Introduction: The Upcoming Cyber Shift
Businesses today operate under constant pressure from two fronts: the escalating sophistication of cyber threats and a new wave of regulations designed to counter them. At the forefront of this regulatory shift is the European Unionโs new cybersecurity rule, NIS2, which establishes a high common standard of digital resilience across all member states.
In the Netherlands, this directive is being implemented as the Cyberbeveiligingswet (Cbw). However, recent news has confirmed that its official enforcement has been delayed, with the new target set for the second quarter of 2026. For many, this delay might seem like a welcome reprieveโa chance to push a complex compliance project further down the road.
This is a dangerously misleading assumption. Ignoring the Cbw until its formal enforcement date is a major strategic mistake. The lawโs impact is already taking shape, and the risks of inaction are immediate and substantial. Here are the five most surprising and impactful reasons why your organization must act now.
1. Itโs Not Just for Power Grids Anymore: The Lawโs Massive Scope
While the previous cybersecurity law (the Wbni) primarily focused on traditional critical infrastructure, the new Cbw dramatically expands its scope. This expansion reflects the governmentโs recognition that societal functions are now critically dependent on the digital operations of sectors like food production and waste management, which have become prime targets for disruptive cyberattacks.
The law now applies to a wide array of new sectors. This includes organizations involved in Waste Management, Food production and distribution, Chemical manufacturing, and other Critical Manufacturing sectors, such as the production of electronics, machinery, and motor vehicles.
Inclusion is determined by a straightforward โsize-cap rule.โ All medium and large organizations within these sectors are now covered. A โmediumโ organization has at least 50 employees or an annual turnover or balance sheet total of over โฌ10 million. A โlargeโ organization has over 250 employees, or an annual turnover exceeding โฌ50 million and a balance sheet total exceeding โฌ43 million.
The impact is profound: countless businesses that never considered themselves part of the national critical infrastructure now face significant new legal obligations. Crucially, the inclusion of manufacturing sectors acknowledges the convergence of information technology (IT) and operational technology (OT), demanding a unified security strategy that protects both corporate networks and industrial control systems.
2. The Board of Directors Is Now Personally on the Hook
The Cbw elevates cybersecurity from an IT problem to a non-delegable, board-level responsibility. The law codifies this by imposing three core governance mandates directly on the management body:
- The management body must approve the organizationโs cybersecurity risk-management measures.- They must oversee the implementation of these measures.- They are required to follow a recognized training program to gain sufficient knowledge to identify and assess cybersecurity risks and be able to demonstrate this with a certificate.
This creates an explicit and enforceable fiduciary duty. The gravity of this change is captured in the directiveโs text, which states that management bodies โcan be held liable for infringements.โ
This fundamentally changes the nature of executive liability. The mandatory, certified training requirement is designed to eliminate โplausible deniabilityโ for board members regarding cybersecurity oversight. Failure to attend this training is, in itself, an auditable violation, making it clear that while operational tasks can be delegated, the ultimate responsibility for cybersecurity resilience now rests squarely in the boardroom.
3. The Official 2026 Deadline Is a Mirage
The facts are clear: the Netherlands will miss the original EU deadline of October 17, 2024, to implement the directive. The new target for the Cbw to formally enter into force is the second quarter of 2026. However, treating this date as the starting line for compliance efforts is a critical error.
The Dutch government (Rijksoverheid) has explicitly and strongly advised organizations not to wait for the law to become active. Its official guidance is unambiguous:
De Rijksoverheid adviseert organisaties om niet af te wachten totdat de Cyberbeveiligingswet inwerking treedt. De risicoโs die organisaties en systemen lopen, zijn er immers nu ook al.
โThe national government advises organizations not to wait until the Cybersecurity Act enters into force. After all, the risks that organizations and systems run already exist.โ
This creates a โ2025 preparation window.โ While the law may not be formally enforceable until 2026, its requirements are already known. If a major cyber incident were to occur before the enforcement date, a demonstrable lack of preparation based on the Cbwโs published standards could be viewed as managerial negligence, regardless of the lawโs official status.
4. It Creates a โRegulatory Domino Effectโ in Your Supply Chain
One of the most significant but least obvious impacts of the Cbw is the โregulatory domino effectโ it will trigger throughout the Dutch economy. The law doesnโt just apply to individual companies in isolation; it addresses the systemic risk present in modern, interconnected supply chains.
The Cbw mandates that regulated entities, particularly large โEssential Entities,โ must actively manage the cybersecurity risks within their own supply chains. In practice, this means these larger companies will be legally required to audit and manage the security of their external service providers and acquisitions, ensuring suppliers meet security thresholds equivalent to their own.
This requirement functionally compels smaller suppliersโeven those who may not fall directly under the Cbwโs size rulesโto adopt NIS2-level security standards through mandatory contractual clauses. For suppliers, this means that demonstrating Cbw-aligned security is no longer just a defensive measure, but a commercial differentiator essential for retaining and winning contracts with larger clients.
5. The Fines Are Big Enough to Get the CFOโs Attention
To ensure compliance is taken seriously, the Cbw introduces severe, GDPR-scale financial penalties for violations. These sanctions are designed to be a substantial deterrent and are structured in two tiers based on an entityโs classification:
- Essential Entities: Subject to fines of up to โฌ10 million or 2% of the entityโs total worldwide annual turnover, whichever is higher.- Important Entities: Subject to fines of up to โฌ7 million or 1.4% of the entityโs total worldwide annual turnover, whichever is higher.
The comparison to GDPR is intentional and gives a familiar frame of reference for the financial magnitude of these penalties.
These sanctions elevate cybersecurity failures to a material financial risk. This means non-compliance is no longer just an operational issue; itโs a financial threat that requires board-level attention, explicit consideration in financial reporting, and integration into enterprise-wide risk management frameworks.
Conclusion: A New Baseline for Business Resilience
The Cyberbeveiligingswet is not just another IT compliance checklist. It represents a fundamental shift that embeds cybersecurity directly into corporate governance, supply chain management, and financial risk assessment, establishing a new, non-negotiable aspect of enterprise risk management on par with financial or operational risk.
Waiting for the formal enforcement date in 2026 is an unsustainable strategy. The boardโs new personal liability is the driving force that necessitates a robust, defensible budget for managing the โregulatory domino effectโ in the supply chain. A failure in a supplier could now directly lead to an auditable breach of fiduciary duty, exposing the organization to material financial risk. The law establishes a new, higher baseline for business resilience in an increasingly hostile digital world.
With cybersecurity now a core fiduciary duty, is your leadership team truly prepared to answer for it?



