Resilience
In a world where geopolitical conflicts, cyberattacks, and disinformation have become part of everyday life, new ways of thinking about security are required. To meet legal requirements, expectations, and an increasingly risky global environment, we need to raise our common security standard.
The Resilience service provides strategic advisory and tactical guidance to help organizations meet the ten cyber capabilities defined by the National Cyber Security Centre (NCSC).

Stronger protection for Sweden and our operations
The increasing threat landscape facing civil society is changing how we prepare our companies and organizations. This is not only about protecting our operations, but also about strengthening our competitiveness and creating long-term security for customers, employees, and society at large.
In response, the NCSC—together with agencies such as the Swedish Defence Materiel Administration (FMV), the Swedish Armed Forces, the Swedish Civil Contingencies Agency (MSB), and the Swedish Security Service (SÄPO)—developed a list of actions defining ten cyber capabilities that all Swedish companies and public authorities are recommended to establish in order to counter threats from cybercriminals and foreign actors.
Why is this so important right now?
The EU’s new cybersecurity directive, NIS2, will become law in all EU member states and will take effect in Sweden in January 2026. This means that all affected companies and organizations must have clear and sufficient cybersecurity measures in place. The legislative change can be compared to the introduction of GDPR, as supervisory authorities will be appointed and penalties may be imposed for non-compliance.
Through NIS2, executive management teams are given explicit responsibility and can be held accountable for shortcomings in how the organization manages cybersecurity.
NCSC’s 10 Cyber Capabilities
The following ten capabilities should be ensured by all Swedish companies and organizations in order to comply with the regulations. The recommendations highlight the importance of practicing incident response, establishing clear communication channels, and preparing resources to handle critical situations. Through systematic work and regular exercises, organizations can not only manage security incidents effectively but also strengthen their readiness for future threats.
1. Ensure the ability to detect security incidents
To effectively identify security incidents in the IT environment, it is essential to detect them as early as possible. This can be achieved through a combination of manual, technical, and automated methods.
2. Install security updates promptly
Prioritize updates for information systems that are exposed to the internet, are business-critical, or contain vulnerabilities that risk being exploited. The goal should be to install security updates as soon as they are released.
3. Manage privileges and use strong authentication
Review all accounts in the IT environment and deactivate any that are no longer in use. Grant only the permissions necessary for each role. Use multi-factor authentication for public services, sensitive information, and accounts with administrative access. If multi-factor authentication is not available, use long and unique passwords.
4. Limit and protect the use of elevated privileges
Protecting administrative privileges is crucial for reducing security risks in the IT environment. By establishing clear routines for the assignment and use of these privileges, organizations can safeguard their systems and data.
5. Disable unused services and protocols
To protect information systems from threats, it is important to disable functions that are not required for the system’s operation. By applying appropriate security measures, organizations reduce the risk of the system being exposed to attacks.
6. Back up and test restoration of information
Creating and testing backups is essential for protecting information and systems against data loss. Regular backups enable organizations to quickly restore data and minimize disruption during incidents.
7. Segment and control access within the network
To protect the organization’s IT environment, it is crucial to segment the network to limit and monitor traffic flows between different parts of the system. It is also important to ensure that only approved devices are allowed to connect.
8. Ensure that only approved software can run — allowlisting
Only authorized software should be allowed to run in the IT environment. By using allowlisting, organizations can protect their systems and information by preventing unauthorized software from being executed.
9. Upgrade software and hardware
Replace outdated software and hardware to reduce vulnerabilities and ensure that systems function properly and maintain adequate security.
10. Control internet access
Secure internet access is essential to prevent internal systems and data from communicating with external environments without authorization. By implementing the right measures, organizations can prevent a compromised system from being used for remote control or data theft.

Overview of the tool, showing how well the company meets NCSC’s 10 cyber capabilities.
How we work together
01
Mapping maturity level
An initial workshop with key personnel in your organization to map your maturity level across NCSC’s 10 cyber capabilities. The workshop is complemented by interviews to develop a shared understanding.
02
Prioritization and tactical planning
We prioritize the 10 capabilities based on strategic objectives. This includes considering the organization’s business goals, the current threat landscape, and available budget and resources. The prioritization leads to tactical planning of concrete activities, including implementation and communication plans, resource allocation, and evaluation of choices and tools.
03
Execution
During regular monthly meetings, activities are carried out by our cybersecurity experts together with a designated resource from your organization. Ongoing expert guidance is provided, along with ready-to-use templates and playbooks.
04
Quarterly follow-up
Each quarter, we review and measure the maturity level of each cyber capability, making it easy to track progress over time. The results are presented in quarterly reports.
05
Access to strategic framework
You always have full access to our proprietary strategic framework for NCSC’s “Cybersecurity in Sweden.” This framework is at the heart of the service and is what we use to plan our work. It is designed to provide practical, concrete next steps.
06
Community
Access to the service’s shared Teams channel, where customers and our experts can exchange experiences and ask questions.
07
Annual cybersecurity event
You will receive an invitation to our annual cybersecurity event, exclusively for all customers of the service. The main focus is on how we can collectively strengthen both our own and our shared resilience.
"Cybersecurity is something everyone must address, and although the need has been evident for decades, many organizations still have not taken cybersecurity and information security as seriously as required."
– National Cyber Security Centre (NCSC)
The value of the service
As a customer of the Resilience service, you gain access to a digital tool where you, your colleagues, and our security experts can log in to view your organization’s maturity in relation to strategic objectives. The tool includes a roadmap for the work, activity tracking, an annual cycle, and a comprehensive library of templates.
Increased control and traceability
- A clear view of the current status and maturity across all defined cyber capabilities.
- Quarterly measurements provide concrete evidence of progress.
Focus and direction
- A prioritized, tactical plan to strengthen capabilities step by step.
- Avoids “ad hoc efforts” by ensuring that everything is connected in a clear, consistent thread.
Expert support on your terms
- Our cybersecurity experts lead the work, while the customer controls the execution.
- Access to a proven, strategic framework based on NCSC’s guidelines.
More efficient use of resources
- Lower risk of misinvestment by focusing on the right activities.
- Faster impact of initiatives thanks to planning and follow-up.
Knowledge and network
- Access to a shared Teams channel for exchanging experiences.
- Annual event for inspiration, trends, and collective resilience.
What does Resilience cost?
Bronze
NCSC’S Capabilities
- Access to tools and strategic framework
- Prioritization and tactical planning
- Monthly meetings with expert advice
- Quarterly reports on maturity level
- Access to a shared Teams channel for knowledge exchange
- Exclusive annual event
- Access to NCSC’s related templates
Price: 30.000 SEK/Month
Silver
NCSC’S CAPABILITIES
NIS2
- Access to tools and strategic framework
- Prioritization and tactical planning
- Monthly meetings with expert advice
- Quarterly reports on maturity level
- Access to a shared Teams channel for knowledge exchange
- Exclusive annual event
- Access to NCSC’s and NIS2’s related templates
Price: 40.000 SEK/Month
Gold
NCSC’S Capabilities
NIS2
DORA
- Access to tools and strategic framework
- Prioritization and tactical planning
- Monthly meetings with expert advice
- Quarterly reports on maturity level
- Access to a shared Teams channel for knowledge exchange
- Exclusive annual event
- Full access to the complete template library
Price: 50.000 SEK/Month
Register your interest!
Would you like a personal demonstration of the Resilience service? Leave your contact information and we will get back to you!
Related services
Aktuellt
Följ oss!
Vi delar gärna med oss av kunskap, erfarenheter och inspiration. Följ oss på LinkedIn eller ta del av vårt nyhetsbrev, så får du ta del av insikter först av alla.

