Why the real challenge in 2026 is not technical complexity, but governance complexity.
I speak with leadership teams every week. Almost all of them know about NIS2. Most have heard of the Cybersecurity Act. Many have started something: a GDPR mapping here, a NIS2 assessment there, perhaps an AI policy that someone was asked to write.
But almost none have answered the fundamental question: how does everything connect in our governance?
The problem: six frameworks, six parallel tracks
You know them by now. NIS2. GDPR. DORA. CRA. AI Act. The Cybersecurity Act. Each one manageable on its own. But they all overlap in exactly the same requirements:
- Risk management
- Leadership involvement
- Documentation
- Reporting
- Supply chain control
Five fundamental expectations that recur in every framework. And most organisations handle them in separate tracks, with separate owners, separate timelines and separate document collections.
The result? Parallel compliance initiatives that nobody has a full view of. Duplication. Conflicting priorities. And a leadership team that believes everything is under control, because each individual track reports green.
Why this is not an IT problem
It is tempting to delegate regulatory compliance to the IT department. These are “technical” regulations, after all.
But the requirements point in a different direction. NIS2 and the Cybersecurity Act explicitly establish leadership accountability. The board and executive management must document their involvement.
Risk assessments must be anchored at leadership level. Resource allocation must be justified.
This is not something an IT manager can solve alone. It requires that the organisation’s governance structure, who decides what, when and on what basis, is clear, documented and tested.
Beata Kaminski, a cybersecurity expert focused on NIS2 strategy for critical-infrastructure SMEs, captures it precisely in her analysis of the Danish regulatory movement. The most significant change is not technical complexity. It is governance complexity.
And that observation applies to all of the Nordics.
Sweden’s specific situation
In Sweden, the Cybersecurity Act (2025:1506) entered into force on 15 January 2026. It is Sweden’s implementation of the NIS2 directive and represents a significant tightening compared to previous legislation.
For organisations in critical sectors, this means requirements for systematic risk management, incident reporting with tight deadlines, supply chain control and, crucially, documented leadership accountability.
In parallel, EU AI Act deadlines are approaching. Organisations using AI systems in high-risk categories need governance structures in place. And GDPR enforcement continues to tighten.
The question is no longer whether your organisation is affected. The question is how structured your response is.
Five signs that your governance is not holding up
These patterns appear in organisation after organisation. If you recognise three or more, it is time to act:
-
You have a GDPR lead, a NIS2 lead and someone who “handles AI”, but nobody who owns the full picture of how the requirements connect.
-
Risk assessments are done per framework instead of per business process.
-
The leadership team approves policies but cannot describe which risks motivated the decisions.
-
Supply chain control happens at procurement but is not followed up systematically.
-
Your incident response is a plan in a binder, not a tested process.
Each point on its own is manageable. But together they reveal something deeper: the absence of a common governance structure. And that is precisely what the regulatory wave of 2026 is testing.
The solution: a governance structure, not more checklists
The answer to regulatory overload is not to buy more tools or hire more consultants. It is to build a common foundation that supports all frameworks.
Consolidate requirements in one structure
NIS2, GDPR, DORA, CRA and the AI Act overlap in their core processes: risk management, supply chain control, incident handling, logging and evidence collection. Instead of separate compliance projects, these should be mapped against the same processes, assets and information flows.
ENISA’s NIS2 implementation guidance shows exactly this pattern: an integrated management system reduces duplication by demonstrating the same controls for multiple frameworks simultaneously. This is not theory. It is the only scalable path forward.
Anchor risk assessments at leadership level
Not delegate them downwards and forget about them. Leadership should not just approve a risk matrix. They should understand which business decisions the risks drive and be able to explain their priorities.
If the board cannot answer why a particular risk was accepted, there is no governance. There is only documentation.
Document decisions systematically
Who decided what, when and why? This is the golden thread that auditors and supervisory authorities look for: unbroken traceability from business processes to risks to controls.
Without it, compliance documentation is just theatre.
Map information flows
You cannot govern what you cannot see. Which systems process which information? Where does data move between business processes, IT systems and data sources? That mapping is the foundation for both risk assessment and regulatory compliance, and it is missing in a surprising number of organisations.
Test readiness before supervision does
Incident handling, supplier follow-up, reporting processes. All of this must be tested, not just described. Organisations that can demonstrate documented maturity stand stronger. Not only during supervision, but in procurement, client relationships and at the board table.
From cost to competitive advantage
It is easy to see the regulatory wave as a burden. More requirements, more documentation, higher costs.
But the perspective has shifted. Cybersecurity, and the governance that underpins it, is increasingly positioned as a competitive differentiator. A prerequisite for participating in public procurement. A foundation for trust.
Organisations that build a coherent governance structure now meet regulatory requirements and reduce internal friction from duplication. They also build a governance maturity that is visible externally, in procurement, client relationships and at the board table.
Those that do not are building facades. And facades do not hold when the wind picks up.
Three questions to bring to your leadership team
Start here. If you cannot answer yes to all three, it is a sign that the governance structure needs review:
- Is cyber risk treated systematically at leadership level, not just delegated?
- Can you document your priorities, decisions and rationale?
- Are responsibilities and decision paths anchored and tested, not just described?
The regulatory wave of 2026 is arriving as one. Your response needs to be as well.
Do you need support building a coherent governance structure? Contact us for a complimentary review.
More insights
Related articles
The Cybersecurity Act and leadership accountability. Are the rules really the same for everyone?
The Swedish Cybersecurity Act imposes the same requirements on public and private sectors, but the consequences for non-compliance differ significantly. We examine what this means for leadership accountability.
NIS2 and the Cybersecurity Act: what applies now?
The Swedish Cybersecurity Act entered into force in January 2025. We walk through the key requirements and what your organisation needs to do.