
NIS2 makes cybersecurity a matter of personal liability for management. What this means for email security and what executives must do now.
Since December 6, 2025, a new era of cybersecurity has been in effect in Germany. Under the NIS2 Implementation Act, management is for the first time personally liable for the implementation of cybersecurity measures. Email security is at the very top of the agenda – because over 90% of all cyberattacks begin with an email.
The revised BSI Act is unambiguous on this point:
Management must approve the risk management measures under §30 and oversee their implementation. If management fails to fulfill this duty, it is personally liable.
This specifically means:
Consider the following scenario: An employee opens a phishing email, ransomware encrypts critical systems, and customer data is exfiltrated.
Without NIS2-compliant measures, the consequences include:
| Category | Maximum Fine |
|---|---|
| Essential entities | EUR 10 million or 2% of global annual revenue |
| Important entities | EUR 7 million or 1.4% of global annual revenue |
Calculation basis is whichever amount is higher. For a company with EUR 600 million in revenue, this could amount to up to EUR 12 million in fines.
Attackers impersonate the CEO or CFO and authorize wire transfers. Average damage: EUR 130,000 per incident.
Targeted fraudulent emails with malware attachments or credential harvesting links. AI is making these attacks harder to detect than ever in 2026.
The latest posts from our blog.

An Email Security Gateway is the central line of defense for business email communication. This guide explains how it works, what threats it blocks, and why it is essential for NIS2 and GDPR…

Choosing the right Email Security Gateway is critical for business communication security. This comparison shows the most important criteria and typical pitfalls.

Proper configuration of a Secure Email Gateway determines security and user experience. These 10 best practices help IT teams achieve optimal setup.
Sensitive data leaves the company unencrypted – whether intentionally or accidentally. Without DLP measures, this often goes unnoticed.
Unencrypted emails to partners and suppliers are an open vulnerability – and a direct violation of §30 No. 5 and No. 8 BSIG.
§30 No. 8 BSIG requires cryptography concepts. This means:
Implementation with Conbool: SecureMail automates encryption directly in the mail flow. No manual effort required from employees.
§30 No. 2 BSIG requires incident management. This means:
Implementation with Conbool: MailGuard detects and neutralizes threats in real time – before they reach the inbox.
Management must be able to demonstrate implementation. This means:
Implementation with Conbool: Integrated tracing and audit logging provide complete evidence – exportable at the push of a button.
Conbool makes email security transparent and verifiable for management:
Setup takes just a few minutes. Personal liability ends as soon as you have demonstrably implemented all measures.
Further reading: