Incident Response & Breach Management

72-hour reporting, CERT coordination, and regulatory compliance

Service overview

GDPR requires breach notification within 72 hours. NIS2 requires early warning in 24 hours. We prepare procedures, reports, and coordinate with CERT and regulators.

Our incident response services

72-hour GDPR reporting

Preparation of data breach notifications for DPA and affected individuals, severity assessment, measure documentation, and DPO coordination.

24-hour NIS2 warning

Early warning to CERT about significant incidents, 72-hour detailed notification, and final report within one month.

Documentation preparation

Incident log standards, report templates, communication plans, and post-incident analysis for continuous improvement.

Crisis coordination

Crisis team management, coordination with internal IT/security, external advisors, and regulators during and after incidents.

Post-incident review

Root cause analysis, lessons learned, improvement recommendations, and corrective measure implementation to reduce future risk.

Reporting deadlines

GDPR data breach

72 hours
Notification to DPA
Without delay
Notification to affected individuals (high risk)

NIS2 cyber incident

24 hours
Early warning to CERT
72 hours
Incident notification with assessment
1 month
Final report and corrective measures

Frequently asked questions

What is a personal data breach under GDPR?

A security breach leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data. Examples: ransomware, device loss, email sent to wrong person, unauthorized access.

Do I need to report every breach?

No. GDPR requires notification to the DPA only if the breach is likely to result in a risk to individuals' rights and freedoms. All breaches must be documented internally. NIS2 requires CERT notification only for significant incidents.

What if I can't meet the 72-hour deadline?

GDPR allows phased notification if all information isn't available within 72 hours. It's important to report the incident on time and add additional information later. Delays must be justified and documented.

Who should be on the incident response team?

Typically: DPO/CISO, IT/security lead, legal, communications/PR, affected system business owner, external advisors. Roles and responsibilities should be clearly defined before an incident occurs.

Related services

Prepare your incident response plan

Typical outcomes: procedures ready, report templates, tested scenario.

Schedule Consultation
Incident Response & Breach Management | Vision Compliance