
NIS2 makes cybersecurity a matter of personal liability for management. What this means for email security and what executives must do now.
Since December 6, 2025, a new era of cybersecurity has been in effect in Germany. Under the NIS2 Implementation Act, management is for the first time personally liable for the implementation of cybersecurity measures. Email security is at the very top of the agenda – because over 90% of all cyberattacks begin with an email.
The revised BSI Act is unambiguous on this point:
Management must approve the risk management measures under §30 and oversee their implementation. If management fails to fulfill this duty, it is personally liable.
This specifically means:
Consider the following scenario: An employee opens a phishing email, ransomware encrypts critical systems, and customer data is exfiltrated.
Without NIS2-compliant measures, the consequences include:
| Category | Maximum Fine |
|---|---|
| Essential entities | EUR 10 million or 2% of global annual revenue |
| Important entities | EUR 7 million or 1.4% of global annual revenue |
Calculation basis is whichever amount is higher. For a company with EUR 600 million in revenue, this could amount to up to EUR 12 million in fines.
Attackers impersonate the CEO or CFO and authorize wire transfers. Average damage: EUR 130,000 per incident.
Targeted fraudulent emails with malware attachments or credential harvesting links. AI is making these attacks harder to detect than ever in 2026.
Die neuesten Beiträge aus unserem Blog.

Die richtige Konfiguration eines Secure Email Gateways entscheidet über Sicherheit und Nutzererfahrung. Diese 10 Best Practices helfen IT-Teams bei der optimalen Einrichtung.

Die Auswahl des richtigen Email Security Gateways ist entscheidend für die Sicherheit der Unternehmenskommunikation. Dieser Vergleich zeigt die wichtigsten Kriterien und typische Fallstricke.

Microsoft 365 bietet Basis-Sicherheit, aber kein vollständiges Email Security Gateway. Dieser Guide zeigt, welche Lücken bestehen und wie ein externes Gateway sie schließt.
Sensitive data leaves the company unencrypted – whether intentionally or accidentally. Without DLP measures, this often goes unnoticed.
Unencrypted emails to partners and suppliers are an open vulnerability – and a direct violation of §30 No. 5 and No. 8 BSIG.
§30 No. 8 BSIG requires cryptography concepts. This means:
Implementation with Conbool: SecureMail automates encryption directly in the mail flow. No manual effort required from employees.
§30 No. 2 BSIG requires incident management. This means:
Implementation with Conbool: MailGuard detects and neutralizes threats in real time – before they reach the inbox.
Management must be able to demonstrate implementation. This means:
Implementation with Conbool: Integrated tracing and audit logging provide complete evidence – exportable at the push of a button.
Conbool makes email security transparent and verifiable for management:
Setup takes just a few minutes. Personal liability ends as soon as you have demonstrably implemented all measures.
Further reading: