Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.
An integrated resilience workspace that seamlessly integrates 10 core solutions into one, easy-to-use software platform.
The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.
Explore Noggin's integrated resilience software, purpose-built for any industry.
Resilience Management Software
Updated March 25, 2025
National resilience has become a watchword across advanced economies. Governments, from the local to the supranational, have been formulating regulations to bolster the ability of their jurisdiction to withstand and recover from crises and adversities while preserving core values and institutions.
At the center of these regulations has been a focus on critical infrastructure, typically defined as the network of systems, assets, and networks that are essential for the daily life of a people.
Given their import, these critical entities have come under severe attack.
A report by Vedere Research labs revealed a 30% year-on-year increase (2022 to 2023) in attacks on the world’s critical infrastructure, averaging out to 13 cyber attacks suffered every second in 2023.i The European Repository of Cyber Incidents (ERCI) echoed these findings, highlighting that critical infrastructure once again topped the list of primary targets for cybercriminals.ii
Nor is cybercrime the sole threat. Critical assets are also threatened by saboteurs, their own depreciation, as well as natural disasters, such as the recent devastating floods in Spain, which have wiped away or imperiled key assets.
Beyond climate-related crises, critical infrastructure in the EU, in particular, must also contend with the fallout of roiling war in Ukraine, related inflationary pressures, acutely affecting energy prices, as well as the budgetary overhang from the pandemic.
It’s no surprise then that EU regulators have moved aggressively to shore up so-called critical entities. To date, the most far-reaching of their measures has been the Directive on the Resilience of Critical Entities.
Aimed at stakeholders in the critical infrastructure space, this guide seeks to help critical entities prepare for the upcoming implementation of these rules.
So, what is the Critical Entities Resilience Directive? Entering into force in January 2023, the Directive of the EU Parliament and the Council of the European Union aims to strengthen the resilience of critical entities against a range of threats, including natural hazards, terrorist attacks, insider threats, or sabotage, as well as public health emergencies.
January 2023? We haven’t implemented the Directive at our entity.
That’s ok. The Directive gives Member States time to adhere (until July 2026). Indeed, the point of the Directive is for all Member States within the bloc to harmonize (by uplifting) their individual resilience strategies and plans.
The Directive itself sets requirements for Member States, who will then need to pass requirements set forth in the Directive into national law.
Who then needs to be reading this guide? If you work in any of this non-exhaustive list of essential services, you should be reading this guide to begin preparing for compliance:
Indeed, that’s quite the list of sectors and subsectors captured by the Directive. What’s more, individual Member States will have to identify their critical entities by means of regular risk assessments.
Nor is that the end of Member State responsibility; Member States, for their part, must also adopt national strategies concerning their own critical entities.
These strategies won’t be spun out of whole cloth. They are likely to build upon pre-existing strategies; as the Directive notes:
In the interests of coherence and efficiency, the strategy should be designed to seamlessly integrate existing policies, building, wherever possible, upon relevant existing national and sectoral strategies, plans or similar documents. In order to achieve a comprehensive approach, Member States should ensure that their strategies provide for a policy framework for enhanced coordination between the competent authorities under this Directive and the competent authorities under Directive (EU) 2022/2555 in the context of information sharing on cybersecurity risks, cyber threats and cyber incidents and non-cyber risks, threats and incidents and in the context of the exercise of supervisory tasks. When putting in place their strategies, Member States should take due account of the hybrid nature of threats to critical entities.
You might not yet have been identified officially as a critical entity by your national government. But if you operate in the aforementioned sectors, it’s likely coming. What can you do now to begin to comply?
Starting at the top, critical entities will have to carry out risk assessments of their own, before taking technical, security, and organizational measures to enhance their resilience and ensure their ability to notify competent authorities (i.e., sectoral regulators) of incidents (more later).
What’s the point of the risk assessment? Per the Directive, the risk assessment should give the critical entity “a comprehensive understanding of the relevant risks to which they are exposed.” From there, the entity will have a duty to analyze those risks.
Further risk assessment provisions include:
As noted, the point of the risk assessment is to provide a broader understanding of risks to the entity. From there, the entity must act on that analysis to mitigate the risks identified.
The Directive, here, states that critical entities “should take technical, security and organisational measures that are appropriate and proportionate to the risks they face so as to prevent, protect against, respond to, resist, mitigate, absorb, accommodate and recover from an incident.”
What are the measures envisaged? The Directive is purposefully vague on this point: “…the details and extent of such measures should reflect the different risks that each critical entity has identified as part of its critical entity risk assessment and the specificities of such entity in an appropriate and proportionate way.”
However, the Commission will soon be handing down non-binding guidelines, to further specify appropriate technical, security, and organizational measures.
Whatever they come up with, though, entities will have to document the steps they take to comply with the Directive. More specifically, they will have to develop a detailed resilience plan to describe the measures they’ve taken, before applying that plan in practice. The resilience plan should focus on the following:
Beyond developing resilience plans, entities will likely also have to formulate initiatives to ensure compliance. Such initiatives might include developing or adapting risk management and resilience frameworks in harmony with later guidance.
Entities might also have to adjust related roles, responsibilities, and reporting processes to fulfil their Member State’s regulatory mandates. To this end, it’s highly advisable to dedicate key personnel, such as a Chief Resilience Officer (CRO), to address these requirements and oversee the organization’s overall approach to compliance.
Certain to fall on the CRO’s plate is responsibility for adhering to the Directive’s strict incident notification requirement.
What’s that? Entities, unless rendered completely inoperative, will have to submit an initial notification, no later than 24 hours after becoming aware of an incident.
Incident, here, covers events that significantly disrupt or have the potential to significantly disrupt the provision of essential services.
The notification itself needs to include information strictly necessary to make the competent authority aware of the incident and allow the critical entity to seek assistance.
To prepare to comply with this particular requirement, entities should develop a mechanism for notification that will allow competent authorities to respond to incidents rapidly and adequately and to have a comprehensive overview of the (1) impact, (2) nature, (3) cause, and (4) possible consequences of the incident.
It will ultimately be the responsibility of the Member States to ensure that critical entities implement the appropriate measures contained in their resilience plans. But the Directive envisages some level of Member State assistance to critical entities.
Of course, not all critical entities will get such assistance. They should instead consider conducting self-assessments into their own level of maturity and coverage, performing a gap analysis of their current resilience posture measured up against the Directive, existing national law, and relevant standards.
Certain critical entities will get special attention, though. These are critical entities that provide essential services to or in six or more Member States. They will be considered critical entities of particular European significance.
What happens to them? Well, first of all, the Commission will notify the critical entity of its status, likely through a competent authority. The Commission will then inform the critical entity of its special obligations and the date from which those obligations apply to it. In other words, hold tight.
Following the obligations above is a great place to start when upleveling the resilience of critical entities. If doing so seems daunting, critical entities don’t need to act alone.
Technology providers, for their part, are also available help.
Specifically, certain vendors provide integrated resilience workspaces where teams can work together to anticipate and manage threats, conduct preparedness activities, effectively respond to disruptions, and continually learn from insights to strengthen resilience.
Here are some software capabilities to consider:
Finally, the risk environment surrounding critical assets has never been more perilous. And as a result, national and supranational regulators and policymakers have had to step in.
The Directive on the Resilience of Critical Entities, following similar policies in Australia, the U.S., the U.K., and even EU member states, is just the latest example of a set of measures designed to strengthen the resilience of critical entities against an ever-expanding range of threats.
Just like in those jurisdictions, the onus now falls to critical entities in the EU to beef up their risk and security postures. How to do it in compliance with the statutes? This article has sought to explain in clear language what the requirements for critical entities are so that entities can proactively begin to comply.
And the gist is if you want to beat compliance deadlines, your critical entity needs to immediately determine what its specific impact will be, what resources will be needed, and how best to proceed. We lay out some immediate actions in the fact sheet below.
Entered into force on 16 January 2023, the Directive aims to strengthen the resilience of critical entities against a range of threats, including natural hazards, terrorist attacks, insider threats, or sabotage, as well as public health emergencies.
July 2026. The Directive asks Member States to identify critical entities (i.e. those which provide essential services) by 17 July 2026 and to define national resilience strategies, risk assessment frameworks, and other elements of resilience within an ambitious 10-month timetable from that declaration.
i Security Today: World's Critical Infrastructure Suffered 13 Cyber Attacks Every Second in 2023. Available at https://securitytoday.com/Articles/2024/01/29/World-Critical-Infrastructure-Suffered-13-Cyber-Attacks-Every-Second-in-2023.aspx?Page=1.
ii Akshay Joshi, World Economic Forum: These sectors are top targets for cybercrime, and other cybersecurity news to know this month. Available at https://www.weforum.org/agenda/2024/04/cybercrime-target-sectors-cybersecurity-news/.