Denmark’s Cybersikkerhedsloven implements NIS2 across both general critical sectors and — through a separate act — the telecom sector, introducing requirements for risk management, incident reporting, and regulatory supervision. Run the NIS2 Denmark assessment to evaluate your compliance readiness.



Vaatimukset täyttyvät jalkauttamalla digiturvatehtäviä.
Mitä kukin tekee digiturvan eteen?
Osa tehtävistä vaatii asioiden ohjeistamista henkilöstölle.
Mitä pitää muistaa arjessa?
Osa tehtävistä vaatii listausten pitoa tietoturvan ydinelementeistä.
Mistä pitää voida raportoida?



The Law on Measures to Ensure a High Level of Cybersecurity (Cybersikkerhedsloven), also known as the NIS2 Act, is the Danish implementation of the EU's NIS2 Directive.
The law aims to ensure a high level of cybersecurity across the EU member states. It introduces requirements for risk management measures, incident reporting obligations, and supervision and enforcement measures.
The law applies to both public and private entities within critical sectors, enhancing their cybersecurity and resilience. Additionally, Denmark has a specific NIS2 act for the telecommunications sector, which integrates existing national security rules for telecom providers with the enhanced cybersecurity requirements of the NIS2 Directive, reflecting the sector's essential role in national infrastructure.

Gain insights into your organization's compliance status towards the most popular information security frameworks worldwide, in just a few clicks.

Receive a detailed, easy-to-understand report that highlights your strengths and areas for improvement.

Complete the assessment and download your compliance report at no cost.

Move from assessment to full-scale ISMS implementation with just one click, ensuring continuous compliance monitoring.
.png)
Choose the framework that is most relevant for you and start assessing. You'll see a suggested list of measures, which you can categorize according to your current operations.
You'll automatically see your compliance score updating and can click "Preview results" at any time to see a more detailed summary of your assessment results. This report can be printed for internal discussion about current security level.


Aftey your assessment, you can choose to transition to a free Cyberday ISMS account to actually start implenenting and monitoring your security actions. You can utilize our tools for e.g. control deployment, risk management, internal auditing and improvement management to get better every day.
Access a detailed compliance report tailored to your selected framework. Dive into the structure, review gaps, and explore actionable insights that help you achieve full compliance.
