Updated 10 Apr, 2026
Published 09 Apr, 2026

Security is a leadership responsibility

Article 5 of 5 in the series “When Security Fails – and Trust Breaks”


The Nordic region is among the most digitally advanced in the world. That is a source of pride, and a significant risk factor.

A recent survey of organisations across Finland and Sweden found that 54% had experienced at least one severe cyberattack in the past year. Nearly nine in ten expect the number of attacks to increase. Yet only 23% say their organisation is fully prepared for NIS2 and the regulatory requirements now entering into force.

The gap between exposure and preparedness is real. And NIS2 is unambiguous: responsibility for closing it sits in the boardroom.

This is the final article in the series. It draws together the threads from the four preceding articles and asks the question that determines whether the foundation is actually built: who owns the responsibility?

The Nordic gap – and why it is a leadership issue

The TEK Norge Nordic Cybersecurity Benchmark 2025 gives a concrete picture of where the region stands:


72
Finland

69
Sweden

66
Denmark

64
Norway
Score out of 100 · TEK Norge Nordic Cybersecurity Benchmark 2025 (NyAnalyse, December 2025)

The most striking finding is not the scores themselves, it is what lies beneath them. Even the highest-scoring countries in the region face a threat landscape that is outpacing their defences. Attacks on Denmark’s energy infrastructure, a fourfold increase in cyberattacks on Finland and Sweden following their NATO accessions, and Sweden leading all Nordic countries in ransomware incidents: these are not warning signs for the future. They are the present.

One observation from the benchmark deserves particular attention: a relatively low number of reported security incidents is not necessarily a positive sign. It may equally mean that attacks are not being detected. That is an uncomfortable, but important point for any leader.

The Nordic region has the talent, the infrastructure and the motivation to lead on cybersecurity. What is missing in too many organisations is ownership. And ownership starts in the boardroom.

Quotee Erik Ramstad, Head of Network, Infrastructure & Cybersecurity

What NIS2 actually requires of leadership

NIS2 is not primarily a technical requirement. It is a governance and leadership accountability requirement. What sets NIS2 apart from previous regulations is that it places responsibility explicitly – and personally – on senior leadership.

NIS2 requirement What it means in practice
Personal leadership accountability The board and senior leadership can be held personally liable for breaches
Board-level risk assessment The board approves the risk assessment – not just the CISO
Incident reporting 24 hours: early warning to authorities. 72 hours: full report
Supply chain Requirements extend to sub-suppliers and critical partners
Measure documentation Organisational, physical and technical measures must be documented and maintained

Many organisations assume NIS2 primarily concerns large actors in critical infrastructure. That is a misconception. NIS2 significantly expands scope compared to the predecessor directive – adding sectors including public administration, waste management and food production. Implementation is underway across the Nordic region, with full enforcement expected in 2026.

Questions the board should be asking now:

→ Do we have an up-to-date overview of which NIS2 requirements apply to our organisation and our supply chain?

→ Has the board approved a risk assessment covering organisational, physical and technical measures?

→ Have we documented the ability to notify authorities within 24 hours of a serious incident?

Three questions the board should ask – and receive concrete answers to

Throughout this article series we have covered four elements: security by design, network architecture, testing and operational response. For a board that wants to take genuine ownership, these three questions are a sound starting point:

THREE QUESTIONS THE BOARD SHOULD ASK – AND RECEIVE CONCRETE ANSWERS TO

1. Do we know which digital assets are most critical – and are confidentiality, integrity and availability secured for them?

2. Have we tested whether we would actually detect an attack – while it was happening?

3. What happens to us if a key supplier or critical partner is compromised?

These questions do not require technical expertise from board members. They require that the CISO or IT director can answer concretely – with documentation, not general reassurances. That is a highly reliable indicator of organisational maturity.

From compliance to competitive advantage

Compliance is the floor – not the ceiling. Organisations that only respond to regulatory requirements are always behind the threat landscape. The strongest use security actively as a strategic asset.

Compliance mindset Competitive advantage mindset
Responds to requirements – always behind Acts in advance – always anchored
Security is a cost to be minimised Security is an investment that differentiates
Reports to regulators what is required Documents security posture as a customer argument
Supply chain security is someone else’s problem Sets security requirements in all supplier agreements
CISO presents to the board once a year Board requests security status updates quarterly

Organisations that document and communicate their security posture to customers, investors and partners find that it differentiates them positively. In sectors such as financial services, healthcare and critical infrastructure, demonstrable security is rapidly becoming a baseline requirement for being considered as a supplier at all.

It is no longer a question of whether the organisation can prioritise security. It is a question of whether it can afford not to.

The foundation of digital trust – in full

This series has covered the four elements that build digital trust. Here they are together:

THE FOUNDATION OF DIGITAL TRUST · NetNordic

1. Security by Design – Security is built in from the start, not patched on afterwards → Articles 1 and 2

2. Network Architecture – Segmentation limits damage and stops lateral movement → Article 3

3. Continuous Testing – Pentest and red team uncover weaknesses before attackers do → Article 4

4. Operational Response – 24/7 monitoring and rapid handling when something does happen → Article 5

All four elements must be in place. That is what separates organisations that preserve trust from those that lose it.

NetNordic helps leadership build and document all four elements – and present the security status to the board in a way that provides genuine insight, not technical jargon.


80+
SOC clients with ~60 NPS score

2.3 min
Average detection time

#1 Nordics
Boss of the SOC 2025

Since 2014, NetNordic has handled hundreds of serious security incidents – without any of our SOC customers experiencing a compromised environment under our monitoring. That is not luck. It is the result of rapid detection (2.3 minutes on average), structured incident handling, and combining all four elements of the foundation. Experience with real incidents is also what makes us effective at what matters most: limiting the damage when something does happen.

Trust is built now – or repaired at great cost

Most serious security incidents do not start with advanced hacking techniques. They start with architecture choices, prioritisation decisions and judgements about what is “good enough.”

That means most serious security incidents are preventable. Not necessarily all – but most. And it is leadership’s responsibility to ensure the organisation does what is necessary.

The series “When Security Fails – and Trust Breaks” has shown that digital trust is not a technical problem. It is a leadership question. And the best time to take it seriously is always: now.

Would you like a review of your security posture presented to leadership?

NetNordic helps CISOs and CIOs bring security to board level – with concrete metrics, not technical jargon.

→ netnordic.com/contact


Sources and references

  • Tietoevry: Nordic Cyber Resilience Report 2024
  • TEK Norge: Nordic Cybersecurity Benchmark 2025 (NyAnalyse, December 2025)
  • NIS2 Directive (EU) 2022/2555 – governance, leadership accountability and incident reporting
  • IBM: Cost of a Data Breach Report 2024
  • SOCRadar: Nordic Threat Landscape Report 2024
  • NetNordic: Boss of the SOC 2025 – 3rd place globally, best in the Nordics
  • NetNordic SOC statistics
Erik Ramstad
Author

Erik Ramstad

Head of Network, Infrastructure & Cybersecurity

Contact Us

Feel free to call us directly on our telephone number +47 67 247 365, send us an email salg@netnordic.no, or fill in the form and we will get back to you as soon as possible! Thanks!

Latest content

Our newsletter

Latest news and updates directly to your inbox.