Exploring NIS2 Compliance in the Energy Sector Using AI-Driven Cyber Threat Intelligence

Authors

  • Jani Siivola Laurea University of Applied Sciences
  • Rami Paronen Laurea University of Applied Sciences
  • Uzair Tariq Laurea University of Applied Sciences
  • Quyet Pham
  • Warren Villegas Laurea University of Applied Sciences
  • Ilkka Tikanmäki Laurea University of Applied Scienses https://orcid.org/0000-0001-8950-5221
  • Jyri Rajamäki Laurea University of Applied Sciences https://orcid.org/0000-0003-4798-2462

DOI:

https://doi.org/10.34190/iccws.21.1.4482

Keywords:

NIS2 Compliance, Critical energy infrastructure, AI-driven anomaly Detection, Cyber threat intelligence automation, Operational cyber defence

Abstract

The NIS2 Directive introduces stricter requirements for how essential entities, including energy-sector operators, must manage cybersecurity risks and report incidents. In practice, many organisations face difficulties in transforming these legal obligations into concrete, daily security operations, especially in operational technology (OT) environments where visibility, logging, and coordinated responses are often limited. This paper examines how SecureAI, an AI-based anomaly detection and enrichment tool within the Cyber Threat Intelligence (CTI) ecosystem, can help energy operators meet key NIS2 obligations. The study is based on a qualitative desk-research approach, a comparative mapping of SecureAI capabilities against NIS2 Articles 20-26, and a realistic OT case scenario based on recent intrusion patterns. Prior research shows that AI can detect industrial anomalies faster and more accurately than rule-based systems, and that automated CTI processing can turn raw alerts into structured and shareable intelligence. At the same time, NIS2 requires accountable use of such tools, meaning that human oversight, transparency of analysis, and reliable evidence generation must be part of AI-supported workflows. These requirements guided the assessment. The analysis shows that SecureAI supports several key NIS2-related tasks. It identifies unusual behaviour in network and host telemetry, enriches findings with asset information and event relationships, and produces structured alert objects that support operator decision-making. The CTI Framework then converts these enriched alerts into STIX/TAXII objects suitable for reporting, documentation, and intelligence exchange. The case scenario–an unauthorised remote-access intrusion followed by suspicious HMI-PLC activity–demonstrates how SecureAI can highlight the anomaly, provide context for understanding its impact, and supply material for reporting and further investigation.

Author Biography

Jani Siivola, Laurea University of Applied Sciences

MBA (Information Systems) Ilkka Tikanmäki is a Project Specialist in Safety, Security and Risk Management at Laurea University of Applied Sciences and a doctoral student of Operational art and tactics at the Finnish Defence University. https://orcid.org/0000- 0001-8950-5221

Dr Jyri Rajamäki is an Adjunct Professor of Cybersecurity and Critical Infrastructure Protection with 35 years of experience in the ICT field. Currently, he contributes to several EU-funded research projects, with research interests in resilient cyber-physical systems and ethical governance of safety-critical and/or classified information. Dr Rajamäki has authored more than 200 scientific publications. https://orcid.org/0000-0003-4798-2462

Jani Siivola, Rami Paronen, Uzair Tariq, Quyet Pham and Warren Villegas are students in the bachelor’s degree Programme at Laurea University of Applied Sciences in the Degree Programme in Business Information Technology, Cybersecurity.

Downloads

Published

19-02-2026