Cybersecurity Incident Response: Every Minute Counts
Incident response plans, tabletop exercises, breach containment, forensic investigation coordination, and regulatory notifications to AEPD and NIS2 supervisory authorities.
Does this apply to your business?
Does your company have a documented incident response plan that has been tested in the last 12 months?
Does the executive team know exactly what to do in the first hours of a cyberattack — without improvising?
Have you identified who is responsible for AEPD and NIS2 notifications the moment the clock starts?
Has your company conducted a ransomware or data breach tabletop exercise in the last year?
0 of 4 questions answered
Our cybersecurity incident response process
Incident response plan development
We design the incident response plan (IRP) adapted to the company's critical assets and specific risk profile: incident classification, roles and responsibilities, containment procedures, communication chains, and escalation criteria.
Tabletop exercises
We facilitate tabletop exercises with the executive and technical teams to test the plan against realistic scenarios: ransomware, data breach, supply chain attack, critical system failure. The exercise reveals the gaps before a real incident does.
Real incident coordination
When a real incident occurs, we activate immediate support: coordination with the technical containment team, forensic investigation management, real-time legal counsel on notifications, and representation with regulatory authorities.
Regulatory notifications and crisis communications
We manage mandatory notifications: AEPD within 72 hours (GDPR), NIS2 supervisory authority within 24 hours (early warning) and 72 hours (initial report), and communication to affected individuals where required. We coordinate crisis communications with clients, partners, and media.
The challenge
A poorly managed cybersecurity incident causes far more damage than the incident itself. Without an operational response plan, organisations lose critical hours to decision paralysis, extend the attacker's window, and risk regulatory penalties for missing the AEPD's 72-hour notification deadline or NIS2's 24-hour early warning requirement. Improvisation during an active cyberattack is the most common cause of avoidable damage.
Our solution
We develop incident response plans tailored to each organisation's reality, facilitate tabletop exercises that test the plan under realistic conditions, and when a real incident occurs, we coordinate the technical and legal response: containment, forensic investigation, regulatory notifications (AEPD and NIS2), and crisis communications.
Cybersecurity incident response is the set of technical and legal procedures an organisation activates upon detection of a cyberattack, system breach, or data security event. In the EU regulatory framework, two parallel notification obligations apply simultaneously: under Article 33 of the GDPR, personal data breaches must be notified to the AEPD within 72 hours; under the NIS2 Directive (EU 2022/2555, transposed in Spain by 2026), essential and important entities must submit an early warning to the competent authority (INCIBE-CERT or CCN-CERT) within 24 hours of detecting a significant incident, followed by a more complete report within 72 hours. Failure to meet these deadlines constitutes an independent regulatory infringement separate from the underlying incident.
Our incident response team brings together lawyers specialising in cybersecurity and privacy regulation with experience in technical response coordination, crisis management, and regulatory authority relations. Integrating the legal and operational dimensions from the first moment is the difference between an effective response and one that generates additional problems.
The Preparation Gap
An active cyberattack is the worst moment to discover that the response plan does not exist, that no one knows who to call, or that the documented procedures do not reflect operational reality. Post-incident investigations consistently show that the damage caused by lack of preparation exceeds the damage from the incident itself: systems offline longer than necessary due to absent recovery procedures, regulatory fines for late notification, and client trust destroyed by uncoordinated crisis communication.
The incident response plan is not a document to be filed and forgotten. To be useful, it must reflect the company’s actual technical architecture, the critical assets that must be prioritised for recovery, the real-world roles of the people who will execute it, and the current contacts for suppliers, authorities, and insurers. It must be tested regularly through tabletop exercises that place the team in simulated stress and reveal failures before a real incident does.
What Effective Tabletop Exercises Look Like
The exercises we facilitate go beyond a theoretical discussion. We use detailed scenarios based on the most frequent attack vectors in the company’s specific sector — ransomware in manufacturing and logistics, credential compromise via phishing in professional services, supply chain attacks in critical sectors — and introduce real-time complications that test decision-making and communication under pressure. The post-exercise report identifies critical gaps and produces a concrete improvement plan.
The Legal Dimension of Incident Response
When a real incident occurs, the coordination between technical response and legal management is critical. The forensic team needs to preserve evidence in a form that is admissible if criminal involvement is suspected. Regulatory notifications must be accurate and consistent — the AEPD and the NIS2 supervisory authority can request additional information that must be consistent with what has already been notified. If there is a potential cyber insurance claim, incident documentation must satisfy the insurer’s requirements. Our service coordinates all these dimensions from the first moment.
The GDPR and NIS2 notification obligations run in parallel with very tight timelines. Our experience is clear: organisations that have conducted the tabletop exercise and have a tested, documented protocol consistently meet the deadlines with margin. Organisations that improvise rarely do.
Criminal Liability and Incident Response
In incidents involving ransomware extortion, theft of trade secrets, or sabotage, the incident response has a criminal dimension that requires specialist legal oversight from the outset. Our criminal compliance team coordinates with the incident response function to ensure that evidence is preserved, that law enforcement notification decisions are made with full legal awareness of the consequences, and that the company’s legal position is protected throughout the response.
Real results in incident response
We received the alert at 2am on a Saturday. By 4am, BMC had our containment team coordinated, affected systems isolated, and a forensic firm engaged. By Sunday evening, the AEPD draft notification was ready. By Monday morning, we were operational with recovered systems. Without the response plan and retainer we had put in place three months earlier, it would have been catastrophic.
Experienced team with local insight and international reach
What our incident response service includes
Incident Response Plan (IRP)
Design of the response plan tailored to critical assets, specific risks, and the company's organisational structure: roles, procedures, communications, and regulatory notifications.
Tabletop Exercises
Facilitation of realistic tabletop scenarios with the executive and technical teams: ransomware, data breach, credential compromise via phishing, critical supplier failure.
Real Incident Support
Immediate activation of technical and legal support for real incidents: containment coordination, forensic investigation management, and real-time legal counsel.
Regulatory Notifications
Drafting and managing notifications to the AEPD (GDPR, 72 hours), the NIS2 supervisory authority (24-hour early warning, 72-hour initial report), and affected individuals where required.
Crisis Communications and Post-Mortem
Management of communications to clients, partners, and media during and after the incident, and post-mortem analysis to update the plan with lessons learned.
Results that speak for themselves
Commercial debt portfolio recovery
92% portfolio recovery in 4 months, with out-of-court settlements in 78% of cases.
Comprehensive employment defense for industrial multinational
100% favorable outcomes: 5 advantageous conciliation agreements and 3 fully upheld court rulings.
GDPR compliance programme for a hospital group: from investigation to full compliance
AEPD investigation closed with no sanction. Full GDPR compliance achieved across all group centres within 6 months.
Analysis and perspectives
Frequently asked questions about cybersecurity incident response
Start with a free diagnostic
Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.
Cybersecurity Incident Response
Legal
First step
Start with a free diagnostic
Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.
Request your diagnostic
You may also be interested in
Criminal Compliance
Corporate criminal compliance programmes to exempt or mitigate the criminal liability of legal entities under Article 31 bis of the Spanish Criminal Code.
Saber másCybersecurity Audit
Security posture assessment, compliance audits (ENS, ISO 27001, NIS2), vulnerability assessment, penetration testing management, and third-party risk evaluation.
Saber másData Protection & Privacy
GDPR and LOPDGDD compliance, outsourced DPO, and comprehensive privacy management for businesses.
Saber másNIS2 Compliance
EU Network and Information Security Directive 2 compliance: scope assessment, control implementation, incident notification protocols, and board-level security governance.
Saber másVirtual CISO
Outsourced Chief Information Security Officer for SMEs: strategic cybersecurity leadership, governance, and regulatory compliance without the cost of a full-time executive.
Saber másKey terms
CISO (Chief Information Security Officer)
A Chief Information Security Officer (CISO) is the senior executive responsible for an…
Read definitionDORA (Digital Operational Resilience Act)
DORA (Regulation EU 2022/2554) is the EU's regulatory framework requiring financial sector entities…
Read definitionISO 27001 (Information Security Management System)
ISO/IEC 27001 is the internationally recognised standard for Information Security Management Systems…
Read definitionNIS2 Directive
The Network and Information Security Directive 2 (NIS2 — Directive 2022/2555/EU) is the EU's updated…
Read definitionRansomware & Cyber Threats
A type of malicious software that encrypts an organisation's files or systems and demands a ransom…
Read definition