CSIRT Representative: who they are, what they do, and when to appoint them according to the NIS2 Directive.

Organizations classified as essential or important under the NIS2 Directive must appoint their CSIRT Representative between November 20 and December 31, 2025.

The appointment, to be made through the ACN portal, must include one main representative and at least one deputy, ensuring 24/7 availability and operational continuity.
It is not necessary for the role to be internal: the regulation allows the function to be outsourced to qualified external providers or Managed Security Service Providers (MSSPs), provided that criteria of competence, availability, and accountability are met.
This organizational flexibility allows companies to comply with the new requirement efficiently, but it also demands strict contractual agreements on response times, notification obligations, and activity traceability.

The new framework introduced by the NIS2 Directive

With the implementation of Directive (EU) 2022/2555, known as NIS2, Europe takes a significant step forward in the maturity of cyber risk management.
Cybersecurity is no longer just a preventive defense activity, but a strategic function of organizational resilience. Within this new model, a key figure emerges: the CSIRT Representative, the operational element of the national incident response and coordination system.

In Italy, the role was formalized by the Determination of the National Cybersecurity Agency (ACN) No. 333017/2025, which defines its functions, requirements, and designation procedures.
The goal is to create a coordinated ecosystem among public entities, essential operators, and national CSIRTs, capable of ensuring timely and consistent management of cyber incidents.

CSIRT Representative and NIS2 Point of Contact: two distinct strategic roles

The CSIRT Representative serves as the operational point of contact between the organization and CSIRT Italia. In the event of an incident, this figure ensures that every security event is managed and communicated in compliance with national protocols. It is not a formal or purely bureaucratic role but represents the decision-making core of the response, capable of combining the technical and regulatory dimensions during the critical hours of an attack. The CSIRT Representative is the technical counterpart of the NIS2 Point of Contact, another key figure who maintains institutional responsibility for communications with ACN.

It is important to note that the roles of CSIRT Representative and NIS2 Point of Contact cannot be held by the same person.
The distinction between the two roles introduced for the first time explicitly by the Italian regulatory framework clarifies the chain of command during crises, reducing ambiguity and decision-making delays.

Required skills: technical expertise, governance, and operational readiness

The CSIRT Representative must combine advanced technical expertise with a deep organizational understanding.
Experience is required in incident response, digital forensics, threat intelligence, and SOC management, together with knowledge of international standards such as:

  • ISO/IEC 27035 – for incident management
  • NIST SP 800-61r2 – for the incident response lifecycle
  • ISO/IEC 27001:2022 – for information security governance
  • MITRE ATT&CK and D3FEND – for classifying adversarial behaviors

Incident management under NIS2: a precise timeline

The NIS2 Directive establishes a three-phase procedure for reporting significant incidents:

  • Within 24 hours – sending an early warning to the national CSIRT with preliminary information on the impact.
  • Within 72 hours – submitting the full incident notification with detailed technical and operational data.
  • Within one month – sending the final report, including root cause analysis, actual impacts, and corrective measures.

The CSIRT Representative is the director of this process: they receive and classify the event, coordinate technical teams, communicate with the CISO, DPO, and management, and oversee containment actions.
They operate in synergy with the SOC, whether internal or external, and with telemetry and correlation platforms (such as SIEM, SOAR, and MISP), ensuring information consistency throughout the decision-making chain.

Organizational placement and governance models

Within the corporate structure, the CSIRT Representative reports to the CISO, but maintains a direct communication channel with both the NIS2 Point of Contact and CSIRT Italia.
In SMEs, the role may coincide with that of the CISO; in larger organizations, separating the two functions is preferable to ensure segregation of responsibilities and greater operational efficiency.

It is crucial to define roles and communication flows through RACI matrices, escalation procedures, and internal communication protocols, transforming incident response into a structured and repeatable process rather than an emergency reaction.

From control to culture: measuring cyber resilience

Beyond operational management, the CSIRT Representative plays a decisive role in measuring the organization’s cyber resilience.
Their activities feed key KPI and KRI metrics such as:

  • MTTD (Mean Time To Detect)
  • MTTR (Mean Time To Respond)
  • Percentage of incidents reported within regulatory deadlines
  • Rate of completed final reports

These metrics are not merely monitoring tools but serve as maturity indicators for internal audits, continuous improvement processes, and NIS2 compliance reporting.

A new paradigm of digital resilience

The CSIRT Representative embodies one of the most tangible changes introduced by NIS2.
It symbolizes a cybersecurity approach that is no longer purely defensive but oriented toward risk governance. The mandatory appointment, traceability of actions, and defined response timelines transform incident management from a reactive activity into a permanent function of organizational resilience.
Ultimately, the CSIRT Representative is the guardian of digital resilience: a professional ensuring that every threat is managed methodically, every notification is sent on time, and every crisis becomes an opportunity for learning.
In an environment where attack speed often exceeds regulatory adaptation, this figure operational, competent, and coordinated makes the difference between a managed risk and a suffered one.

Recommended Articles

September 1, 2025

Multi-Factor Authentication and User Behavioral Analysis: from Identity to Behavioral Detection

The cyberattacks that companies face today have little to do with the “classic” intrusions that were widespread until a few years ago.We are no longer dealing […]
August 11, 2025

Energy & Utility: how to defend yourself in a hyperconnected ecosystem

We live in an era where energy infrastructures have evolved into distributed digital organisms—highly complex and deeply interconnected. Power plants, industrial facilities, distribution networks, sensors and […]
July 28, 2025

AI-Native Attacks & Self-Learning Defense: the Zero Trust 2.0 Paradigm in the Hybrid Cloud

In 2025, AI-powered attacks account for over 28% of advanced threats: deepfake phishing, prompt injection, generative social engineering, and adaptive malware now make up the core […]
June 30, 2025

Intervista a Massimo Centofanti – esperto di Cyber Security e fondatore di ai.esra

Cybersecurity: innovare per proteggere, proteggere per innovare. Massimo, partiamo dal contesto: oggi la superficie d’attacco si espande praticamente ovunque. Come sta cambiando il ruolo della cybersecurity? […]