NIS2 compliance amplifies skills shortages and resource strain

November 2024 Information Security, Security Services & Risk Management

With NIS2 implementation underway across the EU, a new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive. Veeam found that while most IT leaders are confident about meeting NIS2 compliance, the directive has also amplified existing challenges, such as resource limitations and skills shortages.

This survey found that these ‘skills gaps’ are the number one pressure point for EMEA organisations, with 30% saying they have dipped into recruitment budgets to support NIS2 compliance efforts.

The survey exposed that while IT leaders have managed to secure enough budget to meet the NIS2 directive, the impact on other areas could be significant; 68% of companies report receiving the necessary additional budget for NIS2 compliance. However, 20% identified budget as being a significant barrier to achieving compliance. Since the political agreement for NIS2 in January 2023, 40% of businesses have faced decreased IT budgets, and 20% have unchanged financials.

Moreover, 95% of organisations have diverted funds from elsewhere in the business to cover NIS2 compliance costs. Specifically, 34% of companies have dipped into their risk management budgets, 30% from wider recruitment, 29% from crisis management, and 25% from emergency reserves. This reallocation underscores further strain on these companies’ already tight financial resources.

Edwin Weijdema, Field CTO EMEA at Veeam, stated, “Securing adequate budget for cybersecurity is often a challenge for IT leaders, but the strict penalties and emphasis on corporate accountability from NIS2 may help ease that process. However, as most IT budgets are either being cut or remaining stagnant — effectively shrinking due to rising business costs and inflation — NIS2 is pulling from an already limited pool. It is particularly concerning to see funds being redirected from recruitment and emergency reserves. NIS2 should not be treated as a crisis, yet one in four businesses appears to view it that way.”

NIS2 challenges

The survey also highlighted the main business pressures felt by IT leaders. With NIS2 ranking low on the priority list at #10, this emphasises the extensive array of challenges faced at the senior level. The top five challenges are the skills gap (24%), profitability concerns (23%), digital transformation (23%), the rising cost of doing business (20%), and a lack of resources (20%). These findings reveal that human and financial resources are the main limiting factors for IT leaders, yet NIS2 demands both.

To become compliant, companies are taking various steps: conducting IT audits (29%), reviewing cybersecurity processes and best practices (29%), developing new policies and procedures (28%), investing in new technology (28%), and increasing budget allocation for cybersecurity (28%). The primary 'enablers' of NIS2 compliance include new technology solutions (27%), IT audits (25%), and internal organisational skills (25%), which all demand valuable budget and expertise.

Budget dominated by security and compliance

Despite the overall IT budget reductions over the past two years, additional funds have still been allocated for NIS2 compliance – either from the IT budget or elsewhere within the business. This constraint may explain why 80% of EMEA IT budgets are now allocated to cybersecurity and compliance by companies required to comply with NIS2. This leaves little room to address IT leaders' top challenges, such as the skills gap, profitability, and digital transformation.

“Maintaining security and compliance is vital for any organisation, but the fact that it currently consumes most of the IT budget highlights how underprepared and under-resourced organisations are. IT leaders have limited budgets, yet still need to find the resources to meet NIS2 requirements quickly. Those who adopt a holistic approach to security and best practices before legislation mandates them will naturally face less pressure, allowing them to better address other key priorities and challenges,” added Andre Troskie, Field CISO EMEA at Veeam.

Find out more at www.veeam.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.