Information security has become a strategic issue for every organization—from banks and telecoms, through e-commerce and logistics, to the public sector and critical infrastructure.
Pressure comes from all sides: the rising number and severity of incidents, stricter risk-management rules, tighter incident-reporting deadlines, as well as the expectation from partners and regulators that security be embedded into every process and technology.
In 2025, Serbia broadly aligned its course with European cybersecurity law by proposing a new Information Security Act that follows the logic of NIS2, introduces new categories of obliged entities, shorter reporting deadlines, and higher penalties.
Zunic Law helps companies turn information risks into an advantage—through legal-operational design, clear policies, practical contracts, and procedures that actually work in practice (not just on paper).
Our approach is pragmatic: we map regulatory obligations and risks, tailor them to your business model and technologies, and deliver sustainable solutions that withstand supervision, audits, and real incidents.
New Information Security Act (draft, 27 February 2025) – expands the range of covered entities, introduces a split between priority and important operators of ICT systems of special significance, announces the Office for Information Security to take over the role of the national CERT, requires incident reports within 24 hours, mandates incident categorization, and raises fines for non-compliance.
NIS2 (Directive (EU) 2022/2555) – sets a common cybersecurity framework in the EU, broadens scope to 18 critical sectors, introduces mandatory risk management, tighter incident reporting, and stronger supervision and enforcement. Although Serbia is not an EU member, the new domestic framework follows NIS2 logic to ensure compatibility with the single digital market.
DORA (for the financial sector) – an EU regulation applicable from 17 January 2025; harmonizes ICT risk management, incident reporting, resilience testing, and oversight of critical ICT third parties (e.g., cloud). For Serbian entities operating in the EU or with EU groups, DORA affects contracts, processes, and technical-organizational controls.
In practice, more and more companies fall under information-security regimes—even if they are not typical “critical infrastructure.” The draft law separates obliged entities into priority and important operators of ICT systems of special significance, with an expanded list of sectors (e.g., water supply, postal services, certain manufacturing, information-society services, providers of qualified trust services, DNS and TLD registry). This classification entails different control regimes, inspection frequency, and penalty levels.
First, your status (priority/important) is a legal and operational trigger: it affects the pace and depth of risk assessments, frequency of inspections, reporting deadlines, and expectations for your supplier contracts (cloud, SOC, data centers, integrators).
If you are also a data controller (GDPR/Serbian DP Act), incidents involving personal data simultaneously trigger the 72-hour data-breach notification rules—so you need a unified mechanism for assessment and dual reporting (cyber + privacy).
If you are a bank, insurer, investment firm, or payment service provider operating in the EU, DORA is already a reality. From 17 January 2025 it applies and brings:
For groups that include Serbian entities, the DORA standard becomes a de facto minimum for group policies, contracts, and processes—even where local rules do not yet require the same level of detail.
It depends on your sector and role. The draft law introduces priority and important operators of ICT systems of special significance; the list of sectors is expanded (e.g., water, post, information-society services, qualified trust services, DNS/registry). A formal status mapping is needed—this is how we start every project.
Shorter deadlines (24 hours for significant incidents), mandatory updates to the initial report, and a more precise information set.
The draft also introduces reporting of serious threats. We recommend a single process that simultaneously covers GDPR/Serbian DP Act obligations (72 hours).
Yes – the National CERT is the operational point for reporting and coordination; public forms and guidelines exist. Its role includes early warning, advice, and incident records.
The new Serbian framework is designed to follow NIS2 logic, so you will see similar mechanisms (broader scope, risk management, incident reporting, supervision, penalties).
This simplifies cooperation with EU partners and boosts compatibility for cross-border deliveries.
Yes. DORA has been applied since 17 January 2025 and requires harmonized ICT risk processes, reporting, testing, and strong contracts with ICT third parties (especially cloud).
If you are part of an EU group, the DORA standard becomes the mandatory baseline for contracts and policies.
In addition to the cyber report, the GDPR/Serbian DP Act 72-hour regime applies to the competent authority (and notification of individuals if there is a high risk).
That’s why the IR team and the DPO must work in an integrated manner – Zunic Law sets a unified decision-making and documentation flow.
30/05/2025
22/05/2025
24/04/2025
25/02/2025
20/02/2025
05/02/2025
27/12/2024
02/12/2024