Back to blog
Oct 14, 2025 Blog

The New Cybersecurity Law Is Just Around the Corner

What are the first steps for newly regulated organizations?

Petr Sýkora

Petr Sýkora

cybreg s.r.o.

The New Cybersecurity Law

Key Points

  • The Cybersecurity Act enters into force on November 1, 2025
  • It stems from the European NIS2 Directive
  • Expands the scope of regulated entities from several hundred to thousands
  • Applies to a wide range of sectors – energy, healthcare, transport, industry, digital services
  • Organizations must determine whether they fall under the new regulation and prepare accordingly

Assessing Whether Your Organization Falls Under the New Regulation

The first step is a process called self-identification. For an entity to become a provider of a regulated service, it must meet the following three criteria:

  1. Operates in a regulated sector – for example in energy, healthcare, transport, water management, industry, or digital infrastructure
  2. Provides a specific regulated service listed in the decree on regulated services
  3. Reaches a certain size or significance – typically medium and large enterprises (50 or more employees or turnover exceeding 10 million euros)

The law does not apply to small and micro enterprises or to entities outside regulated sectors.

Registration Obligation

If an organization meets the above criteria, it will be classified into one of two regimes:

Organizations have 60 days from the effective date of the law (until December 31, 2025) to register their regulated services through the NUKIB Portal.

After registration, a one-year transitional period begins for implementing all required measures. Companies must fulfill their obligations by the end of 2026 at the latest.

Why It Pays to Start Now

The new Cybersecurity Act ensures that entities in economically significant sectors have a basic standard of protection in place.

Early preparation helps to:

Organizations should therefore at a minimum:

Need help with compliance?

Cybreg helps you with the complete implementation of Cybersecurity Act requirements – from asset management to generating audit documentation.

Schedule a demo