A Changing Cybersecurity Landscape in Finland
Historically, the Finnish regulatory framework for cybersecurity has been relatively fragmented, with separate specialised regulations for different industries and sectors. Cybersecurity matters were treated as sector-specific operating requirements, and were supervised independently by the relevant sector-specific authorities.
In 2024, the Finnish Cybersecurity Strategy was updated to better address technological advancements and shifts in the geopolitical landscape that cut across sectors more than ever before. According to the Cybersecurity Strategy, the current cybersecurity situation in Finland is relatively stable; however, given that Finnish society is almost entirely digitalised, cybersecurity requires constant attention, to ensure trust in the safety and reliability of digital services. The Cybersecurity Strategy recognises cybersecurity not only as a cornerstone of modern society but also as a vital matter of national security.
The Four Pillars of Cybersecurity Development
The Cybersecurity Strategy is built on four distinct pillars, each setting out sub-objectives defining the target state for national cybersecurity and guiding future legislation and other public sector activity.
Pillar I: competence, technology, and research, development and innovation
Under the first pillar, cybersecurity competence is regarded as a fundamental civic skill. A high level of competence will require strengthening cybersecurity education in schools, universities, non-governmental organisations and workplaces. Furthermore, the objectives under the first pillar include promoting business competitiveness in the cybersecurity sector and Finland’s role as a leader in the implementation of emerging and disruptive technologies.
Pillar II: preparedness
The second pillar emphasises cyber resilience and operational reliability across society. Under this pillar, public authorities and private sector organisations are expected to define and apply cybersecurity requirements to the information systems they use, procure and maintain, and to allocate sufficient resources to meet these requirements and develop preparedness capabilities. The pillar also encourages collaboration and dialogue with the EU and NATO to promote preparedness and share best practices.
Pillar III: co-operation
The third pillar further encourages international collaboration and dialogue. In addition, the strategy emphasises well-co-ordinated and smooth co-operation between authorities based on shared situational awareness, as well as the use of centralised cybersecurity services.
Pillar IV: response and countermeasures
The final pillar aims to ensure timely responses to cyber threats and to safeguard national sovereignty. Clearly defined roles and responsibilities for different actors in both the public and private sectors are considered essential prerequisites for effective cyber resilience, and cybersecurity is recognised as a vital part of national defence.
Towards a Unified Cybersecurity Approach
Overall, the current regulatory strategy for cybersecurity in Finland emphasises the importance of a unified approach to cybersecurity, recognising that the subject matter concerns all areas of society. At the international level, Finland strives to be a strong cybersecurity ally within the EU and NATO, actively participating in discussions on future developments.
The cybersecurity legislation in Finland is largely EU-based, but many details are regulated at the national level. EU regulations are directly applicable in Finland and require very limited national implementation legislation, if any. EU directives are not directly applicable; instead, they oblige the Finnish legislature to enact national provisions that reflect the requirements of the directives.
The principal cybersecurity laws applicable in Finland are listed below. The legislation is divided into three categories:
Cybersecurity
The NIS 2 Directive (Directive (EU) 2022/2555) has been implemented in national legislation as described in this section.
The Cybersecurity Act (124/2025, Kyberturvallisuuslaki) implements the NIS 2 Directive, imposing uniform cybersecurity requirements for actors operating in essential sectors, and setting out minimum cybersecurity requirements for entities within its scope. However, more specific requirements imposed by any other regulation may be applied in addition to or instead of the Cybersecurity Act – for example, see below regarding the requirements for public administration. The Act also established an institutional framework for supervision and national cyber resilience.
The Act on Information Management in Public Administration (906/2019, Laki julkisen hallinnon tiedonhallinnasta) governs, among other topics, data security, interfaces and interoperability in public administration. Chapter 4a of the Act implements the requirements for public administration set out in the NIS 2 Directive. For public administration entities, this provision applies instead of the national Cybersecurity Act.
The Digital Operational Resiliency Act (Regulation (EU) 2022/2554) (DORA) creates a uniform regulatory framework for reducing cybersecurity risks within financial entities and related ICT suppliers. DORA applies primarily to financial sector entities as lex specialis instead of the national Cybersecurity Act.
The EU Cybersecurity Act (Regulation (EU) 2019/881) (CSA) established the EU Agency for Cybersecurity (ENISA) and the EU-wide certification system to harmonise cybersecurity requirements, increase safety and reduce parallel certification requirements for ICT products, services and processes.
The Cyber Resilience Act (Regulation (EU) 2024/2847) (CRA) regulates extensively all connectible hardware and software, and introduces mandatory cybersecurity requirements for manufacturers and developers. One way to prove a product’s compliance with the CRA can be a certification under the CSA.
The Network Code On Cybersecurity (Regulation (EU) 2024/1366) (NCCS) complements Regulation (EU) 2019/943 of the European Parliament and of the Council of 5 June 2019 on the internal market for electricity, setting out rules on cybersecurity risk management, common minimum requirements, planning, monitoring, reporting and crisis management for, inter alia, certain energy sector actors and critical ICT providers in the energy sector.
The Cyber Solidarity Act (Regulation (EU) 2025/38) sets up a framework for EU-level collaboration, to allow EU member states to better defend themselves against large-scale cyber-attacks.
Cybersecurity and Data Protection
The General Data Protection Regulation (Regulation (EU) 2016/679) (GDPR) sets out extensive rules for the processing of personal data in organisations.
The Data Protection Act (1050/2018, Tietosuojalaki) complements the GDPR, as do special data protection provisions in many other acts. These instruments specify and ensure the effective implementation of the GDPR.
The Act on the Processing of Client Data in Healthcare and Social Welfare (703/2023, Laki sosiaali- ja terveydenhuollon asiakastietojen käsittelystä) (the “Client Data Act”) applies to data processing and information systems in the healthcare and social welfare sectors, supplementing the requirements set out in the Finnish Data Protection Act and the GDPR.
The Act on the Secondary Use of Health and Social Data (552/2019, Laki sosiaali- ja terveystietojen toissijaisesta käytöstä) facilitates the effective and safe processing of, and access to, personal social and health data for steering, supervision, research, statistics and development in the health and social sectors.
The Act on Electronic Communications Services (917/2014, Laki sähköisen viestinnän palveluista) applies to electronic communications service providers. It ensures the quality, safety and reliability of communication networks and services, as well as promoting fair competition and confidentiality and privacy in electronic communication.
Other Relevant Legislation Applicable in Finland
The Artificial Intelligence Act) (Regulation (EU) 2024/1689) (the “AI Act”) creates a unified EU framework with risk-based classifications to ensure the safety and trustworthiness of AI systems.
The CER Directive (Directive (EU) 2022/2557) has been implemented in national legislation, as described below.
The Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience (310/2025, Laki yhteiskunnan kriittisen infrastruktuurin suojaamisesta ja häiriönsietokyvyn parantamisesta) implements the CER Directive. The Act strengthens societal crisis resilience and national safety by ensuring the uninterrupted functioning of the most essential services. Entities considered critical actors under this Act are automatically subject to the Cybersecurity Act. The Act extends risk management obligations beyond information and communication networks to also cover the physical environment relating to critical infrastructure.
The Criminal Code (39/1889, Rikoslaki) contains penal provisions concerning cybercrimes, including, for example, Chapter 38 on data and communications offences and Chapter 35, Sections 3a–3c on criminal damage to data.
The eIDAS Regulation (Regulation (EU) No 910/2014) establishes the regulatory framework for electronic identification and trust services within the EU. The regulation ensures secure electronic transactions across member states and sets standards for electronic signatures and other trust services.
In summary, the Cybersecurity Act sets out minimum cybersecurity requirements, but more specific requirements imposed by other regulations may be applied in addition to or instead of the Cybersecurity Act. Chapter 4a of the Act on Information Management in Public Administration implements NIS 2 directive requirements for public administration entities; for such entities, this provision applies instead of the national Cybersecurity Act. DORA applies primarily to financial sector entities instead of the national Cybersecurity Act, creating a sector-specific regulatory framework. The GDPR, Data Protection Act and cybersecurity legislation overlap particularly regarding data security breaches. Criminal law provisions, particularly in the Criminal Code, complement cybersecurity regulation by establishing criminal liability for cybercrimes such as data breaches, unauthorised access to information systems, and disruption of information systems.
The competent authorities enforcing cybersecurity legislation are quite fragmented. The authorities are outlined below, grouped by the statutes or topics they enforce; certain authorities with unique mandates are presented separately.
The regulation on cybersecurity for critical infrastructure is primarily set out in the Cybersecurity Act (124/2025), which applies to entities considered important or essential across various sectors. Most of the obligations set out in the Act apply to both important and essential entities, with the distinction relating predominantly to the supervisory measures available to the authorities and the severity of applicable sanctions.
Most small and micro-enterprises (maximum turnover of EUR10 million and fewer than 50 employees) are excluded from the scope of the Cybersecurity Act. However, if an entity has partner enterprises or linked enterprises, as defined in Commission Recommendation 2003/361/EC, said entity may fall within the scope of the Cybersecurity Act even if its individual turnover and personnel numbers are below the applicable thresholds.
Certain entities are subject to the requirements of the Cybersecurity Act regardless of their size, including:
For these so-called “CER-critical entities”, the Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience is applied in parallel to the Cybersecurity Act. It applies to entities that are considered critical to society due to, for example, the crucial nature of their services for maintaining vital societal functions or their role in operating critical infrastructure in Finland, or a significant risk of adverse effects on the provision of critical services if they were to be subject to an incident. However, entities do not need to make this assessment themselves; rather, the competent authorities make this designation and are required to do so by 17 July 2026.
In addition, the Cybersecurity Act applies to an entity regardless of its size if it carries out activities referred to in Annex I or II, or if it is an entity referred to in those Annexes, and if:
According to the Cybersecurity Act, more detailed guidelines on the designation of critical entities can be issued in secondary legislation (a Government Decree). At the time of writing, no such decree has been issued, and therefore the interpretation of the criteria for size-independent critical entities remains uncertain.
Activities in the areas of national or public security, defence or law enforcement, including the prevention, investigation, detection and prosecution of criminal offences, are excluded from the scope of the Cybersecurity Act.
Instead of the Cybersecurity Act, Chapter 4a of the Act on Information Management in Public Administration (906/2019) applies to most public authorities. However, certain entities fall largely outside the scope of cybersecurity regulation, including courts, universities, organs connected to the Parliament, the Office of the President of the Republic and various authorities involved in defence or the criminal justice system.
Sectors in Scope of the Cybersecurity Act
The sectors within the scope of the Cybersecurity Act and the respective sector-specific competent authorities are listed below.
Highly critical sectors (Annex I to the Cybersecurity Act)
The following sectors are deemed to be highly critical, and are subject to the oversight of the listed authority:
(Other) critical sectors (Annex II to the Cybersecurity Act)
The following sectors are also deemed to be critical, subject to the oversight of the listed authority:
The main responsibilities set out for important and essential entities under the Cybersecurity Act and for public administration falling within the scope of Chapter 4a of the Act on Information Management in Public Administration centre on risk management to prevent or minimise the impact of incidents on operations, operational continuity, service recipients and other services. Generally, entities and authorities are required to identify, assess and manage risks to the security of the communications networks and IT systems that they use. The risk management measures must be up-to-date, appropriate and sufficient in relation to the risks and the significance of the network or system to the operations and services of the entity or authority.
The Cybersecurity Act imposes the following obligations on entities within its scope.
Risk Management Obligations
Entities are required to implement an up-to-date cybersecurity risk management operating model to protect their communications networks and IT systems against incidents and to mitigate their potential impacts. The risk management operating model must take all relevant risk factors into account and define the objectives, procedures and responsibilities of cybersecurity risk management, as well as the risk management measures.
The Cybersecurity Act and Chapter 4a of the Act on Information Management in Public Administration include a 12-point list of factors that must, at a minimum, be addressed in the risk management operating model and the risk management measures. The risk management measures may be technical, operational or organisational, but they must be proportionate to the scope of the operations, the expected impacts of an incident, the risk susceptibility of the networks and systems, the likelihood and severity of incidents, and the costs of the measures and their technical feasibility.
Responsibility for the implementation and supervision of risk management under the Cybersecurity Act is imposed on the top management of important or essential entities (the board of directors, the supervisory board, the managing director and their respective deputies). The competent authorities may restrict individuals from acting in the top management of essential entities for up to five years if they fail to discharge this responsibility. However, this restriction does not apply to partnerships.
Complying with the requirements of the Cybersecurity Act largely also ensures compliance with the cybersecurity requirements set out for critical entities under the Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience. In addition to the cybersecurity requirements, the latter Act imposes numerous other requirements to ensure resilience against other threats, such as natural disasters, large-scale accidents and public health crises.
The Cybersecurity Act and Chapter 4a of the Act on Information Management in Public Administration impose similar incident response and notification obligations. An initial notification of a significant incident must be submitted to the competent authority within 24 hours of becoming aware of the incident, and a follow-up notification within 72 hours. An incident is considered significant if it has caused or is capable of causing either severe operational disruption to services or financial loss for the entity concerned, or considerable material or non-material damage to other natural or legal persons.
The initial notification must include:
The follow-up notification must include an assessment of the nature, severity and impacts of the incident, indicators of compromise, where available, and any updates to the information provided in the initial notification.
Within one month of the follow-up notification, a final report detailing the incident must be submitted to the competent authority. This must include:
If the incident is still ongoing when the final report should be submitted, or at the request of the competent authority, an interim report must be submitted with relevant status updates and progress on handling the incident.
In addition to the notification obligations vis-à-vis the competent authorities, the recipients of the service must be notified of the significant incident if it is likely to hinder delivery of the services. The affected recipients of the services must also be notified of any significant cyber threat and mitigation measures.
The competent authority forwards the incident notifications and reports it has received to the CSIRT operating under Traficom. The affected entity or authority may request guidance and operational advice on mitigation measures from the CSIRT.
The competent authority itself is subject to separate notification obligations arising from incident reports, depending on the nature of the incident. These obligations include, for example, an obligation to notify the Data Protection Ombudsman where the incident involves a personal data breach. Where a significant incident notification is submitted by a critical entity under the Act on the Protection of Infrastructure Critical to Society and Improvement of Resilience, the receiving authority must forward it to the competent authority under that Act, which is, however, largely the same as under the Cybersecurity Act.
The NCSC-FI serves as the single point of contact in Finland facilitating cross-border co-operation and co-ordination between competent authorities in different EU member states. It also submits regular summary reports on significant incidents, cyber threats and near misses to ENISA.
It should also be noted that, where an incident occurs but is not significant, a voluntary notification may be submitted to the competent authorities. In such cases, the deadlines prescribed by the Cybersecurity Act do not apply. Voluntary notifications may also be submitted by entities that are not subject to the Cybersecurity Act.
Traficom provides support, guidance and supervision on information security issues and the implementation of privacy protection in electronic communications. It also maintains national cybersecurity situational awareness. The overall objective of the activities of the NCSC-FI is to promote and ensure the information security of information systems and data communication arrangements.
The Finnish national CSIRT unit also operates under the NCSC-FI. The responsibilities of the CSIRT are defined in the Cybersecurity Act and include monitoring and analysing cyber threats and vulnerabilities, providing guidance and recommendations, and supporting the maintenance of national cybersecurity situational awareness.
The CSIRT may conduct proactive vulnerability scans of publicly available networks and IT systems to detect vulnerable and unsafely configured networks and IT systems. Furthermore, entities can request the CSIRT to conduct a targeted scan of their networks or IT systems. Methods permitted in targeted scans are subject to considerably fewer restrictions than in proactive scans.
The CSIRT can facilitate a voluntary exchange of cybersecurity information between itself and any entities. Participating entities can share relevant information considered confidential under the Act on Electronic Communications Services. The CSIRT also co-ordinates the disclosure of vulnerabilities by receiving notifications of vulnerabilities, contacting entities affected by vulnerabilities and co-ordinating the management of vulnerabilities affecting multiple entities. It also reports, and advises entities on reporting, vulnerabilities to the European vulnerability database.
DORA is a directly applicable EU regulation that also applies in Finland. The financial sector operational resilience legislation applicable in Finland is largely consolidated under DORA. The scope of DORA encompasses a comprehensive list of 21 categories of entities in the financial sector, including third-party ICT service providers designated as critical. In Finland, only pension insurance companies are excluded from the scope of DORA, and micro enterprises are exempt from many of its requirements. For the most part, DORA applies uniformly to all financial institutions providing services in the EU. DORA does not apply directly to ICT service providers other than those designated as critical. Instead, financial entities are responsible for ensuring that the ICT service providers and systems they use comply with the requirements of DORA.
The definition of an ICT service provider in DORA is broad and encompasses all entities and other undertakings providing any digital and data services to financial entities through ICT systems. It includes services like cloud storage and software development, as well as hardware services such as the provision of firmware updates.
The contractual requirements in DORA include detailed lists of mandatory contractual elements that must be included in all ICT service contracts and in contracts for ICT services supporting critical or important functions. Required elements include, for example:
Contracts must clearly allocate the rights and obligations of each party, and these must be documented in one written document. More extensive requirements on contractual provisions apply to contractual arrangements concerning ICT services supporting critical or important functions. These include, for example, precise quantitative and qualitative performance targets within the agreed service levels and exit strategies.
The obligations imposed by DORA are subject to the proportionality principle. Financial entities’ size and risk profile, as well as the nature, scale and complexity of their operations, are considered when determining how certain rules in DORA are applied.
DORA and the Commission Delegated Regulation (EU) 2024/1774 supplementing DORA include detailed rules on ICT risk management. The regulation requires financial entities to, inter alia, ensure the adequacy of ICT systems, identify ICT dependencies, implement an ICT business continuity policy and train their staff. The management bodies of financial entities are ultimately responsible for the implementation of appropriate ICT risk management frameworks.
Financial entities are required to implement an ICT-related incident management process to detect, manage and notify ICT incidents. They are also required to classify incidents and cyber threats in accordance with the criteria set out in DORA, taking into consideration the severity, extent and types of impacts.
DORA emphasises the obligation of financial entities to monitor and manage potential risks arising from ICT services provided by third parties. Among other requirements, financial entities must report to the competent authority at least annually on the number of arrangements concerning ICT services, and must submit, upon request, either the full register of information or the relevant parts thereof. In addition, financial entities must have systematic processes in place for the selection and assessment of ICT service providers. This includes a structured assessment of the content of contractual arrangements, an evaluation of whether the supervisory conditions for contracting are met, and an assessment of whether the ICT concentration risk is identified.
Incidents classified as major must be reported to the Finnish Financial Supervisory Authority within four hours of classification and within 24 hours of becoming aware of the incident. Within 72 hours of the initial report, an intermediate report must be submitted, which must be updated in the event of status changes or upon request by the authority. Within one month of the intermediate report, a final report must be submitted, including root cause analysis, resolution details and impact assessment.
A special oversight framework applies to ICT service providers designated as critical by the European Supervisory Authorities. This designation takes into account, for example, the number and systemic importance of entities relying on the services, the substitutability of the services and the potential impacts of a failure in providing said services.
One of the European Supervisory Authorities is appointed as Lead Overseer for each critical ICT service provider, to assess its risk management measures. The Lead Overseer has broad powers to access information and carry out general investigations and inspections. The Lead Overseer’s powers extend to ICT service providers established outside the EU that provide services to financial entities within the EU. However, the powers outside the EU are subject to additional restrictions.
If a critical ICT service provider does not comply with requests of the Lead Overseer within 30 calendar days, it may be subject to a periodic penalty payment that accrues daily. The penalty payment may amount to up to 1% of the average daily worldwide turnover of the critical ICT service provider in the preceding business year, and may be imposed for a maximum period of six months.
In addition to the EU-level enforcement against critical ICT service providers, all ICT service providers are subject to an obligation to provide information requested by the Financial Supervisory Authority under the Act on the Financial Supervisory Authority (878/2008, Laki Finanssivalvonnasta). If an ICT service provider does not comply with the obligation, the Financial Supervisory Authority may impose a penalty payment of between EUR1,000 and EUR100,000. The Financial Supervisory Authority has published a comprehensive guide on the basis of which the amount of penalty payments is determined. If the non-compliance is particularly reprehensible, an administrative fine of up to 10% of the annual turnover of the ICT service provider may be imposed.
DORA does not include comprehensive cross-border data transfer regulation comparable to the GDPR. However, DORA requires financial entities to include specific ICT-related provisions in their third-party ICT service contracts, including the locations of data processing and service provision, and notification obligations when planning to change these locations. Financial entities must also implement exit strategies for critical ICT services, notify competent authorities of planned contractual arrangements for critical or important functions, and assess concentration risks arising from using the same or closely related service providers. Extensive regulation on transfers of personal data is included in the GDPR.
DORA requires entities identified by the Financial Supervisory Authority to carry out threat-led penetration testing (TLPT) on live production systems at least every three years. The Financial Supervisory Authority identifies the entities based on impact-related factors, possible financial stability concerns and ICT risk profile. Entities determine the scope of TLPT independently, subject to validation by the Financial Supervisory Authority. ICT service providers may also be included in the scope of TLPT.
TLPT may be conducted by either external or internal testers; however, an external tester must be engaged at least once every three years. Testers must satisfy requirements relating to independence, competence, certification, and risk management and mitigation. Compliance with the remaining testing requirements is achieved by adhering to the TIBER-FI framework.
The main source of cyber-resilience regulation in Finland is Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168/2013 and (EU) 2019/1020 and Directive (EU) 2020/1828 (the Cyber Resilience Act, or CRA). The CRA is a horizontal, harmonised product safety regulation, and the essential cybersecurity requirements under it are indicated by a product’s CE marking. In addition, Commission Implementing Regulation (EU) 2025/2392 further specifies the technical descriptions of important and critical products with digital elements under the CRA. The requirements under the CRA do not preclude the application of other requirements that may apply to the same product pursuant to other EU product regulations. In Finland, national legislation implementing the CRA will enter into force at a later date.
The CRA entered into force in 2024, and the application of its obligations starts in three steps between 2026 and 2028. The scope of the CRA is broad; as a general rule, it includes all devices and software with digital elements and expected use involving direct or indirect connection to a network or other device. Pure SaaS solutions that are not delivered together with a product with digital elements are generally excluded from the scope of the CRA. However, remote data processing solutions necessary for a product with digital elements to perform its functions are considered part of that product and, accordingly, fall within the scope of the CRA. An example of such products is smart home devices.
The CRA imposes extensive obligations on manufacturers, importers and distributors of products with digital elements. Products must meet essential cybersecurity requirements contained in Annex I of the CRA, covering product properties (eg, security by default, access control, data protection) and vulnerability handling processes. Manufacturers must conduct cybersecurity risk assessments, prepare technical documentation and provide user instructions. Vulnerabilities must be remediated without delay through security updates distributed securely and free of charge during the support period, which must reflect the product’s expected lifetime (minimum five years unless the expected lifetime is lower). The reporting timelines under the CRA correspond to those prescribed by the Cybersecurity Act and DORA, requiring notifications within 24 hours, 72 hours and one month, respectively (see 2.3 Incident Response and Notification Obligations and 3.3 Key Operational Resilience Obligations). Before market placement, conformity assessment is required, followed by EU declaration of conformity and CE marking.
Prior to placing products on the EU market, importers are required to verify that manufacturers have fulfilled their obligations, including conformity assessment, preparation of technical documentation and affixing of the CE marking, and must provide their own contact details on the product. Distributors must verify that the CE marking has been affixed and that manufacturers and importers have met their obligations concerning identification, contact information, user instructions and support period information before making products available on the market. Both importers and distributors are required to notify manufacturers of any discovered vulnerabilities without undue delay and, where a product poses a significant cybersecurity risk, to immediately inform the relevant market surveillance authorities, providing detailed information on the non-compliance identified and any corrective measures taken.
The market surveillance authority in Finland for products within the scope of the CRA is expected to be Traficom. As an initial enforcement measure, the relevant economic operator is required to bring the non-compliance to an end by, for example, bringing the product into compliance, withdrawing or recalling the product, or arranging for its destruction. This requirement may be enforced by means of a penalty payment. If the operator fails to comply with the requirement, the authority may itself recall or restrict the availability of the product on the market. In addition, the CRA sets out administrative fines for non-compliance, ranging up to:
Finland is part of the EU’s cybersecurity certification framework established under Regulation (EU) 2019/881 (the EU Cybersecurity Act, or CSA). The National Cybersecurity Certification Authority (NCCA) in Finland is Traficom, which is responsible for the accreditation of Conformity Assessment Bodies (CABs) that can act as certifiers delivering certificates or as evaluators auditing and testing.
The CSA establishes three assurance levels: basic, substantial and high. The basic level provides assurance against basic risks; the substantial level addresses significant risks; and the high level is intended for situations involving the highest risks, requiring the most stringent evaluation methods, such as penetration testing.
Certification under the CSA is generally voluntary; however, certificates are commonly used as requirements for certain critical products, and certification under the CSA is a recognised means of demonstrating compliance. To date, the only adopted European cybersecurity certification scheme is the EUCC (European Cybersecurity Certification Scheme on Common Criteria), which primarily targets ICT products. However, ENISA is currently developing additional certification schemes covering cloud services, 5G networks, digital identity wallets and managed security devices. Should the European Commission exercise its power to mandate the use of European cybersecurity certifications for products listed in Annex IV of the Cyber Resilience Act, and if such certifications become more widely available, the CSA certification framework would constitute the primary means of demonstrating the conformity of those products with the applicable cybersecurity requirements and of ensuring their access to the EU internal market.
In the context of public procurement, contracting authorities and entities may require certified ICT products, services or processes as part of their procurement procedures. The NIS 2 Directive further permits (but does not oblige) member states and the Commission to impose such requirements on entities falling within its scope.
Regulatory Framework for Data Protection
The main source of personal data protection legislation in Finland is the GDPR. This is supplemented by the Finnish Data Protection Act (1050/2018, Tietosuojalaki), the Act on Electronic Communications Services (917/2014, Laki sähköisen viestinnän palveluista) and the Act on the Protection of Privacy in Working Life (759/2004, Laki yksityisyyden suojasta työelämässä).
Cybersecurity Obligations
The GDPR includes three types of cybersecurity-related obligations:
Security of personal data processing
The GDPR includes multiple requirements for ensuring the security of personal data processing. The central obligation is ensuring the integrity and confidentiality of processing. Further specific obligations include risk management, data protection by design and default, and requirements for security of processing – namely, Articles 5(1)(f), 25, 28 32, 33, 34 and 35. In particular, the GDPR requires controllers and processors to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including, where appropriate:
Notification obligations
The GDPR requires controllers to notify the competent authority (the Data Protection Ombudsman in Finland) and data subjects of personal data breaches. A personal data breach is defined as a breach of security leading to the accidental or unlawful destruction, loss, alteration or unauthorised disclosure of, or access to, personal data.
The notification to the Data Protection Ombudsman must be made within 72 hours after becoming aware of the breach, unless the controller is able to demonstrate that the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. The notification must include at least:
A breach must also be communicated to data subjects without undue delay if it is likely to result in a high risk to the rights and freedoms of natural persons, and if none of the exceptions under Article 34(3) of the GDPR apply. The communication to data subjects must describe the nature of the breach in clear and plain language, and contain at least the contact details of the data protection officer, a description of the likely consequences and the measures taken or proposed to address the breach.
Principles of information security-based processing of personal data
Certain GDPR obligations and requirements can affect how cybersecurity risk management can be implemented. Under the GDPR, processing personal data is allowed only where a legal basis for such processing exists. The most relevant of these for cybersecurity risk management are compliance with legal obligations, public interest and legitimate interest. Furthermore, the GDPR includes requirements, for example, to use personal data only for the purpose for which it was collected, to minimise the amount of personal data collected and the time it is retained, and to ensure the integrity and confidentiality of personal data processed.
Legislative Framework
AI systems and solutions are regulated in Finland by Regulation (EU) 2024/1689 of the European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC) No 300/2008, (EU) No 167/2013, (EU) No 168/2013, (EU) 2018/858, (EU) 2018/1139 and (EU) 2019/2144 and Directives 2014/90/EU, (EU) 2016/797 and (EU) 2020/1828 (the Artificial Intelligence Act, or AI Act). The AI Act entered into force in 2024, and its application starts gradually, with final obligations applicable from August 2027.
Risk Management Framework
In line with the approach adopted in cybersecurity legislation, the AI Act applies a risk-based regulatory framework under which the obligations imposed increase in proportion to the level of risk associated with the AI system, as determined by reference to its intended purpose and functionalities. The AI Act requires high-risk AI systems to achieve an appropriate level of accuracy, robustness and cybersecurity, and to be designed and developed in a manner that ensures resilience against attempts by unauthorised third parties to exploit system vulnerabilities. In addition to the cybersecurity threats applicable to most ICT systems, the AI Act requires AI-specific vulnerabilities to be taken into account, including data and model poisoning, model evasion, confidentiality attacks and model flaws.
Incident Reporting
The AI Act includes an incident reporting scheme that requires providers of high-risk AI systems to report serious incidents to the market surveillance authority. The competent market surveillance authority is determined based on the sector of the product into which the AI system is incorporated. The report must be submitted no later than 15 days after the provider has become aware of the incident. However, the more serious the incident, the shorter the expected reporting timeframe.
Supervision and Enforcement
Compliance with the AI Act is enforced through the EU market surveillance framework established under Regulation (EU) 2019/1020, as supplemented by the enforcement provisions of the AI Act. In addition, administrative fines of up to EUR15 million or up to 3% of total worldwide annual turnover may be imposed, or, in the case of prohibited AI practices, up to EUR35 million or up to 7% of total worldwide annual turnover, whichever is higher. Furthermore, the supply of incorrect, incomplete or misleading information is subject to administrative fines of up to EUR7.5 million or up to 1% of total worldwide annual turnover, whichever is higher.
Interaction With General Cybersecurity and Data Protection Obligations
The AI Act operates alongside and complements other applicable EU regulations. Where an AI system is embedded in a product with digital elements, the cybersecurity requirements of the CRA apply in parallel, and compliance with the essential cybersecurity requirements of the CRA is deemed to satisfy the cybersecurity requirements for high-risk AI systems under the AI Act. Similarly, to the extent that an AI system processes personal data, the obligations under the GDPR, including requirements for data protection by design, apply concurrently with the obligations under the AI Act.
Legislative Framework
In addition to the general cybersecurity regulatory framework (such as the Cybersecurity Act), the healthcare sector is subject to sector-specific cybersecurity obligations and requirements. The Client Data Act applies to data processing and information systems in healthcare and social welfare sectors, supplementing requirements under the Finnish Data Protection Act and the GDPR. The Act on the Secondary Use of Health and Social Data (552/2019, Laki sosiaali- ja terveystietojen toissijaisesta käytöstä) facilitates effective and safe processing and access to personal social and health data for steering, supervision, research, statistics and development in health and social sectors, whilst safeguarding individuals’ rights and freedoms in personal data processing. The Act on Information Management in Public Administration (906/2019, Laki julkisen hallinnon tiedonhallinnasta) implements cybersecurity requirements of the NIS 2 Directive for public administration entities, including public healthcare entities.
Cybersecurity Obligations Under Sector-Specific Legislation
The sector-specific legislative instruments described above impose cybersecurity obligations on healthcare and social welfare entities. Under the Client Data Act, the integrity, immutability and indisputability of client and patient data must be secured when processing, transferring or storing data. Any information security breaches or disruptions affecting national information system services must be reported to the NCSC-FI of Traficom. Public agencies, pharmacies and ICT service providers subject to the Client Data Act are required to have an information security policy. The Act on the Secondary Use of Health and Social Data imposes obligations to ensure the security and integrity of health and social data processed for secondary purposes, including risk management, access control and active monitoring.
Applicability of the Cybersecurity Act
The Cybersecurity Act applies to any healthcare organisation that meets the criteria for entities set out in the Act (see 2. Critical Infrastructure Cybersecurity Regulation regarding the obligations and requirements under the Cybersecurity Act). Regulation (EU) 2017/745 on medical devices (MDR) and Regulation (EU) 2017/746 on in vitro diagnostic medical devices (IVDR) impose cybersecurity requirements on the manufacturers of medical devices. Pursuant to Article 2(2) of the CRA, products falling within the scope of the MDR and the IVDR are excluded from the scope of the CRA and are accordingly not subject to the cybersecurity requirements set out therein.
Incident Reporting in the Healthcare Sector
Healthcare entities within the scope of the Cybersecurity Act are subject to the incident reporting obligations outlined in 2.3 Incident Response and Notification Obligations. In addition, under the Client Data Act, information security breaches and disruptions affecting national information system services must be reported to the NCSC-FI. Where a significant incident also constitutes a personal data breach within the meaning of the GDPR, parallel notification obligations to the Data Protection Ombudsman apply.
Aleksanterinkatu 11
00100 Helsinki
Finland
+358 9 6844 410
+358 9 6844 4141
attorneys@lieke.com lieke.com
Introduction
In today’s digital economy, cybersecurity has rapidly moved from being an IT specialist concern to a core business priority. For organisations operating in Finland, this shift reflects a combination of technological transformation, heightened regulatory expectations and a fast-evolving threat landscape. Traditional cyber risks have been compounded by geopolitical tensions, hybrid threats and increasingly sophisticated malware and ransomware campaigns. These dynamics ripple across sectors, and demand that boards, executives and risk owners understand not only the legal obligations but also the strategic and operational implications.
Finland’s cybersecurity ecosystem reflects both mature preparedness and growing challenges. Finland was one of the first EU member states to implement NIS 2, enshrined in its national Cybersecurity Act in spring 2025. At the same time, businesses face uncertainty about how future designations and national implementations – including those under the Critical Entities Resilience Directive (CER) and the Cyber Resilience Act (CRA) – will affect them. National authorities are increasingly visible in shaping expectations, providing guidance and facilitating co-operation between government and private sector actors.
Cybersecurity is not only a regulatory or operational issue in Finland – it is explicitly framed as a matter of national security and societal resilience at the highest political level. In the current Government Programme of the Finnish Government, cybersecurity and preparedness are embedded in broader objectives concerning comprehensive security, the resilience of critical infrastructure, and strengthening national defence and internal security. The programme emphasises improving cyber situational awareness, safeguarding critical digital infrastructure, reinforcing public-private co-operation, and ensuring that authorities have sufficient powers and resources to prevent and respond to cyber incidents.
In addition, cybersecurity priorities are reflected in Finland’s long-term strategic planning documents, including the national cybersecurity strategy adopted by the Finnish Government and co-ordinated by the Ministry of Transport and Communications. The strategy highlights securing digital public services, protecting supply chains, enhancing incident response capabilities, and promoting cybersecurity competence and workforce development. These objectives align closely with EU-level regulatory reforms and demonstrate that cybersecurity is treated as a cross-sectoral policy priority rather than a narrow technical domain.
Operationally, the role of national authorities has expanded. The Finnish Transport and Communications Agency, Traficom, through its National Cyber Security Centre (NCSC-FI), plays a central role in threat monitoring, incident response co-ordination, and guidance under NIS 2. Other sectoral regulators, as well as security authorities, contribute to supervisory and resilience-building efforts. The Government Programme explicitly supports strengthening these authorities’ mandates and improving information sharing between public and private actors.
This high-level political prioritisation has practical consequences for organisations. Cybersecurity is increasingly integrated into risk management, business continuity planning, procurement requirements and board-level governance. Companies operating in critical sectors – such as energy, transport, finance, healthcare, digital infrastructure and public administration – must now navigate not only technical controls but also reporting obligations, supply chain security expectations and enhanced supervisory oversight. The clear message from the Finnish policy framework is that cybersecurity is a cornerstone of economic stability, national security and trust in digital services.
Regulatory Context: High-Level Overview
Finland’s early adoption of NIS 2 signals strong national commitment to enhancing digital resilience, particularly for providers of essential services and digital infrastructure. For organisations with operations or digital dependencies in Finland, this means an earlier transition into the new EU cybersecurity baseline than in many other member states.
Beyond NIS 2, Finland is actively aligning with several major EU cybersecurity and resilience initiatives, each at varying stages of national implementation, as follows.
Alongside legislative instruments, the National Cyber Security Centre, Finland (NCSC FI) plays an integral role in threat monitoring, incident response co-ordination and stakeholder engagement. NCSC FI’s regular advisories and threat assessments reinforce expectations that organisations understand, prepare for and mitigate risks beyond basic compliance.
While Finland’s legal frameworks already establish obligations and a certain level of clarity regarding requirements, businesses should anticipate ongoing developments, particularly as scope definitions are refined and implementation timelines are clarified.
Geopolitical Drivers of Cyber Risk
Finland’s cybersecurity landscape cannot be separated from its geopolitical context. Proximity to global flashpoints and active state-level cyber actors elevates the risk profile for organisations across sectors. The following three interconnected geopolitical drivers are particularly relevant.
State-sponsored cyber operations
Finland’s highly digitalised public administration, advanced industrial base and strategic position at the EU’s external border materially influence its cyber risk profile. For legal practitioners advising boards and executive management, it is essential to recognise that cyber risk in Finland goes significantly further than sole opportunistic criminality; it increasingly intersects with national security considerations, sanctions compliance, supply chain integrity and regulatory oversight.
From a risk advisory perspective, Finland’s advanced digital infrastructure, open economy and geopolitical location render it an attractive target for state-sponsored and state-aligned cyber activity. Finnish authorities, including the NCSC-FI operating under Traficom, have repeatedly highlighted the presence of advanced persistent threat (APT) activity directed at public administration, critical infrastructure and high-technology sectors.
Such campaigns are typically characterised by:
Unlike opportunistic cybercrime, state-linked operations are persistent, adaptive and strategically motivated. From a governance standpoint, this requires organisations to move beyond traditional perimeter-based security models and to adopt continuous monitoring, zero-trust architectures and board-level cyber risk oversight, aligned with enterprise risk management frameworks.
Hybrid threats and information operations
Modern cyber threats in Finland are not limited to purely technical intrusions. They increasingly form part of broader hybrid operations, combining cyber disruption with disinformation, social engineering, physical reconnaissance and influence campaigns. Finnish authorities have publicly emphasised that the threat environment must be assessed holistically, particularly in light of Finland’s NATO membership and its strategic geographic position.
From a legal risk perspective, these hybrid activities are designed not only to exploit technical vulnerabilities but also to:
Recent media reporting in Finland has highlighted incidents involving drones and unidentified third parties operating in or near security-sensitive areas, including critical infrastructure and restricted zones. While investigations and attributions are matters for the competent authorities, these cases illustrate the convergence between physical and digital risk domains. Drone overflights near energy facilities, ports or other strategic sites may serve reconnaissance purposes, test response protocols or form part of a broader intelligence-gathering effort that can subsequently support cyber intrusion or influence operations.
For organisations, this convergence has concrete compliance implications. The traditional separation between “cybersecurity” and “physical security” is increasingly artificial. Boards are expected to ensure that:
Campaigns targeting supply chains or public services may therefore pursue broader political or economic leverage rather than immediate financial gain. For example, disruption of logistics chains, telecommunications infrastructure or energy distribution – whether through cyber means, physical probing or co-ordinated narrative operations – can generate effects that extend well beyond the directly affected entity.
In the Finnish regulatory context, such hybrid risks intersect with obligations under the national Cybersecurity Act (implementing NIS 2), sector-specific resilience requirements and broader national security considerations. Authorities including Traficom and other security actors operating under the framework of the Finnish Government’s comprehensive security model increasingly emphasise cross-sector information sharing and preparedness for combined cyber-physical incidents.
For legal advisers, the practical takeaway is clear: modern cyber risk assessments in Finland must extend beyond technical controls and regulatory tick-box exercises. They must incorporate hybrid threat modelling, crisis communications planning, supply chain due diligence and board-level oversight capable of addressing incidents that simultaneously affect systems, facilities, personnel and public trust.
Global and regional dependencies
No organisation operates in isolation. Cloud platforms, third-party software providers and multinational service vendors create interconnected risk surfaces. An incident affecting a widely used service can rapidly cascade through domestic ecosystems. Past global supply chain compromises have demonstrated how vulnerabilities embedded in third-party code or infrastructure can be leveraged at scale, exposing otherwise well-managed organisations to systemic disruption.
From a strategic and regulatory standpoint, this reinforces the need for Finnish organisations to prioritise structured supply chain visibility, documented vendor risk assessments and resilient architecture design. Under Finland’s Cybersecurity Act implementing NIS 2, regulated entities are required to address supply chain risks explicitly, including through contractual safeguards, incident notification mechanisms and active oversight of critical ICT providers.
Within parts of the Finnish financial sector, a discernible recalibration has emerged in response to these dependencies. While cloud adoption remains central to digital transformation, certain financial institutions have strengthened on-premise environments and invested in proprietary data centre capacity located in multiple domestic sites. This development reflects a reassessment of concentration risk, operational resilience requirements and jurisdictional exposure linked to hyperscale cloud models. The shift is not a retreat from cloud services but rather a hybridisation strategy: combining private infrastructure, geographically distributed Finnish data centres and carefully structured outsourcing arrangements designed to satisfy supervisory expectations and ensure recoverability under stress scenarios.
Finland has concurrently positioned itself as an attractive jurisdiction for large-scale data centre investments. International operators such as Google and Microsoft have expanded or announced significant data centre projects in Finland. These investments are underpinned by legal predictability, political stability, renewable energy availability and favourable climatic conditions. From a resilience perspective, growing domestic data centre capacity creates practical possibilities to define and document where certain categories of sensitive data are processed and stored. For public sector entities, critical infrastructure operators and regulated industries, the ability to demonstrate geographic control and supervisory transparency can carry both legal and strategic weight.
The expansion of cybersecurity-intensive infrastructure also intersects with Finland’s energy sector. Data centres are energy-intensive assets requiring stable, long-term power arrangements, increasingly tied to renewable generation. In certain cases, excess heat produced by data centres has been integrated into district heating systems, creating new forms of industrial co-operation and a distinct business opportunity within the energy market. This convergence of digital and energy infrastructure heightens the importance of securing industrial control systems, grid management technologies and cross-sector dependencies. Cybersecurity in this context becomes not merely an IT compliance function, but a prerequisite for safeguarding interconnected national infrastructure.
These structural dependencies materially affect investment and transactional activity. Cybersecurity due diligence has become a central component of Finnish M&A processes. Buyers assess regulatory compliance under NIS 2-derived obligations, incident history, governance maturity and supply chain exposure. Identified deficiencies may influence valuation, purchase price adjustments or post-closing remediation commitments. Representations and warranties relating to information security and data protection are negotiated with increasing specificity, and insurers providing warranty and indemnity coverage frequently scrutinise cyber risk management frameworks.
Carve-out transactions in particular raise complex questions regarding the separation of shared IT environments, data migration and transitional service arrangements. Where infrastructure assets such as data centres, telecommunications networks or managed security service providers are involved, transactions may attract heightened regulatory attention due to national security or critical infrastructure considerations.
In this environment, cybersecurity functions simultaneously as a compliance obligation, a resilience measure and a transaction variable. For organisations operating in Finland, global and regional dependencies – whether cloud-based, infrastructural or energy-linked – must be analysed not only from a technical perspective but also through the lenses of governance, regulatory exposure and strategic risk allocation.
Emerging Trends in Finland
Several distinct threat trends have gained prominence in Finland’s cyber landscape in recent years. These reflect both global dynamics and region-specific patterns.
Increasing ransomware sophistication
While ransomware remains a global concern, Finnish organisations have observed:
Even when not state-sponsored, these campaigns may align with geopolitical interests indirectly by creating widespread disruption.
Blending of criminal and state-linked techniques
Attack groups are adopting tactics that blur the traditional lines between organised crime and state-linked operations. Examples include:
This convergence complicates detection and response, as indicators of compromise may not fit traditional threat classifications.
Elevated regulatory expectations
Finnish authorities are increasingly focused on demonstrable preparedness and maturity rather than checkbox compliance. Evidence of this trend includes:
The practical impact is that organisations are expected to translate legal obligations into tangible processes, documentation and executive oversight.
Strategic integration of cyber resilience
Rather than being a standalone IT function, cybersecurity in Finland is being integrated into enterprise risk management and corporate governance routines. Boards and executives are increasingly involved in:
This shift reflects a broader understanding that cyber resilience affects insurance, reputation, regulatory standing and long-term sustainability. Not all industries face the same threat or regulatory intensity, yet several sectors have seen notable shifts.
Practical Considerations for Businesses
Against this backdrop, organisations operating in Finland must approach cybersecurity as an enterprise-wide governance issue rather than a purely technical function. In the current regulatory and threat environment, resilience is contractual, organisational and strategic in nature, intersecting with compliance obligations, operational continuity and liability exposure.
Continuous risk evaluation is essential. Cyber risk is dynamic and influenced by technological developments and geopolitical factors that may heighten sector-specific vulnerabilities. Ongoing threat intelligence gathering, regular vulnerability assessments and penetration testing help identify weaknesses proactively. Scenario modelling and tabletop exercises further enable organisations to assess how cyber incidents would impact business continuity, crisis management and decision-making structures.
Effective incident detection and response capabilities are equally critical. Investment in monitoring tools and skilled personnel enhances early detection of anomalous activity, thereby limiting operational and reputational damage. Clear internal allocation of responsibilities, defined escalation paths, and integration of legal and communications functions into response planning are necessary to ensure coherent management of incidents and regulatory reporting. Engagement with competent authorities and sector peers may further support co-ordinated responses in high-impact situations.
Regulatory preparedness has assumed increased importance as European cybersecurity frameworks become fully operational in Finland. Supervisory expectations extend beyond formal compliance and require demonstrable effectiveness. Organisations should therefore maintain comprehensive documentation of risk management measures, ensure timely and accurate incident reporting mechanisms, and evidence board-level oversight and continuous review of cybersecurity practices.
Cyber risk also has significant contractual implications, particularly in ICT and outsourcing arrangements. In the Finnish market, unlimited liability often applies to breaches of confidentiality, raising the critical question of when a cybersecurity incident constitutes unauthorised disclosure triggering uncapped liability. The interaction between confidentiality, information security and data protection clauses must therefore be carefully structured, especially in ransomware scenarios involving data exfiltration. Without precise drafting, organisations may face materially higher exposure than anticipated.
Finally, resilience depends on third-party risk management and workforce awareness. Structured vendor due diligence, contractual cybersecurity safeguards and assessment of supply chain dependencies are essential to mitigating cascade effects. At the same time, targeted employee training and cross-functional crisis exercises reinforce organisational preparedness and clarify accountability.
In Finland’s evolving regulatory landscape, cybersecurity has become a core legal and governance consideration that permeates commercial risk allocation and strategic decision-making at board level.
Looking Ahead: Finland’s Cybersecurity Landscape
Finland’s digital ecosystem continues to evolve rapidly. For organisations operating in or into the Finnish market, cybersecurity must be assessed as a dynamic regulatory, geopolitical and transactional variable rather than a static compliance obligation. Key developments to monitor include:
An additional example of the expanding regulatory perimeter is the treatment of dual-use technologies. Certain cybersecurity tools – such as advanced encryption, intrusion software or surveillance-related technologies – may qualify as dual-use items under EU export control rules. For Finnish technology companies, this means that exporting such solutions outside the EU, or engaging in cross-border transactions involving sensitive technologies, can trigger licensing requirements and enhanced due diligence obligations. Cybersecurity strategy therefore increasingly intersects with export control and national security considerations.
To thrive in the Finnish jurisdiction, organisations will need to adopt forward-looking cybersecurity strategies that integrate regulatory compliance, export control awareness, business continuity planning and technological innovation. In an environment shaped by hybrid threats, infrastructure interdependencies and heightened supervisory oversight, cybersecurity is no longer confined to IT departments but is embedded in governance, capital allocation and international market access.
Conclusion
The Finnish cybersecurity landscape presents both significant challenges and strategic opportunities. While the regulatory environment is robust and evolving, emerging threats – including state-sponsored attacks, hybrid campaigns and sophisticated ransomware – have elevated expectations for proactive risk management. Increasingly, cybersecurity is not merely a defensive function but a core part of organisational strategy.
Organisations that demonstrate resilience through continuous risk evaluation, structured governance and adaptive operational practices will be best positioned to navigate Finland’s complex, interconnected and ever-shifting cyber environment.
Aleksanterinkatu 11
00100 Helsinki
Finland
+358 9 6844 410
+358 9 6844 4141
attorneys@lieke.com lieke.com