ICT platform for business computer users

The Netherlands scores too low on digital resilience
nederland-scoort-te-laag-op-digitale-weerbaarheid
Published by
WINMAG Pro Editorial Team
Sun, 25 January 2026, 13:30
Share

How digitally resilient are Dutch organizations really? A minority practices with incidents, but the majority does not.

Photo: Designed by vectorpocket / Freepik

The KPN study Cyber Resilient Netherlands 2026 shows that Dutch organizations rate their digital resilience at an average of 7.1. This seems reassuring, but that number conceals an important tension. For example, 67 percent of organizations feel prepared for a cyber incident, while only 28 percent systematically practice incident response and crisis management.

The difference between feeling and actual preparedness is therefore significant. Cyber resilience often turns out to depend on isolated measures in practice, rather than a cohesive whole of policy, technology, and behavior.

Cyber resilience is mainly at 'basic level'

To make digital resilience measurable, the researchers work with a maturity model with four levels: reactive, basic, strategic, and visionary. Most Dutch organizations are in the basic phase. Processes and responsibilities are set up, but not yet fully integrated into the organization or structurally anchored in the business operations.

Particularly in areas such as compliance, architecture, and crisis planning, organizations score relatively better. At the same time, themes such as security monitoring, budget & resources, and having a clear security roadmap lag behind. Only 16 percent have a roadmap at the executive level, where prioritization and coherence are determined.

Governance and awareness are decisive

A recurring insight from interviews with CISOs and CIOs: cyber resilience is not an IT affair. Governance and organization-wide awareness turn out to be prerequisites, not side issues. Only when responsibilities are clearly assigned and the board is actively involved does space arise for structural improvement.

Organizations that see security solely as a technical issue often remain stuck in reactive measures. Where management and the board show ownership, cyber resilience becomes an integral part of risk management and strategic decision-making.

Blind spots: supply chain security, monitoring, and IAM

The research reveals several vulnerable points:
 

  • Supply chain security: only 23 percent of organizations have mature supplier risk management. Almost one in ten organizations does not even have a complete overview of suppliers.
  • Identity & Access Management (IAM): 5 percent still operate without multi-factor authentication (MFA). Additionally, 39 percent only have MFA on critical systems, while identity misuse is a common attack vector.
  • Security monitoring: 33 percent of organizations lack continuous, organization-wide insight. Monitoring is often limited to core systems, while attacks move laterally through networks.

These blind spots make it clear that isolated technical solutions are insufficient without cohesive management.

Investments are increasing, but remain under pressure

On a positive note, 66 percent of organizations expect to increase their security budget in 2026. At the same time, 38 percent of security professionals believe that the available resources are inadequate. Investments are primarily directed towards monitoring & detection, IAM, strategy development, and security awareness.

These choices align with the experienced risks, but also emphasize that cyber resilience is not a one-time investment. It requires continuous adjustment, evaluation, and practice.

Seven tips to strengthen digital resilience

For organizations that want to grow from 'basic' to 'strategic' level, here are some concrete points of attention:

1. Ensure governance anchoring

Explicitly establish cyber resilience at the executive level, including priorities, budget, and mandate for the CISO.

2. Work with a cohesive security roadmap

Link technology, processes, and human behavior to clear objectives and measurement moments.

3. Make MFA and least privilege the norm

Implement identity & access management organization-wide, without exceptions that increase risks.

4. Practice incident response structurally

A plan on paper is not enough. Regular practice under realistic conditions demonstrably increases crisis capability.

5. Strengthen supply chain security

Map suppliers and cloud dependencies and integrate them into risk management.

6. Invest in continuous monitoring

Go beyond just logging and ensure active follow-up and organization-wide insight.

7. Make security part of daily behavior

Awareness and training are not one-off campaigns, but an ongoing process.

From feeling to demonstrable resilience

Digital resilience in the Netherlands has a solid foundation, but true maturity requires more coherence, ownership, and practice. As long as self-confidence is not supported by demonstrable processes and behavior, cyber resilience remains vulnerable.

Organizations that structurally connect governance, technology, and human action are better prepared for a threat landscape that is constantly evolving.

preply-haalt-150-miljoen-op-om-de-toekomst-van-onderwijs-vorm-te-geven-door-middel-van-human-led-en

Preply raises $150 million to shape the future of education through human-led and AI-supported learning

Tuesday 27 January 2026 - 21:10
google-discover-als-contentkanaal-spontane-zichtbaarheid-voor-ondernemers

Google Discover as a content channel: spontaneous visibility for entrepreneurs

Monday 26 January 2026 - 20:05
alles-over-telefoon-traceren-in-2026

Everything about phone tracking in 2026

Monday 26 January 2026 - 13:25
ces-2026-humanoide-robots-oprolbare-laptops-en-meer

CES 2026: humanoid robots, rollable laptops and more

Monday 26 January 2026 - 16:40