Cybersecurity 2026

Last Updated March 17, 2026

Finland

Law and Practice

Authors



Lieke Attorneys Ltd is a Finnish law firm, established in 1989, with a focus on data and technology, dispute resolution, transactions, energy and construction. Its experienced experts assist clients with IT and digitalisation projects, data privacy and data protection, data sharing and processing, document disclosure, cybersecurity, intellectual property, technology contracts and procurement, and other data and technology-related issues. Lieke provides clients with expert support in implementing the latest solutions, assessing regulatory compliance, managing risks and resolving disputes. In an ever-changing regulatory environment, Lieke’s focus is on providing expert and practical solutions, always considering the business needs of our clients. Lieke also advises on trade mark, design and copyright issues and related regulatory and registration processes, as well as employment invention matters.

A Changing Cybersecurity Landscape in Finland

Historically, the Finnish regulatory framework for cybersecurity has been relatively fragmented, with separate specialised regulations for different industries and sectors. Cybersecurity matters were treated as sector-specific operating requirements, and were supervised independently by the relevant sector-specific authorities.

In 2024, the Finnish Cybersecurity Strategy was updated to better address technological advancements and shifts in the geopolitical landscape that cut across sectors more than ever before. According to the Cybersecurity Strategy, the current cybersecurity situation in Finland is relatively stable; however, given that Finnish society is almost entirely digitalised, cybersecurity requires constant attention, to ensure trust in the safety and reliability of digital services. The Cybersecurity Strategy recognises cybersecurity not only as a cornerstone of modern society but also as a vital matter of national security.

The Four Pillars of Cybersecurity Development

The Cybersecurity Strategy is built on four distinct pillars, each setting out sub-objectives defining the target state for national cybersecurity and guiding future legislation and other public sector activity.

Pillar I: competence, technology, and research, development and innovation

Under the first pillar, cybersecurity competence is regarded as a fundamental civic skill. A high level of competence will require strengthening cybersecurity education in schools, universities, non-governmental organisations and workplaces. Furthermore, the objectives under the first pillar include promoting business competitiveness in the cybersecurity sector and Finland’s role as a leader in the implementation of emerging and disruptive technologies.

Pillar II: preparedness

The second pillar emphasises cyber resilience and operational reliability across society. Under this pillar, public authorities and private sector organisations are expected to define and apply cybersecurity requirements to the information systems they use, procure and maintain, and to allocate sufficient resources to meet these requirements and develop preparedness capabilities. The pillar also encourages collaboration and dialogue with the EU and NATO to promote preparedness and share best practices.

Pillar III: co-operation

The third pillar further encourages international collaboration and dialogue. In addition, the strategy emphasises well-co-ordinated and smooth co-operation between authorities based on shared situational awareness, as well as the use of centralised cybersecurity services.

Pillar IV: response and countermeasures

The final pillar aims to ensure timely responses to cyber threats and to safeguard national sovereignty. Clearly defined roles and responsibilities for different actors in both the public and private sectors are considered essential prerequisites for effective cyber resilience, and cybersecurity is recognised as a vital part of national defence.

Towards a Unified Cybersecurity Approach

Overall, the current regulatory strategy for cybersecurity in Finland emphasises the importance of a unified approach to cybersecurity, recognising that the subject matter concerns all areas of society. At the international level, Finland strives to be a strong cybersecurity ally within the EU and NATO, actively participating in discussions on future developments.

The cybersecurity legislation in Finland is largely EU-based, but many details are regulated at the national level. EU regulations are directly applicable in Finland and require very limited national implementation legislation, if any. EU directives are not directly applicable; instead, they oblige the Finnish legislature to enact national provisions that reflect the requirements of the directives.

The principal cybersecurity laws applicable in Finland are listed below. The legislation is divided into three categories:

  • legislation primarily concerning cybersecurity;
  • legislation regulating the protection of personal data, including cybersecurity requirements; and
  • other legislation relevant to cybersecurity.

Cybersecurity

The NIS 2 Directive (Directive (EU) 2022/2555) has been implemented in national legislation as described in this section.

The Cybersecurity Act (124/2025, Kyberturvallisuuslaki) implements the NIS 2 Directive, imposing uniform cybersecurity requirements for actors operating in essential sectors, and setting out minimum cybersecurity requirements for entities within its scope. However, more specific requirements imposed by any other regulation may be applied in addition to or instead of the Cybersecurity Act – for example, see below regarding the requirements for public administration. The Act also established an institutional framework for supervision and national cyber resilience.

The Act on Information Management in Public Administration (906/2019, Laki julkisen hallinnon tiedonhallinnasta) governs, among other topics, data security, interfaces and interoperability in public administration. Chapter 4a of the Act implements the requirements for public administration set out in the NIS 2 Directive. For public administration entities, this provision applies instead of the national Cybersecurity Act.

The Digital Operational Resiliency Act (Regulation (EU) 2022/2554) (DORA) creates a uniform regulatory framework for reducing cybersecurity risks within financial entities and related ICT suppliers. DORA applies primarily to financial sector entities as lex specialis instead of the national Cybersecurity Act.

The EU Cybersecurity Act (Regulation (EU) 2019/881) (CSA) established the EU Agency for Cybersecurity (ENISA) and the EU-wide certification system to harmonise cybersecurity requirements, increase safety and reduce parallel certification requirements for ICT products, services and processes.

The Cyber Resilience Act (Regulation (EU) 2024/2847) (CRA) regulates extensively all connectible hardware and software, and introduces mandatory cybersecurity requirements for manufacturers and developers. One way to prove a product’s compliance with the CRA can be a certification under the CSA.

The Network Code On Cybersecurity (Regulation (EU) 2024/1366) (NCCS) complements Regulation (EU) 2019/943 of the European Parliament and of the Council of 5 June 2019 on the internal market for electricity, setting out rules on cybersecurity risk management, common minimum requirements, planning, monitoring, reporting and crisis management for, inter alia, certain energy sector actors and critical ICT providers in the energy sector.

The Cyber Solidarity Act (Regulation (EU) 2025/38) sets up a framework for EU-level collaboration, to allow EU member states to better defend themselves against large-scale cyber-attacks.

Cybersecurity and Data Protection

The General Data Protection Regulation (Regulation (EU) 2016/679) (GDPR) sets out extensive rules for the processing of personal data in organisations.

The Data Protection Act (1050/2018, Tietosuojalaki) complements the GDPR, as do special data protection provisions in many other acts. These instruments specify and ensure the effective implementation of the GDPR.

The Act on the Processing of Client Data in Healthcare and Social Welfare (703/2023, Laki sosiaali- ja terveydenhuollon asiakastietojen käsittelystä) (the “Client Data Act”) applies to data processing and information systems in the healthcare and social welfare sectors, supplementing the requirements set out in the Finnish Data Protection Act and the GDPR.

The Act on the Secondary Use of Health and Social Data (552/2019, Laki sosiaali- ja terveystietojen toissijaisesta käytöstä) facilitates the effective and safe processing of, and access to, personal social and health data for steering, supervision, research, statistics and development in the health and social sectors.

The Act on Electronic Communications Services (917/2014, Laki sähköisen viestinnän palveluista) applies to electronic communications service providers. It ensures the quality, safety and reliability of communication networks and services, as well as promoting fair competition and confidentiality and privacy in electronic communication.

Other Relevant Legislation Applicable in Finland

The Artificial Intelligence Act) (Regulation (EU) 2024/1689) (the “AI Act”) creates a unified EU framework with risk-based classifications to ensure the safety and trustworthiness of AI systems.

The CER Directive (Directive (EU) 2022/2557) has been implemented in national legislation, as described below.

The Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience (310/2025, Laki yhteiskunnan kriittisen infrastruktuurin suojaamisesta ja häiriönsietokyvyn parantamisesta) implements the CER Directive. The Act strengthens societal crisis resilience and national safety by ensuring the uninterrupted functioning of the most essential services. Entities considered critical actors under this Act are automatically subject to the Cybersecurity Act. The Act extends risk management obligations beyond information and communication networks to also cover the physical environment relating to critical infrastructure.

The Criminal Code (39/1889, Rikoslaki) contains penal provisions concerning cybercrimes, including, for example, Chapter 38 on data and communications offences and Chapter 35, Sections 3a–3c on criminal damage to data.

The eIDAS Regulation (Regulation (EU) No 910/2014) establishes the regulatory framework for electronic identification and trust services within the EU. The regulation ensures secure electronic transactions across member states and sets standards for electronic signatures and other trust services.

In summary, the Cybersecurity Act sets out minimum cybersecurity requirements, but more specific requirements imposed by other regulations may be applied in addition to or instead of the Cybersecurity Act. Chapter 4a of the Act on Information Management in Public Administration implements NIS 2 directive requirements for public administration entities; for such entities, this provision applies instead of the national Cybersecurity Act. DORA applies primarily to financial sector entities instead of the national Cybersecurity Act, creating a sector-specific regulatory framework. The GDPR, Data Protection Act and cybersecurity legislation overlap particularly regarding data security breaches. Criminal law provisions, particularly in the Criminal Code, complement cybersecurity regulation by establishing criminal liability for cybercrimes such as data breaches, unauthorised access to information systems, and disruption of information systems.

The competent authorities enforcing cybersecurity legislation are quite fragmented. The authorities are outlined below, grouped by the statutes or topics they enforce; certain authorities with unique mandates are presented separately.

  • Cybersecurity Act: the Transport and Communications Agency (Traficom), the Energy Authority, the Finnish Safety and Chemicals Agency (Tukes), the Finnish Supervisory Agency, the Economic Development Centres, the Finnish Food Authority and the Finnish Medicines Agency (Fimea) supervise compliance with the Cybersecurity Act within their respective sectors. These authorities have the right to obtain information, conduct inspections and require actors to conduct a safety audit. Their enforcement powers include imposing penalty payments, enforcing compliance and suspending non-compliant activities, restricting persons from acting in the management of essential entities, and proposing an administrative fine. The final decision on an administrative fine is made by the Administrative Fine Board operating under the Ministry of Transport and Communications. The same authorities also supervise compliance with the Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience, but their enforcement powers under that Act are limited to penalty payments, enforced compliance and non-compliance fees.
  • The Computer Security Incident Response Team (CSIRT), operating under the National Cyber Security Centre Finland (NCSC-FI) of Traficom, monitors and analyses cyber threats and vulnerabilities, and provides cybersecurity information and support. The CSIRT does not supervise entities subject to the Cybersecurity Act, and its activities are accordingly organised separately from the supervisory functions described above. Its activities are based on trust and voluntary security breach notifications. The CSIRT may use non-intrusive methods to conduct vulnerability assessments on networks and IT systems connected to the general communications network, and its responsibilities include responding to incident notifications, assisting notifying entities and, where necessary, conducting technical investigations of serious security breaches. It also participates in maintaining national cybersecurity situational awareness and issues early warnings, alerts and notifications. The supportive role of the CSIRT is also recognised in the Cybersecurity Act, which provides that information voluntarily disclosed to the CSIRT may not, without consent from the disclosing party, be used in criminal investigations or administrative or other decision-making directed at the disclosing party.
  • Traficom is the competent authority for public authorities under Chapter 4a of the Act on Information Management in Public Administration. Its supervisory powers are similar to those of the competent authorities under the Cybersecurity Act. Enforcement powers include issuing a formal notice, requiring the publication of details of non-compliance and imposing penalty fines.
  • DORA: the Financial Supervisory Authority is the competent authority under DORA. It has information and investigation powers and can impose penalties and administrative fines, as well as give public warnings for non-compliance.
  • GDPR and data protection: the Data Protection Ombudsman is the competent authority under the GDPR and national data protection legislation. It has the right to obtain information and conduct investigations, and the ability to impose penalty payments and administrative fines.
  • The Finnish Supervisory Agency supervises information systems and wellbeing applications under the Client Data Act. It can conduct investigations and request information, and its enforcement powers include prohibiting the use of non-compliant systems and penalty payments.
  • CRA: Traficom is the main competent authority under the Act on Electronic Communications Services and the CRA, as well as the certification authority under the EU Cybersecurity Act. The supervisory and enforcement powers under the Act on Electronic Communications Services largely correspond to the powers of competent authorities under the Cybersecurity Act, while the powers under the CRA are similar to general market surveillance powers (see 4.2 Key Obligations Under Legislation).

The regulation on cybersecurity for critical infrastructure is primarily set out in the Cybersecurity Act (124/2025), which applies to entities considered important or essential across various sectors. Most of the obligations set out in the Act apply to both important and essential entities, with the distinction relating predominantly to the supervisory measures available to the authorities and the severity of applicable sanctions.

Most small and micro-enterprises (maximum turnover of EUR10 million and fewer than 50 employees) are excluded from the scope of the Cybersecurity Act. However, if an entity has partner enterprises or linked enterprises, as defined in Commission Recommendation 2003/361/EC, said entity may fall within the scope of the Cybersecurity Act even if its individual turnover and personnel numbers are below the applicable thresholds.

Certain entities are subject to the requirements of the Cybersecurity Act regardless of their size, including:

  • providers of public electronic communications networks or publicly available electronic communications services;
  • trust service providers;
  • top-level domain name registry operators;
  • DNS service providers; and
  • entities designated as critical under the Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience (310/2025).

For these so-called “CER-critical entities”, the Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience is applied in parallel to the Cybersecurity Act. It applies to entities that are considered critical to society due to, for example, the crucial nature of their services for maintaining vital societal functions or their role in operating critical infrastructure in Finland, or a significant risk of adverse effects on the provision of critical services if they were to be subject to an incident. However, entities do not need to make this assessment themselves; rather, the competent authorities make this designation and are required to do so by 17 July 2026.

In addition, the Cybersecurity Act applies to an entity regardless of its size if it carries out activities referred to in Annex I or II, or if it is an entity referred to in those Annexes, and if:

  • it provides a service that is essential for the maintenance of critical societal or economic functions and that is not provided by other entities;
  • a disruption to the service it provides could have a significant impact on public order, public safety or public health;
  • a disruption to the service it provides could cause a significant systemic risk, particularly in sectors where such a disruption could have cross-border effects; or
  • it is critical due to its particular importance at national or regional level for the sector or type of service concerned, or for other interdependent sectors in any EU member state.

According to the Cybersecurity Act, more detailed guidelines on the designation of critical entities can be issued in secondary legislation (a Government Decree). At the time of writing, no such decree has been issued, and therefore the interpretation of the criteria for size-independent critical entities remains uncertain.

Activities in the areas of national or public security, defence or law enforcement, including the prevention, investigation, detection and prosecution of criminal offences, are excluded from the scope of the Cybersecurity Act.

Instead of the Cybersecurity Act, Chapter 4a of the Act on Information Management in Public Administration (906/2019) applies to most public authorities. However, certain entities fall largely outside the scope of cybersecurity regulation, including courts, universities, organs connected to the Parliament, the Office of the President of the Republic and various authorities involved in defence or the criminal justice system.

Sectors in Scope of the Cybersecurity Act

The sectors within the scope of the Cybersecurity Act and the respective sector-specific competent authorities are listed below.

Highly critical sectors (Annex I to the Cybersecurity Act)

The following sectors are deemed to be highly critical, and are subject to the oversight of the listed authority:

  • energy – supervision shared between the Energy Authority and the Finnish Safety and Chemicals Agency (Tukes);
  • transport – Traficom;
  • banking and financial market infrastructures – the Financial Supervisory Authority;
  • health – the Finnish Supervisory Authority;
  • drinking water supply and distribution – the Economic Development Centre;
  • wastewater – the Economic Development Centre;
  • digital infrastructure – Traficom;
  • ICT service management – Traficom;
  • space – Traficom; and
  • public administration – Traficom (provisions are contained in Section 4a of the Act on Information Management in Public Administration).

(Other) critical sectors (Annex II to the Cybersecurity Act)

The following sectors are also deemed to be critical, subject to the oversight of the listed authority:

  • postal and courier – Traficom;
  • waste management – the Finnish Supervisory Authority;
  • the manufacture, production and distribution of chemicals – Tukes;
  • the manufacture of medical devices and in vitro diagnostic medical devices, computer, electronic and optical products (C26 of NACE Rev.2), electrical equipment (C27 of NACE Rev.2), machinery and equipment (C28 of NACE Rev. 2), motor vehicles, trailers and semi-trailers C29 of NACE Rev.2), and other transport equipment (C30 of NACE Rev.2) – supervision shared between the Finnish Medicines Agency (Fimea) and Tukes;
  • digital service providers – Traficom; and
  • research organisations – Traficom.

The main responsibilities set out for important and essential entities under the Cybersecurity Act and for public administration falling within the scope of Chapter 4a of the Act on Information Management in Public Administration centre on risk management to prevent or minimise the impact of incidents on operations, operational continuity, service recipients and other services. Generally, entities and authorities are required to identify, assess and manage risks to the security of the communications networks and IT systems that they use. The risk management measures must be up-to-date, appropriate and sufficient in relation to the risks and the significance of the network or system to the operations and services of the entity or authority.

The Cybersecurity Act imposes the following obligations on entities within its scope.

  • Registration – entities must assess independently whether they fall within the scope of the Cybersecurity Act and, if so, register with the competent authority responsible for their sector.
  • Risk management – as described below.
  • Reporting – as described in 2.3 Incident Response and Notification Obligations.

Risk Management Obligations

Entities are required to implement an up-to-date cybersecurity risk management operating model to protect their communications networks and IT systems against incidents and to mitigate their potential impacts. The risk management operating model must take all relevant risk factors into account and define the objectives, procedures and responsibilities of cybersecurity risk management, as well as the risk management measures.

The Cybersecurity Act and Chapter 4a of the Act on Information Management in Public Administration include a 12-point list of factors that must, at a minimum, be addressed in the risk management operating model and the risk management measures. The risk management measures may be technical, operational or organisational, but they must be proportionate to the scope of the operations, the expected impacts of an incident, the risk susceptibility of the networks and systems, the likelihood and severity of incidents, and the costs of the measures and their technical feasibility.

Responsibility for the implementation and supervision of risk management under the Cybersecurity Act is imposed on the top management of important or essential entities (the board of directors, the supervisory board, the managing director and their respective deputies). The competent authorities may restrict individuals from acting in the top management of essential entities for up to five years if they fail to discharge this responsibility. However, this restriction does not apply to partnerships.

Complying with the requirements of the Cybersecurity Act largely also ensures compliance with the cybersecurity requirements set out for critical entities under the Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience. In addition to the cybersecurity requirements, the latter Act imposes numerous other requirements to ensure resilience against other threats, such as natural disasters, large-scale accidents and public health crises.

The Cybersecurity Act and Chapter 4a of the Act on Information Management in Public Administration impose similar incident response and notification obligations. An initial notification of a significant incident must be submitted to the competent authority within 24 hours of becoming aware of the incident, and a follow-up notification within 72 hours. An incident is considered significant if it has caused or is capable of causing either severe operational disruption to services or financial loss for the entity concerned, or considerable material or non-material damage to other natural or legal persons.

The initial notification must include:

  • confirmation of the detection of a significant incident;
  • an indication of whether the incident is suspected of being caused by a criminal or other unlawful or malicious act; and
  • information regarding any potential cross-border impacts.

The follow-up notification must include an assessment of the nature, severity and impacts of the incident, indicators of compromise, where available, and any updates to the information provided in the initial notification.

Within one month of the follow-up notification, a final report detailing the incident must be submitted to the competent authority. This must include:

  • the severity and impacts of the incident;
  • the type of threat or root cause that likely triggered the incident;
  • applied and ongoing mitigation measures; and
  • possible cross-border impacts.

If the incident is still ongoing when the final report should be submitted, or at the request of the competent authority, an interim report must be submitted with relevant status updates and progress on handling the incident.

In addition to the notification obligations vis-à-vis the competent authorities, the recipients of the service must be notified of the significant incident if it is likely to hinder delivery of the services. The affected recipients of the services must also be notified of any significant cyber threat and mitigation measures.

The competent authority forwards the incident notifications and reports it has received to the CSIRT operating under Traficom. The affected entity or authority may request guidance and operational advice on mitigation measures from the CSIRT.

The competent authority itself is subject to separate notification obligations arising from incident reports, depending on the nature of the incident. These obligations include, for example, an obligation to notify the Data Protection Ombudsman where the incident involves a personal data breach. Where a significant incident notification is submitted by a critical entity under the Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience, the receiving authority must forward it to the competent authority under that Act, which is, however, largely the same as under the Cybersecurity Act.

The NCSC-FI serves as the single point of contact in Finland facilitating cross-border co-operation and co-ordination between competent authorities in different EU member states. It also submits regular summary reports on significant incidents, cyber threats and near misses to ENISA.

It should also be noted that, where an incident occurs but is not significant, a voluntary notification may be submitted to the competent authorities. In such cases, the deadlines prescribed by the Cybersecurity Act do not apply. Voluntary notifications may also be submitted by entities that are not subject to the Cybersecurity Act.

Traficom provides support, guidance and supervision on information security issues and the implementation of privacy protection in electronic communications. It also maintains national cybersecurity situational awareness. The overall objective of the activities of the NCSC-FI is to promote and ensure the information security of information systems and data communication arrangements.

The Finnish national CSIRT unit also operates under the NCSC-FI. The responsibilities of the CSIRT are defined in the Cybersecurity Act and include monitoring and analysing cyber threats and vulnerabilities, providing guidance and recommendations, and supporting the maintenance of national cybersecurity situational awareness.

The CSIRT may conduct proactive vulnerability scans of publicly available networks and IT systems to detect vulnerable and unsafely configured networks and IT systems. Furthermore, entities can request the CSIRT to conduct a targeted scan of their networks or IT systems. Methods permitted in targeted scans are subject to considerably fewer restrictions than in proactive scans.

The CSIRT can facilitate a voluntary exchange of cybersecurity information between itself and any entities. Participating entities can share relevant information considered confidential under the Act on Electronic Communications Services. The CSIRT also co-ordinates the disclosure of vulnerabilities by receiving notifications of vulnerabilities, contacting entities affected by vulnerabilities and co-ordinating the management of vulnerabilities affecting multiple entities. It also reports, and advises entities on reporting, vulnerabilities to the European vulnerability database.

DORA is a directly applicable EU regulation that also applies in Finland. The financial sector operational resilience legislation applicable in Finland is largely consolidated under DORA. The scope of DORA encompasses a comprehensive list of 21 categories of entities in the financial sector, including third-party ICT service providers designated as critical. In Finland, only pension insurance companies are excluded from the scope of DORA, and micro enterprises are exempt from many of its requirements. For the most part, DORA applies uniformly to all financial institutions providing services in the EU. DORA does not apply directly to ICT service providers other than those designated as critical. Instead, financial entities are responsible for ensuring that the ICT service providers and systems they use comply with the requirements of DORA.

The definition of an ICT service provider in DORA is broad and encompasses all entities and other undertakings providing any digital and data services to financial entities through ICT systems. It includes services like cloud storage and software development, as well as hardware services such as the provision of firmware updates.

The contractual requirements in DORA include detailed lists of mandatory contractual elements that must be included in all ICT service contracts and in contracts for ICT services supporting critical or important functions. Required elements include, for example:

  • access to data in case of an ICT service provider’s insolvency;
  • specifying the locations of data storage and processing; and
  • terms on security measures and data protection.

Contracts must clearly allocate the rights and obligations of each party, and these must be documented in one written document. More extensive requirements on contractual provisions apply to contractual arrangements concerning ICT services supporting critical or important functions. These include, for example, precise quantitative and qualitative performance targets within the agreed service levels and exit strategies.

The obligations imposed by DORA are subject to the proportionality principle. Financial entities’ size and risk profile, as well as the nature, scale and complexity of their operations, are considered when determining how certain rules in DORA are applied.

DORA and the Commission Delegated Regulation (EU) 2024/1774 supplementing DORA include detailed rules on ICT risk management. The regulation requires financial entities to, inter alia, ensure the adequacy of ICT systems, identify ICT dependencies, implement an ICT business continuity policy and train their staff. The management bodies of financial entities are ultimately responsible for the implementation of appropriate ICT risk management frameworks.

Financial entities are required to implement an ICT-related incident management process to detect, manage and notify ICT incidents. They are also required to classify incidents and cyber threats in accordance with the criteria set out in DORA, taking into consideration the severity, extent and types of impacts.

DORA emphasises the obligation of financial entities to monitor and manage potential risks arising from ICT services provided by third parties. Among other requirements, financial entities must report to the competent authority at least annually on the number of arrangements concerning ICT services, and must submit, upon request, either the full register of information or the relevant parts thereof. In addition, financial entities must have systematic processes in place for the selection and assessment of ICT service providers. This includes a structured assessment of the content of contractual arrangements, an evaluation of whether the supervisory conditions for contracting are met, and an assessment of whether the ICT concentration risk is identified.

Incidents classified as major must be reported to the Finnish Financial Supervisory Authority within four hours of classification and within 24 hours of becoming aware of the incident. Within 72 hours of the initial report, an intermediate report must be submitted, which must be updated in the event of status changes or upon request by the authority. Within one month of the intermediate report, a final report must be submitted, including root cause analysis, resolution details and impact assessment.

A special oversight framework applies to ICT service providers designated as critical by the European Supervisory Authorities. This designation takes into account, for example, the number and systemic importance of entities relying on the services, the substitutability of the services and the potential impacts of a failure in providing said services.

One of the European Supervisory Authorities is appointed as Lead Overseer for each critical ICT service provider, to assess its risk management measures. The Lead Overseer has broad powers to access information and carry out general investigations and inspections. The Lead Overseer’s powers extend to ICT service providers established outside the EU that provide services to financial entities within the EU. However, the powers outside the EU are subject to additional restrictions.

If a critical ICT service provider does not comply with requests of the Lead Overseer within 30 calendar days, it may be subject to a periodic penalty payment that accrues daily. The penalty payment may amount to up to 1% of the average daily worldwide turnover of the critical ICT service provider in the preceding business year, and may be imposed for a maximum period of six months.

In addition to the EU-level enforcement against critical ICT service providers, all ICT service providers are subject to an obligation to provide information requested by the Financial Supervisory Authority under the Act on the Financial Supervisory Authority (878/2008, Laki Finanssivalvonnasta). If an ICT service provider does not comply with the obligation, the Financial Supervisory Authority may impose a penalty payment of between EUR1,000 and EUR100,000. The Financial Supervisory Authority has published a comprehensive guide on the basis of which the amount of penalty payments is determined. If the non-compliance is particularly reprehensible, an administrative fine of up to 10% of the annual turnover of the ICT service provider may be imposed.

DORA does not include comprehensive cross-border data transfer regulation comparable to the GDPR. However, DORA requires financial entities to include specific ICT-related provisions in their third-party ICT service contracts, including the locations of data processing and service provision, and notification obligations when planning to change these locations. Financial entities must also implement exit strategies for critical ICT services, notify competent authorities of planned contractual arrangements for critical or important functions, and assess concentration risks arising from using the same or closely related service providers. Extensive regulation on transfers of personal data is included in the GDPR.

DORA requires entities identified by the Financial Supervisory Authority to carry out threat-led penetration testing (TLPT) on live production systems at least every three years. The Financial Supervisory Authority identifies the entities based on impact-related factors, possible financial stability concerns and ICT risk profile. Entities determine the scope of TLPT independently, subject to validation by the Financial Supervisory Authority. ICT service providers may also be included in the scope of TLPT.

TLPT may be conducted by either external or internal testers; however, an external tester must be engaged at least once every three years. Testers must satisfy requirements relating to independence, competence, certification, and risk management and mitigation. Compliance with the remaining testing requirements is achieved by adhering to the TIBER-FI framework.

The main source of cyber-resilience regulation in Finland is Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168/2013 and (EU) 2019/1020 and Directive (EU) 2020/1828 (the Cyber Resilience Act, or CRA). The CRA is a horizontal, harmonised product safety regulation, and the essential cybersecurity requirements under it are indicated by a product’s CE marking. In addition, Commission Implementing Regulation (EU) 2025/2392 further specifies the technical descriptions of important and critical products with digital elements under the CRA. The requirements under the CRA do not preclude the application of other requirements that may apply to the same product pursuant to other EU product regulations. In Finland, national legislation implementing the CRA will enter into force at a later date.

The CRA entered into force in 2024, and the application of its obligations starts in three steps between 2026 and 2028. The scope of the CRA is broad; as a general rule, it includes all devices and software with digital elements and expected use involving direct or indirect connection to a network or other device. Pure SaaS solutions that are not delivered together with a product with digital elements are generally excluded from the scope of the CRA. However, remote data processing solutions necessary for a product with digital elements to perform its functions are considered part of that product and, accordingly, fall within the scope of the CRA. An example of such products is smart home devices.

The CRA imposes extensive obligations on manufacturers, importers and distributors of products with digital elements. Products must meet essential cybersecurity requirements contained in Annex I of the CRA, covering product properties (eg, security by default, access control, data protection) and vulnerability handling processes. Manufacturers must conduct cybersecurity risk assessments, prepare technical documentation and provide user instructions. Vulnerabilities must be remediated without delay through security updates distributed securely and free of charge during the support period, which must reflect the product’s expected lifetime (minimum five years unless the expected lifetime is lower). The reporting timelines under the CRA correspond to those prescribed by the Cybersecurity Act and DORA, requiring notifications within 24 hours, 72 hours and one month, respectively (see 2.3 Incident Response and Notification Obligations and 3.3 Key Operational Resilience Obligations). Before market placement, conformity assessment is required, followed by EU declaration of conformity and CE marking.

Prior to placing products on the EU market, importers are required to verify that manufacturers have fulfilled their obligations, including conformity assessment, preparation of technical documentation and affixing of the CE marking, and must provide their own contact details on the product. Distributors must verify that the CE marking has been affixed and that manufacturers and importers have met their obligations concerning identification, contact information, user instructions and support period information before making products available on the market. Both importers and distributors are required to notify manufacturers of any discovered vulnerabilities without undue delay and, where a product poses a significant cybersecurity risk, to immediately inform the relevant market surveillance authorities, providing detailed information on the non-compliance identified and any corrective measures taken.

The market surveillance authority in Finland for products within the scope of the CRA is expected to be Traficom. As an initial enforcement measure, the relevant economic operator is required to bring the non-compliance to an end by, for example, bringing the product into compliance, withdrawing or recalling the product, or arranging for its destruction. This requirement may be enforced by means of a penalty payment. If the operator fails to comply with the requirement, the authority may itself recall or restrict the availability of the product on the market. In addition, the CRA sets out administrative fines for non-compliance, ranging up to:

  • EUR15 million or 2.5% of annual turnover (whichever is higher) for manufacturers;
  • EUR10 million or 2% of annual turnover for authorised representatives, importers, distributors and notified bodies; and
  • EUR5 million or 1% of annual turnover for the submission of incorrect, incomplete or misleading information.

Finland is part of the EU’s cybersecurity certification framework established under Regulation (EU) 2019/881 (the EU Cybersecurity Act, or CSA). The National Cybersecurity Certification Authority (NCCA) in Finland is Traficom, which is responsible for the accreditation of Conformity Assessment Bodies (CABs) that can act as certifiers delivering certificates or as evaluators auditing and testing.

The CSA establishes three assurance levels: basic, substantial and high. The basic level provides assurance against basic risks; the substantial level addresses significant risks; and the high level is intended for situations involving the highest risks, requiring the most stringent evaluation methods, such as penetration testing.

Certification under the CSA is generally voluntary; however, certificates are commonly used as requirements for certain critical products, and certification under the CSA is a recognised means of demonstrating compliance. To date, the only adopted European cybersecurity certification scheme is the EUCC (European Cybersecurity Certification Scheme on Common Criteria), which primarily targets ICT products. However, ENISA is currently developing additional certification schemes covering cloud services, 5G networks, digital identity wallets and managed security devices. Should the European Commission exercise its power to mandate the use of European cybersecurity certifications for products listed in Annex IV of the Cyber Resilience Act, and if such certifications become more widely available, the CSA certification framework would constitute the primary means of demonstrating the conformity of those products with the applicable cybersecurity requirements and of ensuring their access to the EU internal market.

In the context of public procurement, contracting authorities and entities may require certified ICT products, services or processes as part of their procurement procedures. The NIS 2 Directive further permits (but does not oblige) member states and the Commission to impose such requirements on entities falling within its scope.

Regulatory Framework for Data Protection

The main source of personal data protection legislation in Finland is the GDPR. This is supplemented by the Finnish Data Protection Act (1050/2018, Tietosuojalaki), the Act on Electronic Communications Services (917/2014, Laki sähköisen viestinnän palveluista) and the Act on the Protection of Privacy in Working Life (759/2004, Laki yksityisyyden suojasta työelämässä).

Cybersecurity Obligations

The GDPR includes three types of cybersecurity-related obligations:

  • obligations on ensuring the security of personal data processing;
  • notification obligations in cases of personal data breaches; and
  • principles of information security-based processing of personal data.

Security of personal data processing

The GDPR includes multiple requirements for ensuring the security of personal data processing. The central obligation is ensuring the integrity and confidentiality of processing. Further specific obligations include risk management, data protection by design and default, and requirements for security of processing – namely, Articles 5(1)(f), 25, 28 32, 33, 34 and 35. In particular, the GDPR requires controllers and processors to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including, where appropriate:

  • the pseudonymisation and encryption of personal data;
  • the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
  • the ability to restore the availability of and access to personal data in a timely manner in the event of an incident; and
  • a process for regularly testing, assessing and evaluating the effectiveness of such measures.

Notification obligations

The GDPR requires controllers to notify the competent authority (the Data Protection Ombudsman in Finland) and data subjects of personal data breaches. A personal data breach is defined as a breach of security leading to the accidental or unlawful destruction, loss, alteration or unauthorised disclosure of, or access to, personal data.

The notification to the Data Protection Ombudsman must be made within 72 hours after becoming aware of the breach, unless the controller is able to demonstrate that the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. The notification must include at least:

  • a description of the nature of the breach including, where possible, the categories and approximate number of data subjects and personal data records concerned;
  • the name and contact details of the data protection officer or other contact point;
  • a description of the likely consequences of the breach; and
  • a description of the measures taken or proposed to address the breach and mitigate its possible adverse effects.

A breach must also be communicated to data subjects without undue delay if it is likely to result in a high risk to the rights and freedoms of natural persons, and if none of the exceptions under Article 34(3) of the GDPR apply. The communication to data subjects must describe the nature of the breach in clear and plain language, and contain at least the contact details of the data protection officer, a description of the likely consequences and the measures taken or proposed to address the breach.

Principles of information security-based processing of personal data

Certain GDPR obligations and requirements can affect how cybersecurity risk management can be implemented. Under the GDPR, processing personal data is allowed only where a legal basis for such processing exists. The most relevant of these for cybersecurity risk management are compliance with legal obligations, public interest and legitimate interest. Furthermore, the GDPR includes requirements, for example, to use personal data only for the purpose for which it was collected, to minimise the amount of personal data collected and the time it is retained, and to ensure the integrity and confidentiality of personal data processed.

Legislative Framework

AI systems and solutions are regulated in Finland by Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300/2008, (EU) No 167/2013, (EU) No 168/2013, (EU) 2018/858, (EU) 2018/1139 and (EU) 2019/2144 and Directives 2014/90/EU, (EU) 2016/797 and (EU) 2020/1828 (the Artificial Intelligence Act, or AI Act). The AI Act entered into force in 2024, and its application starts gradually, with final obligations applicable from August 2027.

Risk Management Framework

In line with the approach adopted in cybersecurity legislation, the AI Act applies a risk-based regulatory framework under which the obligations imposed increase in proportion to the level of risk associated with the AI system, as determined by reference to its intended purpose and functionalities. The AI Act requires high-risk AI systems to achieve an appropriate level of accuracy, robustness and cybersecurity, and to be designed and developed in a manner that ensures resilience against attempts by unauthorised third parties to exploit system vulnerabilities. In addition to the cybersecurity threats applicable to most ICT systems, the AI Act requires AI-specific vulnerabilities to be taken into account, including data and model poisoning, model evasion, confidentiality attacks and model flaws.

Incident Reporting

The AI Act includes an incident reporting scheme that requires providers of high-risk AI systems to report serious incidents to the market surveillance authority. The competent market surveillance authority is determined based on the sector of the product into which the AI system is incorporated. The report must be submitted no later than 15 days after the provider has become aware of the incident. However, the more serious the incident, the shorter the expected reporting timeframe.

Supervision and Enforcement

Compliance with the AI Act is enforced through the EU market surveillance framework established under Regulation (EU) 2019/1020, as supplemented by the enforcement provisions of the AI Act. In addition, administrative fines of up to EUR15 million or up to 3% of total worldwide annual turnover may be imposed, or, in the case of prohibited AI practices, up to EUR35 million or up to 7% of total worldwide annual turnover, whichever is higher. Furthermore, the supply of incorrect, incomplete or misleading information is subject to administrative fines of up to EUR7.5 million or up to 1% of total worldwide annual turnover, whichever is higher.

Interaction With General Cybersecurity and Data Protection Obligations

The AI Act operates alongside and complements other applicable EU regulations. Where an AI system is embedded in a product with digital elements, the cybersecurity requirements of the CRA apply in parallel, and compliance with the essential cybersecurity requirements of the CRA is deemed to satisfy the cybersecurity requirements for high-risk AI systems under the AI Act. Similarly, to the extent that an AI system processes personal data, the obligations under the GDPR, including requirements for data protection by design, apply concurrently with the obligations under the AI Act.

Legislative Framework

In addition to the general cybersecurity regulatory framework (such as the Cybersecurity Act), the healthcare sector is subject to sector-specific cybersecurity obligations and requirements. The Client Data Act applies to data processing and information systems in healthcare and social welfare sectors, supplementing requirements under the Finnish Data Protection Act and the GDPR. The Act on the Secondary Use of Health and Social Data (552/2019, Laki sosiaali- ja terveystietojen toissijaisesta käytöstä) facilitates effective and safe processing and access to personal social and health data for steering, supervision, research, statistics and development in health and social sectors, whilst safeguarding individuals’ rights and freedoms in personal data processing. The Act on Information Management in Public Administration (906/2019, Laki julkisen hallinnon tiedonhallinnasta) implements cybersecurity requirements of the NIS 2 Directive for public administration entities, including public healthcare entities.

Cybersecurity Obligations Under Sector-Specific Legislation

The sector-specific legislative instruments described above impose cybersecurity obligations on healthcare and social welfare entities. Under the Client Data Act, the integrity, immutability and indisputability of client and patient data must be secured when processing, transferring or storing data. Any information security breaches or disruptions affecting national information system services must be reported to the NCSC-FI of Traficom. Public agencies, pharmacies and ICT service providers subject to the Client Data Act are required to have an information security policy. The Act on the Secondary Use of Health and Social Data imposes obligations to ensure the security and integrity of health and social data processed for secondary purposes, including risk management, access control and active monitoring.

Applicability of the Cybersecurity Act

The Cybersecurity Act applies to any healthcare organisation that meets the criteria for entities set out in the Act (see 2. Critical Infrastructure Cybersecurity Regulation regarding the obligations and requirements under the Cybersecurity Act). Regulation (EU) 2017/745 on medical devices (MDR) and Regulation (EU) 2017/746 on in vitro diagnostic medical devices (IVDR) impose cybersecurity requirements on the manufacturers of medical devices. Pursuant to Article 2(2) of the CRA, products falling within the scope of the MDR and the IVDR are excluded from the scope of the CRA and are accordingly not subject to the cybersecurity requirements set out therein.

Incident Reporting in the Healthcare Sector

Healthcare entities within the scope of the Cybersecurity Act are subject to the incident reporting obligations outlined in 2.3 Incident Response and Notification Obligations. In addition, under the Client Data Act, information security breaches and disruptions affecting national information system services must be reported to the NCSC-FI. Where a significant incident also constitutes a personal data breach within the meaning of the GDPR, parallel notification obligations to the Data Protection Ombudsman apply.

Lieke Attorneys Ltd

Aleksanterinkatu 11
00100 Helsinki
Finland

+358 9 6844 410

+358 9 6844 4141

attorneys@lieke.com lieke.com
Author Business Card

Trends and Developments


Authors



Lieke Attorneys Ltd is a Finnish law firm, established in 1989, with a focus on data and technology, dispute resolution, transactions, energy and construction. Its experienced experts assist clients with IT and digitalisation projects, data privacy and data protection, data sharing and processing, document disclosure, cybersecurity, intellectual property, technology contracts and procurement, and other data and technology-related issues. Lieke provides clients with expert support in implementing the latest solutions, assessing regulatory compliance, managing risks and resolving disputes. In an ever-changing regulatory environment, Lieke’s focus is on providing expert and practical solutions, always considering the business needs of our clients. Lieke also advises on trade mark, design and copyright issues and related regulatory and registration processes, as well as employment invention matters.

Introduction

In today’s digital economy, cybersecurity has rapidly moved from being an IT specialist concern to a core business priority. For organisations operating in Finland, this shift reflects a combination of technological transformation, heightened regulatory expectations and a fast-evolving threat landscape. Traditional cyber risks have been compounded by geopolitical tensions, hybrid threats and increasingly sophisticated malware and ransomware campaigns. These dynamics ripple across sectors, and demand that boards, executives and risk owners understand not only the legal obligations but also the strategic and operational implications.

Finland’s cybersecurity ecosystem reflects both mature preparedness and growing challenges. Finland was one of the first EU member states to implement NIS 2, enshrined in its national Cybersecurity Act in spring 2025. At the same time, businesses face uncertainty about how future designations and national implementations – including those under the Critical Entities Resilience Directive (CER) and the Cyber Resilience Act (CRA) – will affect them. National authorities are increasingly visible in shaping expectations, providing guidance and facilitating co-operation between government and private sector actors.

Cybersecurity is not only a regulatory or operational issue in Finland – it is explicitly framed as a matter of national security and societal resilience at the highest political level. In the current Government Programme of the Finnish Government, cybersecurity and preparedness are embedded in broader objectives concerning comprehensive security, the resilience of critical infrastructure, and strengthening national defence and internal security. The programme emphasises improving cyber situational awareness, safeguarding critical digital infrastructure, reinforcing public-private co-operation, and ensuring that authorities have sufficient powers and resources to prevent and respond to cyber incidents.

In addition, cybersecurity priorities are reflected in Finland’s long-term strategic planning documents, including the national cybersecurity strategy adopted by the Finnish Government and co-ordinated by the Ministry of Transport and Communications. The strategy highlights securing digital public services, protecting supply chains, enhancing incident response capabilities, and promoting cybersecurity competence and workforce development. These objectives align closely with EU-level regulatory reforms and demonstrate that cybersecurity is treated as a cross-sectoral policy priority rather than a narrow technical domain.

Operationally, the role of national authorities has expanded. The Finnish Transport and Communications Agency, Traficom, through its National Cyber Security Centre (NCSC-FI), plays a central role in threat monitoring, incident response co-ordination, and guidance under NIS 2. Other sectoral regulators, as well as security authorities, contribute to supervisory and resilience-building efforts. The Government Programme explicitly supports strengthening these authorities’ mandates and improving information sharing between public and private actors.

This high-level political prioritisation has practical consequences for organisations. Cybersecurity is increasingly integrated into risk management, business continuity planning, procurement requirements and board-level governance. Companies operating in critical sectors – such as energy, transport, finance, healthcare, digital infrastructure and public administration – must now navigate not only technical controls but also reporting obligations, supply chain security expectations and enhanced supervisory oversight. The clear message from the Finnish policy framework is that cybersecurity is a cornerstone of economic stability, national security and trust in digital services.

Regulatory Context: High-Level Overview

Finland’s early adoption of NIS 2 signals strong national commitment to enhancing digital resilience, particularly for providers of essential services and digital infrastructure. For organisations with operations or digital dependencies in Finland, this means an earlier transition into the new EU cybersecurity baseline than in many other member states.

Beyond NIS 2, Finland is actively aligning with several major EU cybersecurity and resilience initiatives, each at varying stages of national implementation, as follows.

  • Cyber Resilience Act: the CRA establishes security requirements for products with digital components. Some provisions have begun to apply, and staged implementation of broader requirements is underway, with full application expected by 2027.
  • Critical Entities Resilience Directive: the CER expands obligations for operators of critical services across sectors. However, the formal list of nationally designated entities under CER is not yet finalised in Finland and is expected by mid 2026.
  • Digital Operational Resilience Act (DORA): DORA introduces harmonised digital resilience requirements for the financial sector. Finland has a significant financial and fintech ecosystem, including banks, payment service providers and emerging digital finance platforms. National legislative adjustments and supervisory practices are progressing alongside EU-wide application timelines, with authorities increasingly expecting firms to demonstrate robust operational resilience, third-party risk management and incident response capabilities.
  • Network Code on Cybersecurity (NCCS) for Electricity: this EU network code sets sector-specific cybersecurity standards for cross-border electricity flows.

Alongside legislative instruments, the National Cyber Security Centre, Finland (NCSC FI) plays an integral role in threat monitoring, incident response co-ordination and stakeholder engagement. NCSC FI’s regular advisories and threat assessments reinforce expectations that organisations understand, prepare for and mitigate risks beyond basic compliance.

While Finland’s legal frameworks already establish obligations and a certain level of clarity regarding requirements, businesses should anticipate ongoing developments, particularly as scope definitions are refined and implementation timelines are clarified.

Geopolitical Drivers of Cyber Risk

Finland’s cybersecurity landscape cannot be separated from its geopolitical context. Proximity to global flashpoints and active state-level cyber actors elevates the risk profile for organisations across sectors. The following three interconnected geopolitical drivers are particularly relevant.

State-sponsored cyber operations

Finland’s highly digitalised public administration, advanced industrial base and strategic position at the EU’s external border materially influence its cyber risk profile. For legal practitioners advising boards and executive management, it is essential to recognise that cyber risk in Finland goes significantly further than sole opportunistic criminality; it increasingly intersects with national security considerations, sanctions compliance, supply chain integrity and regulatory oversight.

From a risk advisory perspective, Finland’s advanced digital infrastructure, open economy and geopolitical location render it an attractive target for state-sponsored and state-aligned cyber activity. Finnish authorities, including the NCSC-FI operating under Traficom, have repeatedly highlighted the presence of advanced persistent threat (APT) activity directed at public administration, critical infrastructure and high-technology sectors.

Such campaigns are typically characterised by:

  • extended dwell times – threat actors remain undetected within networks for prolonged periods, enabling strategic intelligence gathering and the preparation of follow-on activity;
  • multi-stage attack chains, combining reconnaissance, credential harvesting, exploitation of vulnerabilities, lateral movement and data exfiltration before any overt disruption occurs; and
  • targeted disruption and influence, including attempts to interfere with critical infrastructure, logistics chains, telecommunications and energy supply.

Unlike opportunistic cybercrime, state-linked operations are persistent, adaptive and strategically motivated. From a governance standpoint, this requires organisations to move beyond traditional perimeter-based security models and to adopt continuous monitoring, zero-trust architectures and board-level cyber risk oversight, aligned with enterprise risk management frameworks.

Hybrid threats and information operations

Modern cyber threats in Finland are not limited to purely technical intrusions. They increasingly form part of broader hybrid operations, combining cyber disruption with disinformation, social engineering, physical reconnaissance and influence campaigns. Finnish authorities have publicly emphasised that the threat environment must be assessed holistically, particularly in light of Finland’s NATO membership and its strategic geographic position.

From a legal risk perspective, these hybrid activities are designed not only to exploit technical vulnerabilities but also to:

  • undermine organisational trust by creating uncertainty about the integrity of systems, leadership and decision-making;
  • erode customer and stakeholder confidence, particularly in regulated sectors such as energy, finance, telecommunications and healthcare; and
  • destabilise public perception during sensitive periods such as elections, geopolitical crises or major infrastructure developments.

Recent media reporting in Finland has highlighted incidents involving drones and unidentified third parties operating in or near security-sensitive areas, including critical infrastructure and restricted zones. While investigations and attributions are matters for the competent authorities, these cases illustrate the convergence between physical and digital risk domains. Drone overflights near energy facilities, ports or other strategic sites may serve reconnaissance purposes, test response protocols or form part of a broader intelligence-gathering effort that can subsequently support cyber intrusion or influence operations.

For organisations, this convergence has concrete compliance implications. The traditional separation between “cybersecurity” and “physical security” is increasingly artificial. Boards are expected to ensure that:

  • physical access controls and surveillance policies are aligned with cybersecurity risk management;
  • incident response plans address hybrid scenarios involving both IT compromise and physical disruption; and
  • communications strategies are prepared in advance to mitigate reputational harm arising from disinformation or co-ordinated media amplification.

Campaigns targeting supply chains or public services may therefore pursue broader political or economic leverage rather than immediate financial gain. For example, disruption of logistics chains, telecommunications infrastructure or energy distribution – whether through cyber means, physical probing or co-ordinated narrative operations – can generate effects that extend well beyond the directly affected entity.

In the Finnish regulatory context, such hybrid risks intersect with obligations under the national Cybersecurity Act (implementing NIS 2), sector-specific resilience requirements and broader national security considerations. Authorities including Traficom and other security actors operating under the framework of the Finnish Government’s comprehensive security model increasingly emphasise cross-sector information sharing and preparedness for combined cyber-physical incidents.

For legal advisers, the practical takeaway is clear: modern cyber risk assessments in Finland must extend beyond technical controls and regulatory tick-box exercises. They must incorporate hybrid threat modelling, crisis communications planning, supply chain due diligence and board-level oversight capable of addressing incidents that simultaneously affect systems, facilities, personnel and public trust.

Global and regional dependencies

No organisation operates in isolation. Cloud platforms, third-party software providers and multinational service vendors create interconnected risk surfaces. An incident affecting a widely used service can rapidly cascade through domestic ecosystems. Past global supply chain compromises have demonstrated how vulnerabilities embedded in third-party code or infrastructure can be leveraged at scale, exposing otherwise well-managed organisations to systemic disruption.

From a strategic and regulatory standpoint, this reinforces the need for Finnish organisations to prioritise structured supply chain visibility, documented vendor risk assessments and resilient architecture design. Under Finland’s Cybersecurity Act implementing NIS 2, regulated entities are required to address supply chain risks explicitly, including through contractual safeguards, incident notification mechanisms and active oversight of critical ICT providers.

Within parts of the Finnish financial sector, a discernible recalibration has emerged in response to these dependencies. While cloud adoption remains central to digital transformation, certain financial institutions have strengthened on-premise environments and invested in proprietary data centre capacity located in multiple domestic sites. This development reflects a reassessment of concentration risk, operational resilience requirements and jurisdictional exposure linked to hyperscale cloud models. The shift is not a retreat from cloud services but rather a hybridisation strategy: combining private infrastructure, geographically distributed Finnish data centres and carefully structured outsourcing arrangements designed to satisfy supervisory expectations and ensure recoverability under stress scenarios.

Finland has concurrently positioned itself as an attractive jurisdiction for large-scale data centre investments. International operators such as Google and Microsoft have expanded or announced significant data centre projects in Finland. These investments are underpinned by legal predictability, political stability, renewable energy availability and favourable climatic conditions. From a resilience perspective, growing domestic data centre capacity creates practical possibilities to define and document where certain categories of sensitive data are processed and stored. For public sector entities, critical infrastructure operators and regulated industries, the ability to demonstrate geographic control and supervisory transparency can carry both legal and strategic weight.

The expansion of cybersecurity-intensive infrastructure also intersects with Finland’s energy sector. Data centres are energy-intensive assets requiring stable, long-term power arrangements, increasingly tied to renewable generation. In certain cases, excess heat produced by data centres has been integrated into district heating systems, creating new forms of industrial co-operation and a distinct business opportunity within the energy market. This convergence of digital and energy infrastructure heightens the importance of securing industrial control systems, grid management technologies and cross-sector dependencies. Cybersecurity in this context becomes not merely an IT compliance function, but a prerequisite for safeguarding interconnected national infrastructure.

These structural dependencies materially affect investment and transactional activity. Cybersecurity due diligence has become a central component of Finnish M&A processes. Buyers assess regulatory compliance under NIS 2-derived obligations, incident history, governance maturity and supply chain exposure. Identified deficiencies may influence valuation, purchase price adjustments or post-closing remediation commitments. Representations and warranties relating to information security and data protection are negotiated with increasing specificity, and insurers providing warranty and indemnity coverage frequently scrutinise cyber risk management frameworks.

Carve-out transactions in particular raise complex questions regarding the separation of shared IT environments, data migration and transitional service arrangements. Where infrastructure assets such as data centres, telecommunications networks or managed security service providers are involved, transactions may attract heightened regulatory attention due to national security or critical infrastructure considerations.

In this environment, cybersecurity functions simultaneously as a compliance obligation, a resilience measure and a transaction variable. For organisations operating in Finland, global and regional dependencies – whether cloud-based, infrastructural or energy-linked – must be analysed not only from a technical perspective but also through the lenses of governance, regulatory exposure and strategic risk allocation.

Emerging Trends in Finland

Several distinct threat trends have gained prominence in Finland’s cyber landscape in recent years. These reflect both global dynamics and region-specific patterns.

Increasing ransomware sophistication

While ransomware remains a global concern, Finnish organisations have observed:

  • double and triple extortion tactics where attackers not only encrypt data but also threaten publication or denial of service impacts;
  • targeting of critical sectors, including healthcare, logistics and manufacturing; and
  • professionalisation of criminal networks with Ransomware as a Service (RaaS) models lowering the barrier to entry for sophisticated attacks.

Even when not state-sponsored, these campaigns may align with geopolitical interests indirectly by creating widespread disruption.

Blending of criminal and state-linked techniques

Attack groups are adopting tactics that blur the traditional lines between organised crime and state-linked operations. Examples include:

  • strategic exploitation of widely used software vulnerabilities;
  • use of social engineering that leverages publicly available information; and
  • targeting of critical supply chains rather than individual endpoints.

This convergence complicates detection and response, as indicators of compromise may not fit traditional threat classifications.

Elevated regulatory expectations

Finnish authorities are increasingly focused on demonstrable preparedness and maturity rather than checkbox compliance. Evidence of this trend includes:

  • incident reporting frameworks that emphasise timeliness and detail, rather than simple threshold triggers;
  • guidance that encourages sector-specific risk modelling, especially within critical infrastructure; and
  • public advisories and joint exercises that simulate real-world attack scenarios.

The practical impact is that organisations are expected to translate legal obligations into tangible processes, documentation and executive oversight.

Strategic integration of cyber resilience

Rather than being a standalone IT function, cybersecurity in Finland is being integrated into enterprise risk management and corporate governance routines. Boards and executives are increasingly involved in:

  • setting risk appetite statements;
  • approving resilience strategies; and
  • reviewing investment decisions tied to cyber risk mitigation.

This shift reflects a broader understanding that cyber resilience affects insurance, reputation, regulatory standing and long-term sustainability. Not all industries face the same threat or regulatory intensity, yet several sectors have seen notable shifts.

Practical Considerations for Businesses

Against this backdrop, organisations operating in Finland must approach cybersecurity as an enterprise-wide governance issue rather than a purely technical function. In the current regulatory and threat environment, resilience is contractual, organisational and strategic in nature, intersecting with compliance obligations, operational continuity and liability exposure.

Continuous risk evaluation is essential. Cyber risk is dynamic and influenced by technological developments and geopolitical factors that may heighten sector-specific vulnerabilities. Ongoing threat intelligence gathering, regular vulnerability assessments and penetration testing help identify weaknesses proactively. Scenario modelling and tabletop exercises further enable organisations to assess how cyber incidents would impact business continuity, crisis management and decision-making structures.

Effective incident detection and response capabilities are equally critical. Investment in monitoring tools and skilled personnel enhances early detection of anomalous activity, thereby limiting operational and reputational damage. Clear internal allocation of responsibilities, defined escalation paths, and integration of legal and communications functions into response planning are necessary to ensure coherent management of incidents and regulatory reporting. Engagement with competent authorities and sector peers may further support co-ordinated responses in high-impact situations.

Regulatory preparedness has assumed increased importance as European cybersecurity frameworks become fully operational in Finland. Supervisory expectations extend beyond formal compliance and require demonstrable effectiveness. Organisations should therefore maintain comprehensive documentation of risk management measures, ensure timely and accurate incident reporting mechanisms, and evidence board-level oversight and continuous review of cybersecurity practices.

Cyber risk also has significant contractual implications, particularly in ICT and outsourcing arrangements. In the Finnish market, unlimited liability often applies to breaches of confidentiality, raising the critical question of when a cybersecurity incident constitutes unauthorised disclosure triggering uncapped liability. The interaction between confidentiality, information security and data protection clauses must therefore be carefully structured, especially in ransomware scenarios involving data exfiltration. Without precise drafting, organisations may face materially higher exposure than anticipated.

Finally, resilience depends on third-party risk management and workforce awareness. Structured vendor due diligence, contractual cybersecurity safeguards and assessment of supply chain dependencies are essential to mitigating cascade effects. At the same time, targeted employee training and cross-functional crisis exercises reinforce organisational preparedness and clarify accountability.

In Finland’s evolving regulatory landscape, cybersecurity has become a core legal and governance consideration that permeates commercial risk allocation and strategic decision-making at board level.

Looking Ahead: Finland’s Cybersecurity Landscape

Finland’s digital ecosystem continues to evolve rapidly. For organisations operating in or into the Finnish market, cybersecurity must be assessed as a dynamic regulatory, geopolitical and transactional variable rather than a static compliance obligation. Key developments to monitor include:

  • the final designation of entities under the CER, clarifying which organisations will face enhanced resilience and continuity obligations as critical entities;
  • ongoing implementation of the CRA, and how product security requirements intersect with national supervisory expectations and market surveillance;
  • growing regulatory scrutiny, with authorities increasingly benchmarking sector preparedness, governance maturity and the quality and timeliness of incident reporting;
  • the integration of AI and automation in both defensive and offensive cyber operations – a trend expected to accelerate and to influence both risk exposure and regulatory responses; and
  • deepening cross-border co-operation and public-private partnerships, particularly within the EU and NATO frameworks, aimed at streamlining threat intelligence exchange and strengthening collective resilience.

An additional example of the expanding regulatory perimeter is the treatment of dual-use technologies. Certain cybersecurity tools – such as advanced encryption, intrusion software or surveillance-related technologies – may qualify as dual-use items under EU export control rules. For Finnish technology companies, this means that exporting such solutions outside the EU, or engaging in cross-border transactions involving sensitive technologies, can trigger licensing requirements and enhanced due diligence obligations. Cybersecurity strategy therefore increasingly intersects with export control and national security considerations.

To thrive in the Finnish jurisdiction, organisations will need to adopt forward-looking cybersecurity strategies that integrate regulatory compliance, export control awareness, business continuity planning and technological innovation. In an environment shaped by hybrid threats, infrastructure interdependencies and heightened supervisory oversight, cybersecurity is no longer confined to IT departments but is embedded in governance, capital allocation and international market access.

Conclusion

The Finnish cybersecurity landscape presents both significant challenges and strategic opportunities. While the regulatory environment is robust and evolving, emerging threats – including state-sponsored attacks, hybrid campaigns and sophisticated ransomware – have elevated expectations for proactive risk management. Increasingly, cybersecurity is not merely a defensive function but a core part of organisational strategy.

Organisations that demonstrate resilience through continuous risk evaluation, structured governance and adaptive operational practices will be best positioned to navigate Finland’s complex, interconnected and ever-shifting cyber environment.

Lieke Attorneys Ltd

Aleksanterinkatu 11
00100 Helsinki
Finland

+358 9 6844 410

+358 9 6844 4141

attorneys@lieke.com lieke.com
Author Business Card

Law and Practice

Authors



Lieke Attorneys Ltd is a Finnish law firm, established in 1989, with a focus on data and technology, dispute resolution, transactions, energy and construction. Its experienced experts assist clients with IT and digitalisation projects, data privacy and data protection, data sharing and processing, document disclosure, cybersecurity, intellectual property, technology contracts and procurement, and other data and technology-related issues. Lieke provides clients with expert support in implementing the latest solutions, assessing regulatory compliance, managing risks and resolving disputes. In an ever-changing regulatory environment, Lieke’s focus is on providing expert and practical solutions, always considering the business needs of our clients. Lieke also advises on trade mark, design and copyright issues and related regulatory and registration processes, as well as employment invention matters.

Trends and Developments

Authors



Lieke Attorneys Ltd is a Finnish law firm, established in 1989, with a focus on data and technology, dispute resolution, transactions, energy and construction. Its experienced experts assist clients with IT and digitalisation projects, data privacy and data protection, data sharing and processing, document disclosure, cybersecurity, intellectual property, technology contracts and procurement, and other data and technology-related issues. Lieke provides clients with expert support in implementing the latest solutions, assessing regulatory compliance, managing risks and resolving disputes. In an ever-changing regulatory environment, Lieke’s focus is on providing expert and practical solutions, always considering the business needs of our clients. Lieke also advises on trade mark, design and copyright issues and related regulatory and registration processes, as well as employment invention matters.

Compare law and practice by selecting locations and topic(s)

{{searchBoxHeader}}

Select Topic(s)

loading ...
{{topic.title}}

Please select at least one chapter and one topic to use the compare functionality.