Bulgaria’s NIS2 implementation categorizes organizations as ‘essential’ or ‘important’ and amends the national Cybersecurity Act to introduce enhanced risk management obligations and stricter incident reporting duties. See how your Bulgarian operations align with the NIS2 requirements by taking the assessment.



Vaatimukset täyttyvät jalkauttamalla digiturvatehtäviä.
Mitä kukin tekee digiturvan eteen?
Osa tehtävistä vaatii asioiden ohjeistamista henkilöstölle.
Mitä pitää muistaa arjessa?
Osa tehtävistä vaatii listausten pitoa tietoturvan ydinelementeistä.
Mistä pitää voida raportoida?



The Law for the Implementation of NIS2 in Bulgaria aims to transpose the EU's NIS2 Directive into national law. The NIS2 Directive (Directive (EU) 2022/2555) aims to harmonize cybersecurity standards across EU member states, introducing stricter requirements, expanding the scope of affected sectors, and imposing more serious sanctions for non-compliance.
The Bulgarian law will amend and supplement the existing Cybersecurity Act to align with NIS2. It introduces two categories of entities: 'essential' and 'important,' based on size and sectoral importance, covering a wider range of organizations than the original NIS directive. The law includes enhanced risk management obligations and stricter incident reporting duties.

Gain insights into your organization's compliance status towards the most popular information security frameworks worldwide, in just a few clicks.

Receive a detailed, easy-to-understand report that highlights your strengths and areas for improvement.

Complete the assessment and download your compliance report at no cost.

Move from assessment to full-scale ISMS implementation with just one click, ensuring continuous compliance monitoring.
.png)
Choose the framework that is most relevant for you and start assessing. You'll see a suggested list of measures, which you can categorize according to your current operations.
You'll automatically see your compliance score updating and can click "Preview results" at any time to see a more detailed summary of your assessment results. This report can be printed for internal discussion about current security level.


Aftey your assessment, you can choose to transition to a free Cyberday ISMS account to actually start implenenting and monitoring your security actions. You can utilize our tools for e.g. control deployment, risk management, internal auditing and improvement management to get better every day.
Access a detailed compliance report tailored to your selected framework. Dive into the structure, review gaps, and explore actionable insights that help you achieve full compliance.
