
When the Digital Security Act came into force in October 2025, something important happened. Not dramatically. Not overnight. But fundamentally: Responsibility moved from IT to executive management and up to the board.
Cybersecurity is no longer just a technology issue. It is a governance responsibility.
The law requires systematic risk management, documentation, and incident handling. But even more importantly, it assumes that these efforts are anchored at the highest level of the organization. This is not an IT task with reporting obligations. It is part of corporate governance.
Read the article: The Digital Security Act entered into force on October 1, 2025. What does it mean for businesses?
Most organizations still talk about cybersecurity as risk. Fewer talk about what it actually does for the business.
Organizations that have taken this seriously are discovering something interesting: Good security creates speed. Speed in procurement processes, in audits, and in decision making. When documentation and structure are already in place, you do not have to stop every time someone asks whether you can demonstrate your security posture. You answer, and move forward.
That is why security is increasingly becoming a competitive advantage. Not because it looks good on paper, but because it reduces friction in interactions with customers and partners.
But they do need to understand the consequences. With NIS2, this becomes even more important. Article 20 clearly highlights management’s responsibility to understand cyber risk, undergo training, and ensure compliance. It is no longer acceptable to delegate risks you do not understand yourself.
This is a shift many boards still underestimate. Not because they do not care, but because cybersecurity is still perceived as technical. It is not. It is about governance.
They do not ask: “Are we secure?”
They ask: “Do we have visibility and control?”
And they follow up on specific issues: Who owns the risk? Has preparedness actually been tested? What is critical to the business? Do we have control over the supply chain? Can we document compliance?
These are not technical details. They are governance signals.
One of the most important practical changes is not happening internally. It is happening in relationships.
Organizations covered by the law must now pass requirements further down the chain: To suppliers, partners, and the entire ecosystem. You inherit the risks of the companies you work with, whether you are aware of it or not. This means that even organizations that are not directly regulated will feel the impact of these requirements, not from authorities, but from their customers.
The consequence is clear: Poor security is no longer just an operational problem. It becomes a sales problem.
This may be the simplest and most revealing question a board can ask itself.
Can you demonstrate who is responsible? Which risks have been identified? Which measures have been implemented and tested? And how are you improving over time?
If the answer is “partially,” then this is not a security problem. It is a governance problem, and one that can absolutely be addressed.
Cybersecurity has received significant attention in recent years. But in many organizations, the approach is still defensive. That is a missed opportunity.
The best organizations use security actively: To build trust, reduce friction, win contracts, and scale faster.
In 2026, the question is no longer whether you have security in place. The question is whether the market trusts it. And the responsibility now sits with the board.
National Security Authority (NSM) – Basic principles for ICT security
Regjeringen.no – Consultation paper for the Digital Security Regulation, 2024
The Norwegian Digitalisation Agency (Digdir) – Guidance on digital security and risk management
Digi.no – Coverage of NIS2 and implications for Norwegian businesses, 2024–2025
.jpg?width=292&height=365&name=bilde%20(1).jpg)
%20(1)-1.png?width=292&height=365&name=ChatGPT%20Image%208.%20mai%202026%2c%2013_05_44%20(1)%20(1)-1.png)

