Cybervize - Cybersecurity Beratung

NIS-2 Incident Reporting Under Pressure: Why Friday Evening at 5:30 PM Is the Ultimate Test

Alexander Busse·March 11, 2026
NIS-2 Incident Reporting Under Pressure: Why Friday Evening at 5:30 PM Is the Ultimate Test

Imagine this: it's Friday evening at 5:30 PM. An employee notices unusual data flowing out of the system. They know who to call – in theory. In practice, the relevant phone number is stored in a wiki that hasn't been updated in eight months. The responsible security officer is on vacation. The backup contact was reassigned three months ago.

This scenario is not fiction. It's everyday reality in many mid-sized companies – and precisely why the incident reporting process is one of the most underestimated building blocks of NIS-2 compliance.

Why the Reporting Process Is So Often Underestimated

When organizations begin their NIS-2 compliance journey, initial measures typically focus on the visible: technical security controls, access management, network segmentation, vulnerability management. This is understandable – these areas can be clearly defined, documented, and audited.

The reporting process, by contrast, is procedural and harder to pin down. It isn't complex because it requires sophisticated technology. It is complex because it must function under stress, at unusual hours, with potentially reduced resources. A process that works on paper in calm times often fails precisely when it's needed most. NIS-2 mandates an initial reporting requirement of 24 hours for significant incidents – a deadline nearly impossible to meet without a genuinely practiced process.

What a Robust Reporting Process Requires

Clear triggers and escalation thresholds: When is a report made, and who makes it? These definitions must be documented, communicated, and regularly practiced – not only in the IT department but across all relevant business functions.

Unambiguous responsibilities: For each step in the reporting process, it must be clear who is responsible – and who the backup person is. Contact information must be kept current, in formats accessible even when normal communication channels are down. The analog backup is not outdated thinking; it is a security requirement.

Structured handoffs to the crisis organization: A reporting process doesn't end with the first call. It includes structured handoffs with clear roles for executive management, legal, communications, and external authorities. Who is informed and when must be defined in advance – not decided in the chaos of an active incident.

Documentation that emerges naturally: NIS-2 compliance is evidence compliance. Reporting processes must be designed so that proof of execution is generated automatically. Log files, ticketing systems, automatic confirmations are not bureaucratic overhead – they are proof that compliance is genuinely practiced.

Common Weaknesses in Practice

Outdated contact information is the classic failure point: wiki entries no one updates, organizational charts that don't match reality, mobile numbers belonging to employees who left long ago. A reporting process is only as reliable as the reachability of its key people.

Unclear boundaries between incident categories mean ambiguity about what is actually reportable. Without clear definitions, employees tend to err on the side of caution in the wrong direction – and report too late or not at all. Lack of training means a process that exists only on paper cannot be retrieved under real conditions. Regular tabletop exercises are the only way to genuinely test a reporting process.

Digital dependencies in the notification chain pose a particular risk: if the escalation path runs through Teams, Outlook, or other systems that may themselves be affected in a cyber incident, the reporting process breaks down exactly when it's most urgently needed.

Readiness, Not Compliance Theater

NIS-2 has triggered a compliance machinery in many organizations – documentation, checklists, process descriptions. This is necessary but not sufficient. The crucial difference lies between compliance on paper and genuine operational readiness.

A thoughtful readiness approach treats the reporting process not as an isolated document but as an integrated component of incident response capability. This requires joint exercises with relevant stakeholders, an honest gap analysis of existing structures, and an iterative improvement model. For mid-sized organizations without a dedicated CISO function, structured support programs offer an efficient path to achieving this readiness within a defined timeframe.

Conclusion: The Real Test Isn't Friday Evening

The question "Would your incident reporting process work at 5:30 PM on a Friday?" is the most practically relevant test of a company's true NIS-2 readiness. The honest answer doesn't require self-criticism – it requires a clear-eyed view of existing processes and the will to close the gaps before an incident makes them visible. Incident response doesn't start with the incident. It starts with the decisions companies make today.