Incident
reporting
.

Are you subject to European cyber incident reporting obligations?

If your company operates in a critical sector: energy, transport, healthcare, digital infrastructure, IT services, or financial services, EU law requires you to act fast and report to authorities when a cyber attack hits. Missing these deadlines can result in heavy fines and personal liability for your management.

Start your case

Applicable regulation:
How urgent is your case?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

How we prepare your incident report

We help you document the incident, prepare the required reports and coordinate the communication needed for regulatory, client and stakeholder notifications.

01

INCIDENT REPORT

We prepare all required reports (early warnings, detailed reports, final analysis) in the correct format and on time, for both NIS2 and DORA obligations.

02

REGULATORY COMMUNICATION

We handle or support communication with national CSIRTs, financial regulators (EBA, EIOPA, ESMA), and other competent authorities.

03

CLIENT & STAKEHOLDER NOTIFICATIONS

We draft clear, compliant notifications to your affected customers and business partners.

04

POST-INCIDENT ADVISING

We guide your team through root cause documentation, remediation planning, and lessons-learned processes that satisfy regulatory requirements.

Some of the cases we helped resolve

Crypto source of funds cases require more than transaction exports. These examples show how we reconstruct complex trading histories, compare reported claims with on-chain evidence, and prepare documentation that can be reviewed by banks, law firms and tax authorities.

Law enforcement assistance in a connected crypto investigation

Case overview

A law enforcement agency from an Asian country contacted us in relation to one of their ongoing investigations.

Situation

During their investigation, they identified a wallet address that had already been flagged by us in one of the investigative tools we use. They were looking for any information connected to that address and to the case we were working on.

Our work

Together, we connected both cases and established that they shared the same perpetrator.

Outcome

The joint investigation was successful. The perpetrator was identified and criminal charges were filed.

Multi-chain wallet analysis for an anti-corruption investigation

Case overview

We were contacted by an anti-corruption agency in relation to an ongoing investigation of an individual holding a public function in their country.

Situation

The only information disclosed to us consisted of several wallet addresses across multiple blockchains.

Our work

We were tasked with producing a report covering incoming and outgoing transactions related to the disclosed wallet addresses, identifying service accounts such as exchanges, merchant services and crypto ATMs, and tracing the funds to their final destinations.

Outcome

The final report provided a structured overview of the wallet activity, identified relevant services and documented the movement of funds across multiple blockchains.

Structured, transparent, evidence-based.