exponential rise in attack sophistication, resulting in underinvestment in cloud security posture management.

Organizational limitations

  • Skill shortages: A global manufacturer lacked OT security expertise. Introducing OT penetration testing and secure code training bridged the gap without disrupting operations.
  • Siloed thinking: Disconnect between IT, risk, and business units created blind spots in supply chain security until cross-functional governance was implemented.
  • Budget constraints: A financial institution hesitated to invest in advanced threat simulation—until ROI was demonstrated through portfolio consolidation, saving $2.28M annually.

NIS2 provides the regulatory momentum to overcome these barriers by mandating:

  • Board-level accountability.
  • Cross-functional collaboration.
  • Continuous improvement through structured frameworks like ADKAR (Awareness → Desire → Knowledge → Ability → Reinforcement).

Conclusion: Cybersecurity as a growth lever

NIS2 is more than a compliance directive – it is a strategic opportunity. By aligning cybersecurity with business goals, organizations can:

  • Drive innovation through secure digital transformation.
  • Enhance resilience in a volatile threat landscape.
  • Build trust with customers, partners, and regulators.

Boards of Directors, with their existing risk management competencies, are uniquely positioned to lead this transformation. By embracing NIS2 not as a cost but as a catalyst, they can turn cybersecurity into a growth lever—one that safeguards the present and secures the future.

Read more about cybersecurity from us

Contact us

We would be happy to have a no-obligation talk about cybersecurity with you.

Contact us by filling out the form here and our experts will get in touch.

Blog Series: Cybersecurity & NIS2