Strategy on paper — but does it actually work in practice?
In February 2026, Dutch telecom provider Odido fell victim to a cyberattack by a hacker group. Through social engineering, customer service employees were deceived, after which the attackers had undetected access to the Salesforce database for 48 hours. The result: personal data of 6.2 million customers exposed — names, addresses, bank details, passport numbers and driving licences. Odido refused to pay the one-million-euro ransom, after which the complete dataset was published on the dark web.
Odido undoubtedly had security policies, incident response procedures and a crisis plan. But were employees sufficiently trained and practised to recognise a social engineering attack? The plan existed — the question is whether the organisation was actually prepared.
This pattern is all too familiar. From data breaches at telecom providers to ransomware attacks on Dutch municipalities and healthcare institutions — time and again the same thing becomes clear: the plan existed, but things still went wrong.
The persistent misconception
Many organisations invest time, money, and energy in creating plans. Business Impact Analyses, crisis plans, continuity plans, and communication plans are neatly stored in SharePoint or filed away on a shelf.
And yet things go wrong when it matters most. Not because the plan is bad, but because of a persistent misconception:
Having a plan is not the same as being prepared.
A plan is a document. Being prepared is a skill. It is not about the plan itself, but about the process:
A plan that has never been exercised is almost never effective in a crisis.
NIS2 forces organisations to look beyond the document
The NIS2 Directive, which has been in effect across the EU since October 2024 and is being transposed in the Netherlands through the Cybersecurity Act, explicitly sets requirements for business continuity and crisis management. Article 21 obliges organisations not only to have plans, but also to test and evaluate them.
This means that "the plan is on the shelf" is no longer sufficient. Regulators expect organisations to demonstrate that:
For many organisations, this represents a fundamental shift: from compliance on paper to compliance in practice.
Real preparation happens before the crisis
Organisations that demonstrably navigate crises with resilience have embedded several key elements:
Team dynamics
Knowing how you respond together under pressure. Who takes the lead? Who escalates? Who communicates externally? You don't discover this during a crisis — you learn it by practising beforehand.
Decisiveness
Daring to act with 60% of the information. In a crisis, you rarely have the complete picture. Organisations that wait for full certainty lose precious time.
Communication strength
Maintaining clear communication as noise increases. Internal panic directly translates into external chaos when communication lines are unclear.
Adaptive capacity
Being able to adjust course without panic. No crisis follows the script. The question is not whether you will need to deviate from the plan, but how quickly you can.
From document to lived practice
Moving from a plan on paper to an organisation that is truly prepared requires a structural approach:
How uComply helps
With uComply, you work proactively on compliance and crisis preparedness. The platform helps you to:
This shifts compliance from an annual paper exercise to an ongoing, living process.
Conclusion
Certainty does not come from a document. Certainty comes from people who know what to do, who trust each other, and who have practised in the unknown. The question is not whether your organisation has a plan, but whether that plan works when it truly matters.
NIS2 and recent incidents make one thing clear: the era of paper compliance is over. Organisations that invest now in truly living their plans will stand stronger — not only before regulators, but especially when facing the next crisis.
Curious about where your organisation stands? Book a demo and discover how uComply helps you move from plan to practice.



