An incident is an event that actually happened — not just a potential risk. Logging them lets you understand, correct, prove, and under NIS2, notify the authorities within the legal deadlines.
"What might happen." Probability × impact, treated with controls.
"What did happen." Specific date, real consequences, post-mortem.
For significant NIS2 incidents: initial alert to the competent authority within 24h of awareness. Minimal format (who, what, type).
Full initial assessment: scope, impact, measures taken. Same for GDPR: 72h to notify the DPA if personal data was breached.
Full description, root cause, corrective measures, lessons learned.
Competent authorities differ from country to country. Here are the contact points for NIS2YOU's target markets.
| Country | NIS2 incident (24h / 72h / 1 month) | GDPR data breach (72h) | Incident assistance |
|---|---|---|---|
| 🇧🇪 Belgium | CCB via Safeonweb@work |
DPA | CERT.be |
| 🇫🇷 France | ANSSI MonEspaceNIS2 |
CNIL | CERT-FR · cybermalveillance |
| 🇱🇺 Luxembourg | ILR + HCPN |
CNPD | CIRCL |
| 🇳🇱 Netherlands | NCSC-NL CSIRT-DSP for digital service providers |
AP | DTC |
- Declare first, investigate later. Don't waste time understanding everything before logging — you can always update.
- Log near-misses too. They reveal failing controls before things actually break.
- Link each incident to the risks it materialised — useful for the post-mortem.
- Distinguish root cause (what enabled the incident) from symptom (what was observed). Root cause informs which controls to add.