Skip to the main content.

2 min read

Comparing the Swiss ISA (ISG) and EU NIS-2

Comparing the Swiss ISA (ISG) and EU NIS-2

 

Differences and Parallels

Key IT Security Insights for Businesses

Europe has strengthened its network and information security regulations with the introduction of NIS-2. In parallel, Switzerland has established its first comparable compliance framework through the Information Security Act (ISG), which applies to the federal administration and operators of critical infrastructure (KRITIS). While these regulations share notable similarities, they differ significantly in their specifics.

Scope

ISA

  • Applies to federal
    authorities andorganizations (Art. 2)
  • Critical Infrastructure (KRITIS)
    (Art. 74b

NIS-2 

  • Applies to the public admin and Critical Infrastructure (KRITIS)
  • Covers operators of essential services in sectors such as energy, transport, health, and finance

Applicability Thresholds

ISA

Exceptions may be granted if disruptions caused by cyberattacks have minimal impact on the economy or public well-being (Art. 74c).

NIS-

>50 employees or
>Annual revenue over 10 million euros

Entry into Force

ISA

  • Applicable to KRITIS from January 2025
  • Applicable to federal authorities from January 1, 2024

NIS-

Must be transposed into national legislation by October 2024

 

Responsibilities of the Federal Government

ISA

  • Supports operators of critical
    infrastructures (Art. 74)
  • Ensures secure information
    exchange between stakeholders
    (Art. 74)
  • Issues operational security
    declarations (Art. 61)
  • Conducts personnel security
    checks (Chapter 3)
  • Performs periodic cantonal
    reviews of the implementation
    and effectiveness of information
    security measures (Art. 86)

NIS-

  • Defines central authorities and their responsibilities in each member state
  • Develops guidelines and
    recommendations for the implementation of the directive
  • Monitors the enforcement and compliance of the regulation
  • Establishes and operates Mobile Incident Response Teams
  • Receives and handles notifications of cyber incidents

 

Areas Covered for Businesses

ISA

  • Leadership responsibility
  • Implementation of an ISMS (Information Security Management System)
  • Risk management
    • Security policies and practices
    • Information classification
    • Collaboration with third parties
    • Incident management
    • Personnel security
    • Identity management
    • Data protection
    • Data retention, archiving, & destruction
    • Reporting obligations
    • Information exchange on threats
    • Reporting of security incidents

NIS-

  • Risk management
  • Detecting & reporting incidents
  • Business continuity and backups
  • Supply chain security
  • Secure system development and
    acquisition
  • Assessing the effectiveness of
    security measures
  • Cyber hygiene practices and
    training
  • Encryption
  • HR security
  • Asset management
  • Access control & multi-factor
    authentication (MFA)

Reporting Obligations

ISA

  • Report to the Federal Cybersecurity
    Authority (BACS)

  • Report cyberattacks with potential damage within 24 hours

 

NIS-

  • Different authorities are responsible depending on
    the country
  • Reporting of “significant
    security incidents”
    <= 24 hours – early warning
    <= 72 hours – incident
    notification
    <= 1 month – final report

Fines

ISA

  • Personal fines of up to CHF
    100,000 for intentional
    non-compliance
  • Fines of up to CHF 20,000
    for businesses
  • Administrative penalties
    may also apply (Art. 74h)

NIS-

  • Fines of up to €10 million or
    2% of global annual turnover
    for critical entities

  • Fines of up to €7 million or
    1.4% of global annual
    turnover for important
    entities

  • Corporate executives and
    management are personally
    liable with their private
    assets

 

 

FAQ About NIS-2 and ISG

 

You might also be interested in...

 

Everything about Governance, Risk, Compliance

BNC Consulting Services

How can we implement security processes without jeopardizing the agility of the business?

SASE PART 2: SECURE ACCESS SERVICE WITHOUT

SASE PART 2: SECURE ACCESS SERVICE WITHOUT "EDGE"?

SASE DECRYPTED, PART 2 THE CONNECTION POINT - KEY TO THE ON-PREMISE ACCESS REVOLUTION AND LIBERATION FROM CLOUD DEPENDENCY In the second part of our...

Read More
The Future of the Financial Industry: Tech Trends and Their Potential for Banks and Insurance Companies

The Future of the Financial Industry: Tech Trends and Their Potential for Banks and Insurance Companies

What awaits the Head of IT in Banks and Insurance Companies in the year 2024? IoT, Telematics, Usage-Based Insurance, Open Banking, and Big Data...

Read More
The future is smart: IoT, AI, and Big Data - Smart City & Smart Campus

The future is smart: IoT, AI, and Big Data - Smart City & Smart Campus

How public administrations and educational institutions can benefit from these technologies The transformative role of IoT, AI, and Big Data in the...

Read More