Skip to content

Cybersecurity Incident Response: Every Minute Counts

Incident response plans, tabletop exercises, breach containment, forensic investigation coordination, and regulatory notifications to AEPD and NIS2 supervisory authorities.

72 hrs
GDPR breach notification to AEPD — managed end-to-end
24 hrs
NIS2 early warning deadline for significant incidents
<4 hrs
Guaranteed response time with incident response retainer
4.8/5 on Google · 50+ reviews 25+ years experience 5 offices in Spain 500+ clients
Quick assessment

Does this apply to your business?

Does your company have a documented incident response plan that has been tested in the last 12 months?

Does the executive team know exactly what to do in the first hours of a cyberattack — without improvising?

Have you identified who is responsible for AEPD and NIS2 notifications the moment the clock starts?

Has your company conducted a ransomware or data breach tabletop exercise in the last year?

0 of 4 questions answered

Our approach

Our cybersecurity incident response process

01

Incident response plan development

We design the incident response plan (IRP) adapted to the company's critical assets and specific risk profile: incident classification, roles and responsibilities, containment procedures, communication chains, and escalation criteria.

02

Tabletop exercises

We facilitate tabletop exercises with the executive and technical teams to test the plan against realistic scenarios: ransomware, data breach, supply chain attack, critical system failure. The exercise reveals the gaps before a real incident does.

03

Real incident coordination

When a real incident occurs, we activate immediate support: coordination with the technical containment team, forensic investigation management, real-time legal counsel on notifications, and representation with regulatory authorities.

04

Regulatory notifications and crisis communications

We manage mandatory notifications: AEPD within 72 hours (GDPR), NIS2 supervisory authority within 24 hours (early warning) and 72 hours (initial report), and communication to affected individuals where required. We coordinate crisis communications with clients, partners, and media.

The challenge

A poorly managed cybersecurity incident causes far more damage than the incident itself. Without an operational response plan, organisations lose critical hours to decision paralysis, extend the attacker's window, and risk regulatory penalties for missing the AEPD's 72-hour notification deadline or NIS2's 24-hour early warning requirement. Improvisation during an active cyberattack is the most common cause of avoidable damage.

Our solution

We develop incident response plans tailored to each organisation's reality, facilitate tabletop exercises that test the plan under realistic conditions, and when a real incident occurs, we coordinate the technical and legal response: containment, forensic investigation, regulatory notifications (AEPD and NIS2), and crisis communications.

Cybersecurity incident response is the set of technical and legal procedures an organisation activates upon detection of a cyberattack, system breach, or data security event. In the EU regulatory framework, two parallel notification obligations apply simultaneously: under Article 33 of the GDPR, personal data breaches must be notified to the AEPD within 72 hours; under the NIS2 Directive (EU 2022/2555, transposed in Spain by 2026), essential and important entities must submit an early warning to the competent authority (INCIBE-CERT or CCN-CERT) within 24 hours of detecting a significant incident, followed by a more complete report within 72 hours. Failure to meet these deadlines constitutes an independent regulatory infringement separate from the underlying incident.

Our incident response team brings together lawyers specialising in cybersecurity and privacy regulation with experience in technical response coordination, crisis management, and regulatory authority relations. Integrating the legal and operational dimensions from the first moment is the difference between an effective response and one that generates additional problems.

The Preparation Gap

An active cyberattack is the worst moment to discover that the response plan does not exist, that no one knows who to call, or that the documented procedures do not reflect operational reality. Post-incident investigations consistently show that the damage caused by lack of preparation exceeds the damage from the incident itself: systems offline longer than necessary due to absent recovery procedures, regulatory fines for late notification, and client trust destroyed by uncoordinated crisis communication.

The incident response plan is not a document to be filed and forgotten. To be useful, it must reflect the company’s actual technical architecture, the critical assets that must be prioritised for recovery, the real-world roles of the people who will execute it, and the current contacts for suppliers, authorities, and insurers. It must be tested regularly through tabletop exercises that place the team in simulated stress and reveal failures before a real incident does.

What Effective Tabletop Exercises Look Like

The exercises we facilitate go beyond a theoretical discussion. We use detailed scenarios based on the most frequent attack vectors in the company’s specific sector — ransomware in manufacturing and logistics, credential compromise via phishing in professional services, supply chain attacks in critical sectors — and introduce real-time complications that test decision-making and communication under pressure. The post-exercise report identifies critical gaps and produces a concrete improvement plan.

When a real incident occurs, the coordination between technical response and legal management is critical. The forensic team needs to preserve evidence in a form that is admissible if criminal involvement is suspected. Regulatory notifications must be accurate and consistent — the AEPD and the NIS2 supervisory authority can request additional information that must be consistent with what has already been notified. If there is a potential cyber insurance claim, incident documentation must satisfy the insurer’s requirements. Our service coordinates all these dimensions from the first moment.

The GDPR and NIS2 notification obligations run in parallel with very tight timelines. Our experience is clear: organisations that have conducted the tabletop exercise and have a tested, documented protocol consistently meet the deadlines with margin. Organisations that improvise rarely do.

Criminal Liability and Incident Response

In incidents involving ransomware extortion, theft of trade secrets, or sabotage, the incident response has a criminal dimension that requires specialist legal oversight from the outset. Our criminal compliance team coordinates with the incident response function to ensure that evidence is preserved, that law enforcement notification decisions are made with full legal awareness of the consequences, and that the company’s legal position is protected throughout the response.

The DORA Notification Timeline

For financial entities subject to DORA (Regulation 2022/2554), the incident notification requirements are even more demanding than NIS2. DORA’s delegated technical standards set specific classification criteria and notification timelines: an initial notification within 4 hours of classifying an incident as major, an intermediate report within 72 hours, and a final report within one month. Financial entities need a pre-classified incident response workflow — one that moves from detection to major/non-major classification in minutes, not hours. Our DORA compliance team integrates the incident response protocol with the regulatory notification workflow as a single, coherent process.

Supply Chain Incidents

A significant proportion of major cyber incidents originate in compromised third-party suppliers — software vendors with privileged access to client environments, cloud infrastructure providers, or managed service providers. These incidents present specific legal complications: the company is simultaneously a victim of the supplier’s security failure and potentially a controller of personal data breached by a processor. Our incident response service includes a post-incident analysis of the contractual gap that allowed the supply-chain incident to occur — producing a concrete recommendation for contractual remediation. Data breach management for the GDPR notification dimension runs in parallel.

Cyber Insurance Claims Coordination

Insurance claims following a significant cyber incident require careful coordination with the incident response process. Most policies require notification to the insurer within 24 to 72 hours of discovering the incident — a window that frequently overlaps with the regulatory notification process. Our approach establishes a dedicated insurance coordination track alongside the regulatory notification process, with a designated contact responsible for managing the insurer relationship from detection through claim resolution. Organisations that have not yet conducted a cybersecurity audit of their current security controls should do so before the next renewal — both to ensure coverage conditions are satisfied and to identify gaps that the insurer’s underwriting process may flag.

The DORA Notification Timeline

For financial entities subject to DORA (Regulation 2022/2554), the incident notification requirements are even more demanding than NIS2. DORA’s delegated technical standards set specific classification criteria and notification timelines: an initial notification within 4 hours of classifying an incident as major, an intermediate report within 72 hours, and a final report within one month. Financial entities need a pre-classified incident response workflow — one that moves from detection to major/non-major classification in minutes, not hours. Our DORA compliance team integrates the incident response protocol with the regulatory notification workflow as a single, coherent process.

Supply Chain Incidents

A significant proportion of major cyber incidents originate in compromised third-party suppliers — software vendors with privileged access to client environments, cloud infrastructure providers, or managed service providers. These incidents present specific legal complications: the company is simultaneously a victim of the supplier’s security failure and potentially a controller of personal data breached by a processor. Our incident response service includes a post-incident analysis of the contractual gap that allowed the supply-chain incident to occur — producing a concrete recommendation for contractual remediation. Data breach management for the GDPR notification dimension runs in parallel.

Cyber Insurance Claims Coordination

Insurance claims following a significant cyber incident require careful coordination with the incident response process. Most policies require notification to the insurer within 24 to 72 hours of discovering the incident — a window that frequently overlaps with the regulatory notification process. Our approach establishes a dedicated insurance coordination track alongside the regulatory notification process, with a designated contact responsible for managing the insurer relationship from detection through claim resolution. Organisations that have not yet conducted a cybersecurity audit of their current security controls should do so before the next renewal — both to ensure coverage conditions are satisfied and to identify gaps that the insurer’s underwriting process may flag.

Track record

Real results in incident response

We received the alert at 2am on a Saturday. By 4am, BMC had our containment team coordinated, affected systems isolated, and a forensic firm engaged. By Sunday evening, the AEPD draft notification was ready. By Monday morning, we were operational with recovered systems. Without the response plan and retainer we had put in place three months earlier, it would have been catastrophic.

Iberian Distribution Partners, S.A.
Head of IT Security

Experienced team with local insight and international reach

What you get

What our incident response service includes

Incident Response Plan (IRP)

Design of the response plan tailored to critical assets, specific risks, and the company's organisational structure: roles, procedures, communications, and regulatory notifications.

Tabletop Exercises

Facilitation of realistic tabletop scenarios with the executive and technical teams: ransomware, data breach, credential compromise via phishing, critical supplier failure.

Real Incident Support

Immediate activation of technical and legal support for real incidents: containment coordination, forensic investigation management, and real-time legal counsel.

Regulatory Notifications

Drafting and managing notifications to the AEPD (GDPR, 72 hours), the NIS2 supervisory authority (24-hour early warning, 72-hour initial report), and affected individuals where required.

Crisis Communications and Post-Mortem

Management of communications to clients, partners, and media during and after the incident, and post-mortem analysis to update the plan with lessons learned.

Guides

Reference guides

Post-Brexit: your British company operating in Spain with the right structure

post-Brexit advisory for UK companies operating in Spain: entity structuring, customs and VAT, work permits for British nationals, UK-Spain tax treaty optimisation and data protection compliance.

View guide

Comprehensive legal services for businesses

Comprehensive legal advisory for businesses: commercial, employment, contracts, regulatory compliance, and dispute resolution. A dedicated legal team to protect your company.

View guide

Buy property in Spain with confidence — and without the horror stories

Buying property in Spain as a non-resident involves legal checks, tax obligations, and title risks that many buyers discover too late. BMC protects your investment from offer to deed.

View guide

The collective agreement that governs your workforce: understand it and negotiate from strength

How collective agreements work in Spain: hierarchy of agreements, company-level vs sector agreements, ultra-actividad, inaplicacion (opt-out), and negotiation strategy for employers after the 2021 labour reform.

View guide

Your commercial lease agreement: get the clauses right before you sign

Expert legal guidance on commercial lease agreements in Spain under the LAU: key clauses, rent reviews, subleasing, termination rights, VAT implications and tenant and landlord protections.

View guide

Corporate lawyer for construction: protect your contracts and your rights

Corporate legal advisory for construction companies and developers in Spain: construction contracts, UTEs, joint ventures, interim valuation disputes, claims for defects, and debt recovery.

View guide
FAQ

Frequently asked questions about cybersecurity incident response

An incident response plan is the document that establishes how the organisation will act when a cybersecurity incident occurs: who is responsible for what, in what order actions are executed, how damage is contained, how systems are recovered, and how the incident is communicated internally and externally. A well-designed IRP reduces response time, limits impact, and ensures compliance with regulatory notification obligations.
ISO 27001 and NIS2 require that continuity and incident response plans be tested regularly. The recommended practice is at least one full tabletop exercise per year, with plan reviews every six months. Following a real incident, a post-mortem exercise should always be conducted to update the plan with lessons learned.
Without a plan, the organisation improvises at the worst possible moment: under pressure, with compromised systems, and with regulatory notification clocks running. We can activate incident response support without a prior plan, but the outcome will be less efficient and the risk of regulatory penalty for late notification is substantially higher. The plan is needed before the incident, not during it.
The GDPR requires notification to the AEPD of personal data breaches posing a risk to individuals' rights within 72 hours of detection. If the breach poses a high risk, affected individuals must also be notified without undue delay. Late or incomplete notification is itself a GDPR infringement — independent of the underlying breach.
NIS2 establishes a tiered system: early warning to the supervisory authority within 24 hours of detecting a significant incident; initial report with more detail within 72 hours; and a final report within one month. Criteria for a 'significant' incident include the potential impact on service delivery, the number of persons affected, and the financial repercussion. Our protocol activates notification flows from the first moment of incident detection.
Digital forensic investigation analyses how the incident occurred, which systems were compromised, what data may have been accessed or exfiltrated, and who is responsible. It is necessary in incidents with significant impact, where criminal liability may be involved (ransomware extortion, commercial data theft), for correct system recovery, and to satisfy the evidentiary requirements of regulatory reports. We coordinate with specialised forensic laboratories.
Crisis communication is one of the most sensitive phases of incident management. Poorly managed communication frequently causes more reputational damage than the incident itself. We prepare client and partner communications, advise on timing and channel, and in incidents with public impact, we coordinate with the company's communications team to ensure consistent, legally accurate messaging.
Yes. For organisations requiring guaranteed immediate response, we offer an incident response retainer with a four-hour response time during business hours and eight hours on weekends and holidays. The retainer includes the IRP development, an annual tabletop exercise, and incident support hours against real incidents.
First step

Start with a free diagnostic

Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.

Cybersecurity Incident Response

Legal

First step

Start with a free diagnostic

Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.

25+
years experience
5
offices in Spain
500+
clients served

Request your diagnostic

We respond within 4 business hours

Or call us directly: +34 910 917 811

Call Contact