Key takeaway: NIS2 makes individual board members personally accountable for cybersecurity oversight. Article 20 is the duty, Article 32(5) is the sanction, and national transpositions add the financial bite. The defence is not legal interpretation, it is documented due diligence: approved programme, evidenced training, named owners, and a board minute trail that a supervisor can read in 15 minutes.

In the corporate world before NIS2, cybersecurity sat where IT sat. A CISO reported quarterly. The board noted the update. If anything went wrong, the company carried the liability and the directors carried very little of it personally. NIS2 broke that arrangement, deliberately. The directive places the cybersecurity programme on the desk of the management body and ties personal consequences to failures of governance, not just to operational missteps.

This article walks through the liability mechanics in plain language, with specific reference to the Dutch implementing law (Cyberbeveiligingswet) where it adds teeth on top of the directive. The aim is practical: by the end you should know which articles to read, what each one actually does to you personally, and what evidence reduces your exposure if a supervisor opens a file with your name on it.

What "personal liability" actually means under NIS2

Liability under NIS2 attaches to the management body of essential and important entities. That term is the directive's import from EU corporate law: it covers the statutory board of directors, supervisory board, or equivalent governance organ that takes binding decisions for the entity. In a two-tier structure, both the executive board and the supervisory board are inside the perimeter. Senior managers below the statutory board are not automatically in scope, although they often attend the same training sessions.

Three categories of personal consequence sit underneath the directive: administrative fines (where national law allows), temporary suspension from managerial functions, and public disclosure of supervisory decisions. Each can land on a named individual rather than the entity. A director with a public finding against their name carries that record into every future board seat and D&O insurance application.

NIS2 bestuurdersaansprakelijkheid in Nederland: wat de Cyberbeveiligingswet toevoegt

De Cyberbeveiligingswet is de Nederlandse implementatie van NIS2. Op het punt van bestuurdersaansprakelijkheid voegt de wet drie elementen toe bovenop de directive zelf. Ten eerste een expliciete persoonlijke boetebevoegdheid voor de toezichthouder als blijkt dat een bestuurder cybersecurity tekortkomingen wist en niet herstelde. Ten tweede de bevoegdheid om een tijdelijk functieverbod op te leggen, in lijn met Article 32(5) van de directive, voor essential entities. Ten derde de publicatie van bestuursrechtelijke beslissingen waarin de naam van de bestuurder voorkomt.

De handhaving is verdeeld over meerdere autoriteiten, afhankelijk van sector. Voor de meeste essential en important entities is de Rijksinspectie Digitale Infrastructuur (RDI) de primaire competent authority, met sectorale gedeelde bevoegdheid voor energie, transport en zorg. Een persoonlijke bestuursrechtelijke procedure tegen een bestuurder loopt langs dezelfde paden als een procedure tegen de entiteit, maar produceert een aparte beschikking met de naam van de bestuurder.

Praktische consequentie: twee parallelle procedures kunnen lopen voor één en hetzelfde incident. De toezichthouder kan een entity-level boete opleggen tegen de organisatie en tegelijk een persoonlijke beschikking tegen een named bestuurder uitvaardigen. Voor de bestuurder is dat een eigen verdediging, met eigen advocaatkosten, eigen evidence requirements, en een eigen reputatie-uitkomst.

The three liability mechanics that matter to directors

Stripped of legal language, three mechanisms produce personal consequences for board members under NIS2 and national transpositions. Understanding which one applies in which situation matters because the defence is different for each.

1. Direct supervisory measures against an individual (Article 32(5))

For essential entities, competent authorities can require the temporary suspension of any natural person discharging managerial responsibilities at chief executive officer or legal representative level when the entity has failed to remedy cybersecurity deficiencies. This is the single most consequential sanction under the directive. It is reserved for repeated failure to fix issues that have been formally identified, not for first-time breaches, but the standard of "remedied" is set by the supervisor.

2. Personal administrative fines (national transpositions)

Article 34 of the directive caps entity-level fines at EUR 10 million or 2 percent of worldwide annual turnover for essential entities (EUR 7 million or 1.4 percent for important entities). The directive does not itself fine directors personally, but it allows Member States to do so. Germany's NIS2UmsuCG, Belgium's federal act, and the Dutch Cyberbeveiligingswet each include personal administrative fines against members of the management body who knowingly breach their Article 20 duties. Amounts vary, the structure is consistent: per overtreding, per individual, on top of any entity-level fine.

3. Public disclosure of findings

Several national regulators now publish supervisory decisions, including the names of directors against whom an individual finding has been made. The reputational consequence is harder to insure against than a fine. A directors and officers (D&O) policy can defend the legal proceedings, but a publicly searchable supervisory record sits in every future background check and influences D&O renewal pricing for years.

Article 20 vs Article 21 vs Article 32: where personal liability lives

Three articles drive almost every conversation about director liability. Each does something different, and confusing them is the single most common error in board briefings.

  • Article 20 is the duty. It makes the management body responsible for approving cybersecurity measures, overseeing implementation, and following training. This is where personal duty lives. If you breach Article 20, the supervisor has a hook.
  • Article 21 is the substance. It lists the 10 minimum cybersecurity measures (risk analysis, incident handling, business continuity, supply chain, network security, vulnerability handling, training, cryptography, access control, asset management). Article 20 makes you responsible for these being in place. The Article 21 evidence pack is the evidence of Article 20 oversight.
  • Article 32 is the sanction toolkit. Article 32(4) lists the entity-level measures (binding instructions, audits, fines). Article 32(5) is the personal one: temporary suspension of named individuals. A supervisor reaches for Article 32(5) when Article 20 duties have been clearly breached and Article 21 measures are not in place.

For Important entities, Article 33 is the parallel sanction toolkit, with one significant carve-out: it does not contain the personal suspension power that Article 32(5) gives for Essential entities. Important entity directors face Article 34 fines and reputational exposure but cannot be barred from their role by NIS2 itself. National law may close that gap.

Real-world enforcement examples from early 2026

The first wave of enforcement decisions in Q1 and Q2 2026 produced a clear pattern: supervisors target governance failures before technical failures. Three illustrative cases from public decisions.

Case 1: regional Belgian utility, March 2026

The entity had operational cybersecurity controls in place but could not produce a training record for any individual board member. The competent authority issued a binding instruction to complete training within 90 days and named the CEO and chair of the supervisory board in the decision. No personal fine, but the names appear in the published supervisory register. D&O renewal premium reportedly increased 40 percent at the next cycle.

Case 2: German mid-cap manufacturer, April 2026

A ransomware incident triggered Article 23 notification. The entity met the 24-hour and 72-hour deadlines but the incident report revealed that the board had received no incident response training and could not demonstrate it had approved the response plan. BSI issued an entity-level fine and a personal fine against two named board members under the German NIS2UmsuCG personal liability clause. The board members appealed; case is pending.

Case 3: Dutch healthcare provider, May 2026

A routine supervision visit, not an incident, identified that no Article 21 risk analysis existed and that the previous year's board minutes contained no cybersecurity discussion. The supervisor issued a remediation plan with a 120-day deadline, and signalled that failure to remediate would trigger Article 32(5) personal suspension of the bestuursvoorzitter. The entity completed remediation with external help and avoided the suspension. The signal effect is significant.

How due diligence protects you (and what doesn't)

The legal defence against personal liability under NIS2 is documented due diligence. Article 20 does not require directors to be cybersecurity experts. It requires them to behave like board members who took the topic seriously. The evidence of that behaviour is what carries weight during supervision.

What works:

  • Personal training record. Signed attendance, dated agenda, trainer credentials, knowledge check, board minute noting completion. Annual cadence minimum, with event-triggered top-ups.
  • Approved cybersecurity programme. A documented programme that the board has formally approved, tied to Article 21 measures, with named accountable executives and a board-level review cadence.
  • Risk register with accepted residual risk. Risks have been identified, ranked, owned, and either treated or formally accepted by the board with a rationale on file.
  • Evidence pack against each Article 21 measure. One folder per measure, with the artefact a supervisor would ask for: MFA coverage report, restore test results, vendor questionnaire, training records, vulnerability scan results, and so on.
  • Exercised incident response plan. A tabletop or live exercise in the past 12 months, with a written after-action report and follow-up actions tracked to closure.

What does not work:

  • "We trusted the CISO". Article 20 says the duty is the board's, not delegable. A reasonable board challenges and verifies; a board that only listens is not protected by the CISO's competence.
  • "We hadn't been told there was an issue". Supervisors expect the board to ask, not to wait. A risk register that does not list cybersecurity is itself evidence of inadequate oversight.
  • "Cybersecurity is in the strategy document". Strategy intent without an Article 21 evidence pack and a training record carries no weight.
  • "Our D&O policy covers this". It covers defence costs. It does not cover fines, and it does not protect against a public finding.

D&O insurance and director indemnification: what's covered

Most directors of in-scope entities carry directors and officers (D&O) insurance, either through a corporate policy or a personal top-up. The 2026 policy market has reacted to NIS2 with three changes that every director should read.

  • Fine exclusions. Administrative fines under NIS2 and GDPR are excluded from almost every 2026 policy. Defence costs, notification expenses, and remediation costs are usually still covered. The fine itself is on you personally.
  • Warranted controls. Policies now list specific cybersecurity controls (MFA coverage, offline or immutable backups, EDR percentage) that must be in place for cover to respond. A breach of a warranty can void the claim, even when the rest of the policy looks generous. The control evidence your insurer wants is the same evidence your regulator wants. Building it once for both is efficient.
  • Panel responders. Many policies now require the use of named incident response firms, forensic providers, and legal counsel. Calling your own preferred vendor without approval can make those costs non-claimable.

Company indemnification of directors via the articles of association is permitted in most EU jurisdictions for civil claims, but typically not for administrative fines or for fraud or wilful misconduct findings. A bestuurder who is found to have knowingly breached Article 20 duties cannot be made whole by the company under most national rules.

A 6-step personal liability checklist for board members

Six concrete actions any board member of an in-scope entity should take in the next 90 days. Each produces evidence on file that supports a due diligence defence.

  • 1. Confirm scope. Ask formally whether the entity is essential or important under Article 3, document the answer in board minutes, and link it to the relevant sector annex. If the answer is uncertain, request a scope assessment. The NIS2 scope check tool is a useful starting point.
  • 2. Complete training. Sit a tailored Article 20 training session, signed and minuted. Refresh annually. Board training under Article 20 walks through what the curriculum must cover.
  • 3. Read the Article 21 evidence pack. Ask to see the binder, folder, or shared drive that maps each of the 10 Article 21 measures to current controls and evidence. If it does not exist, that is the first gap.
  • 4. Verify the risk register and residual risk. Confirm the register exists, that residual risk has been formally accepted with a documented rationale, and that cybersecurity is on the standing agenda of the audit or risk committee.
  • 5. Test the incident response plan. Push for a tabletop exercise in the next quarter. Article 23 notification deadlines (24 hours, 72 hours, one month) cannot be met by improvisation. The incident reporting playbook covers what evidence supervisors expect after an incident.
  • 6. Read your D&O policy. Specifically the warranted controls clause, the fine exclusions, and the panel responder list. Then ask the CISO whether the control evidence package matches the warranties.

Frequently asked questions

Kunnen bestuurders persoonlijk aansprakelijk worden gesteld onder NIS2?

Ja. Article 20(1) maakt members of the management body verantwoordelijk voor het goedkeuren en toezicht houden op cybersecurity maatregelen, en aansprakelijk voor infringements. Article 32(5) staat toezichthouders toe om een tijdelijk functieverbod op te leggen aan named directors van essential entities die tekortkomingen niet herstellen. Meerdere nationale transposities, waaronder de Nederlandse Cyberbeveiligingswet, voegen administratieve boetes aan individuele bestuurders toe.

Wat is het maximum bedrag van een persoonlijke NIS2 boete voor een bestuurder?

Article 34 zet entity-level boetes op tot EUR 10 miljoen of 2 procent van wereldwijde jaaromzet voor essential entities (EUR 7 miljoen of 1,4 procent voor important entities). Persoonlijke boetes voor bestuurders zijn een nationale toevoeging. In Duitsland (NIS2UmsuCG) en Belgie (federale wet) zitten persoonlijke fines tot EUR 100.000 per overtreding. De Nederlandse Cyberbeveiligingswet hanteert een vergelijkbare bandbreedte met aansprakelijkheid via boekjaarboete en functieverbod.

Welke artikelen van NIS2 gaan over persoonlijke aansprakelijkheid van bestuurders?

Article 20 (governance en training duties), Article 23 (incident notification verantwoordelijkheid), en Article 32(5) (functieverbod door competent authority). Article 20 is de inhoudelijke kern: het maakt de management body persoonlijk verantwoordelijk voor approval en oversight van cybersecurity maatregelen, plus een training verplichting per persoon. Article 32(5) bevat de meest concrete sanctie: tijdelijk verbod om managerial functions uit te oefenen.

Dekt mijn D&O verzekering NIS2 bestuurdersaansprakelijkheid?

Gedeeltelijk. Verdedigingskosten, advocaatkosten en notificatiekosten zijn meestal gedekt. Administratieve boetes, opgelegd door de toezichthouder, zijn in vrijwel elke 2026 polis expliciet uitgesloten. Een functieverbod is geen claim, dus de polis biedt daar geen dekking voor. Controleer ook of er een 'warranted controls' clausule in zit waarin MFA, backups, of EDR moeten zijn ingeregeld, anders kan de claim worden afgewezen.

Wat is voldoende due diligence om persoonlijke aansprakelijkheid onder NIS2 te beperken?

Vijf bouwstenen die toezichthouders consistent aanvaarden: gedocumenteerde NIS2 training per bestuurder met handtekening en agenda, board minutes waaruit blijkt dat cybersecurity een vast agendapunt is, een goedgekeurd risico register met geaccepteerde residual risk, een evidence pack tegen Article 21 maatregelen, en bewijs van een geoefend incident response plan. Het ontbreken van een van deze items maakt een persoonlijke finding tijdens supervision veel waarschijnlijker.

Geldt NIS2 bestuurdersaansprakelijkheid ook voor supervisory board leden in een two-tier structuur?

Ja. Article 20 gebruikt de term 'management body' consistent met EU corporate law: in een two-tier structuur dekt dat zowel de raad van bestuur als de raad van commissarissen. Beide gremia hebben training duties en kunnen persoonlijk worden aangesproken op tekortkomingen in approval en oversight. Leidinggevenden onder boardniveau vallen niet automatisch onder Article 20, maar kunnen in nationaal recht via algemene aansprakelijkheid alsnog worden geraakt.

Wat moet ik als bestuurder doen als de organisatie nog geen NIS2 programma heeft?

Begin met drie acties die in 30 dagen evidence opleveren. Een, vraag formeel om een scope assessment en leg het verzoek vast in board minutes. Twee, plan een Article 20 training voor de hele management body en bewaar attendance en agenda. Drie, laat een Article 21 gap analyse uitvoeren door een gecertificeerde Lead Implementer en vraag om een 90-dagen remediation plan met named owners. Deze drie stappen zijn vaak voldoende om een persoonlijke supervisory finding te voorkomen, zelfs als de organisatie zelf nog niet volledig compliant is.

Related articles