The Key to NIS2 Compliance in Ireland: A data-driven approach to risk management

The EU’s NIS2 Directive is reshaping Ireland’s cybersecurity landscape, raising the bar for how organisations manage risk. As NIS2 is transposed into Irish law by late 2025, thousands of businesses will need to implement a robust set of cybersecurity Risk Management Measures (RMMs) as outlined by the National Cyber Security Centre (NCSC). These 16 measures (draft published in June 2025) cover governance, technical controls, incident response and business continuity.

Inga Ignat

An article from

Inga Ignat
Senior Consultant
Published
August 28, 2025
Updated
Reading time
minutes
NIS2 Compliance in Ireland - C-Risk

A data-driven approach to risk management is essential. By harnessing real-time data, analytics and Cyber Risk Quantification (CRQ) through Factor Analysis of Information Risk (FAIRTM), a methodology which translates cyber risks into financial terms, Irish organisations can transform compliance into an opportunity. This means giving boards actionable insights, focusing investments on real risks, and building resilience beyond the checklist.

In this article, we explore how data-driven practices support each RMM (RMM002 - RMM016) and help meet NIS2 requirements. For some requirements the impact is greater, for others less, but data-driven risk management has a role to play in them all.

Governance and Risk Management

RMM002 - Governance – Management board commitment and accountability

Cybersecurity is now a board-level responsibility. Senior management must actively oversee risk measures. Data-driven practices help CISOs communicate risks in tangible, financial terms using CRQ. Dashboards and metrics - from incident trends to potential losses - enable directors to make informed decisions and show due diligence. This turns vague compliance into visible governance.

RMM003 – Network and Information Security Policy

Policies must reflect real threats. By analysing incidents, control performance data, and threat intelligence, policies can evolve to focus on relevant issues like phishing or ransomware. Regular reviews driven by key metrics (e.g., malware infections or policy violations) keep guidance fresh. CRQ helps align policy strength to actual risk, ensuring that controls are both effective and proportionate.

RMM004 – Risk Management Policy

NIS2 demands continuous risk insight, not periodic reports. A live risk register informed by vulnerability scans, threat intelligence and impact assessments lets organisations see risks in real time. Incorporating the metrics above and quantifying risk financially enables prioritisation and risk-based investments. It also ensures consistency, from frontline staff to executives.

RMM005 – Continuous improvement - assess effectiveness and improve cybersecurity risk management measures

Security must be regularly reviewed and refined. By tracking control performance data, such as patch rates, incident response times or test results, organisations can see what’s working and where to improve. CRQ supports decision-making after each change by showing risk reduction. Regular tests and feedback loops support a culture of continuous, data-led improvement.

Core Security Measures and Controls

RMM006 – Basic Cyber Hygiene Practices and Security Training

Training and hygiene practices must be evidenced. Data such as patch compliance, malware detections and training scores help show NIS2 alignment. CRQ helps quantify how reducing human error (via awareness) impacts risk, supporting investment. Metrics from simulations and audits provide proof of progress and readiness.

RMM007 – Asset Management

Organisations must know their assets to protect them. Automated asset discovery and classification create a real-time, risk-informed inventory. CRQ helps identify crown jewels – high-value systems requiring stronger controls. Asset data supports rapid incident response and prioritised defence, as required under NIS2.

RMM008 – Human Resources Security

Staff risks are critical. Data helps track vetting, role-based access, and insider threats. Logs, background checks and training records prove security responsibilities are understood and monitored. CRQ can model risks tied to human behaviour (like phishing success or insider threats), justifying further investment in people-focused controls.

RMM009 – Access Control

Least privilege must be monitored, not assumed. Data from IAM tools, access reviews and login audits shows who has access, how it’s used, and whether it aligns with policy. CRQ models show how risk drops with controls like MFA. This evidence satisfies auditors and reinforces governance.

RMM010 – Environmental and physical security

IT assets must be physically protected. Logs from badge systems, CCTV alerts and IoT sensors give visibility into threats like unauthorised access or environmental failure. Risk modelling quantifies impact scenarios, supporting targeted investment in defences. Data-driven oversight turns physical security into a managed, measurable domain.

RMM011 – Cryptography, Encryption and Authentication

Controls must be used effectively and consistently. Metrics on encryption coverage, key rotation and MFA usage show whether protection is in place and working. Gaps, like unencrypted backups, are identified through scanning. CRQ highlights how strong cryptographic controls reduces breach costs, supporting strategic upgrades, but also the risk scenarios where this control might be less effective than assumed.

RMM012 – Supply Chain Security Policy

Vendors may be part of attack surface. Data-driven risk ratings and assessments help profile suppliers. Thresholds can be set for required certifications or risk scores. CRQ helps prioritise which vendors to scrutinise by modelling potential loss. Audit trails and live monitoring help prove oversight and compliance.

RMM013 - Security in network and information systems acquisition, development and maintenance

Security must be built into development. Metrics from code scans and testing show how secure software is. They can also identify where improvement is needed. Third-party tools and documentation help maintain control over external tech. CRQ helps justify investment in secure design by quantifying the cost of not doing so.

Incident Response and Resilience

RMM014 – Incident Handling

Speed and clarity are essential. Data from monitoring systems accelerates detection and guides action. Incident metrics (i.e., timelines, causes, resolution steps) help identify patterns. CRQ simulations test response plans and set recovery expectations. Evidence of lessons learned supports compliance and maturity.

RMM015 – Incident Reporting

Reporting must be fast and accurate. Thresholds based on impact data help decide whether to notify authorities. Monitoring tools feed pre-populated reports. CRQ aids in judging materiality. Logs and decision records show transparency. Data automation ensures that data can be extracted and accurate in the event of an incident.

RMM016 – Business Continuity and Crisis Management

Continuity planning must be data-led. BIAs collect downtime tolerances and financial risks, feeding into recovery strategies. CRQ helps prioritise investments (e.g., failover systems). Testing yields metrics on recovery times and performance. Documentation proves plans are working and improving. Data ensures that resilience is more than aspiration.

Regulatory compliance is only the first step to digital operational resilience

C-Risk can help you effectively communicate the financial and operational impact of cyber risks, ensuring strategic resource allocation that aligns with your business objectives.

From Obligation to Opportunity

NIS2 is a turning point for Irish cybersecurity, pushing organisations to adopt smarter, more resilient practices. A data-driven approach delivers operational visibility, enables prioritised investments, and enforces accountability. It provides the evidence to meet compliance demands while improving real-world security. Those who embrace it will lead the way in digital trust and resilience.

C-Risk can help you address new compliance requirements introduced under NIS2. If you would like to discuss your cybersecurity and compliance challenges, schedule a call with a C-Risk expert.

In this article
Improve decision-making with Cyber Risk Quantification

We build scalable solutions to quantify cyber risk in financial terms so organizations can make informed decisions to improve governance and resilience.

Related articles

Read more on cyber risk, ransomware attacks, regulatory compliance and cybersecurity.