Greece has established a modern, multi‑layered cybersecurity framework that brings together national strategies, legislative measures, sector‑specific regulations and directly applicable EU instruments. More specifically, the Greek legislature:
Together, these elements form a cohesive, risk‑based regulatory ecosystem that ensures a high and consistent level of cybersecurity across Greece’s critical and emerging sectors, supporting the country’s transition toward a secure and resilient digital future.
Law 5160/2024, which transposes the NIS2 EU Directive, constitutes the core horizontal cybersecurity framework in Greece.
Subject Matter
Organisations in Scope
Notable Points
Greece has also issued multiple binding and quasi‑binding secondary instruments to operationalise the new cybersecurity obligations. The most significant are Joint Ministerial Decisions (JMDs).
JMD 1689/2025 – National Cybersecurity Requirements Framework
This is the primary binding technical and organisational guidance implementing Law 5160/2024 (NIS2). It sets out concrete controls, including:
JMD 1990/2025 – Registration and Data Submission to NCSA
JMD 1899/2025 – Appointment and Duties of the Information and Communication Systems Security Officer (ICSSO)
This JMD details the qualifications and responsibilities of the ICSSO required by Law 5160/2024 and JMD 1689/2025. It establishes:
The national framework is complemented by directly applicable EU regulations.
A. Digital Operational Resilience Act (DORA) – Regulation (EU) 2022/2554
Subject matter
Organisations in scope
Notable points
B. Cyber Resilience Act (CRA) – Regulation (EU) 2024/2847
Subject matter
Organisations in scope
Notable points
The NCSA is Greece’s central cybersecurity authority, established under Law 5086/2024. It is responsible for developing the national cybersecurity strategy, supervising NIS2 obligations, setting technical cybersecurity requirements, and co-ordinating national cyber incident response.
In addition to supervising covered entities, the NCSA serves a co-ordinating and regulatory role. It can issue mandatory cybersecurity requirements and publish guidelines for both essential and important entities.
The NCSA also operates Greece’s National Computer Security Incident Response Team (CSIRT) and acts as the country’s cyber crisis management authority. It serves as Greece’s single point of contact at the EU level for cybersecurity co-operation networks, such as the CSIRTs Network.
Finally, the NCSA is responsible for conducting compliance checks, issuing binding orders to address identified deficiencies, and imposing administrative penalties where necessary.
Pursuant to Law 5160/2024, entities classified as “essential” or “important” are required to implement specific cybersecurity risk‑management measures, incident‑reporting obligations, governance processes, and to comply with supervisory and enforcement mechanisms.
The criteria used to classify entities into these two categories are based on the nature and sector of their activity as well as their size. The sectors covered by the regulatory framework include:
The framework also encompasses digital providers such as online marketplaces, search engines, and social networking services.
In addition, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) fall within the scope of Law 5160/2024 when they provide ICT or security services on a large scale and are considered part of the digital infrastructure or ICT services category. This effectively extends compliance requirements across the broader services market.
Law 5160/2024 applies to all medium‑sized or large organisations within the above sectors (indicatively, those with more than 50 employees or turnover exceeding EUR10 million). Smaller entities may also be included when they are the sole providers of an essential service or when the disruption of their operations is considered to have a significant social impact.
Furthermore, public administrations that provide critical public services or state functions are explicitly covered – even if they do not meet the size criteria – with the aim of protecting critical government information systems.
However, several aspects of the law remain open to interpretation or are still awaiting further guidance.
Law 5160/2024 establishes requirements for implementing appropriate technical and organisational measures to manage cybersecurity risks. These obligations are further specified in Greece’s National Cybersecurity Requirements Framework, set out in JMD 1689/2025, which provides a detailed checklist for essential and important entities. The main areas of focus are as follows.
Governance and Accountability
A cyber governance plan is required, ensuring that risk oversight is carried out at senior management level and that specific responsible officers are appointed. Notably, organisations must designate an Information and Communications Systems Security Officer (ICSSO – equivalent to a CISO) by name, who must also report to the NCSA. Senior management bears responsibility for compliance, as the legislation explicitly holds CEOs and directors accountable if they fail to ensure adequate measures or proper incident handling. Organisations must maintain an information security policy covering the entire organisation, supported by individual policies, with clearly defined roles and responsibilities. Regular updates to senior management are required, along with submission of an annual cybersecurity report to the NCSA.
Risk Assessment and Asset Management
Organisations must maintain an up‑to‑date inventory of assets (hardware, software, data and network assets), prioritised according to criticality and risk. Periodic risk assessments must identify threats and vulnerabilities affecting critical processes, applying controls based on a recognised risk management methodology (often aligned with ISO 27005 or similar standards). These assessments must also address supply‑chain risks, including those associated with suppliers and service providers.
Basic Technical and Organisational Measures
The National Framework outlines a set of core measures aligned with international best practices. These measures include the following.
Incident Detection, Response and Recovery
Organisations must maintain an incident response plan with procedures for incident classification, containment, eradication, recovery and reporting – both internally and to the authorities. Periodic testing of these procedures is required.
Business Continuity and Disaster Recovery (BCP/DR)
BCP/DR planning and testing must be carried out to ensure that key services can be maintained or quickly restored following a cyber disruption. Requirements include backup policies and regular recovery testing, particularly to protect against ransomware and data corruption.
Third‑Party Due Diligence and Management
Organisations must ensure that third‑party contracts include appropriate cybersecurity controls and clauses, such as security obligations, audit rights or independent assessment reports, breach notification requirements, and data‑location provisions when applicable. There is also an obligation to oversee subcontractors, maintain an exit strategy (including data portability, relocation support and transition periods), and manage concentration risks, supported by contingency plans for the failure of a critical supplier.
The National Framework effectively transforms established best practices into mandatory requirements. Compliance is monitored through submissions and audits, and non‑compliance may result in enforcement actions, such as fines or corrective orders.
The established incident response and reporting obligations aim to ensure the timely management of incidents and the proper notification of authorities.
Under Law 5160/2024, an incident must be reported if it is classified as a “significant incident”. This includes any security incident that has, or could have, a substantial impact on the provision of an operator’s services or that affects other individuals or entities, causing significant material or non-material damage. In practice, the assessment considers factors such as the number of users affected, the duration of the disruption, the geographical spread, and the severity of the impact (including financial losses or risks to life or health). At EU level, quantitative thresholds have been set (for example, incidents affecting more than 100,000 users or lasting several hours may automatically qualify as significant), and Greece follows these criteria as established in the Commission’s implementing regulation on incident reporting.
The incident reporting process takes place in stages.
Failure to comply with reporting deadlines may itself lead to penalties, as timely reporting is a legal obligation.
All notifications are submitted to the NCSA’s National CSIRT, but relevant sectoral authorities may also be involved.
Certain incidents trigger multiple regulatory notifications. For example, a personal data breach in a hospital qualifies both as a NIS2 incident and a GDPR breach. In such cases, the hospital must notify the NCSA (under NIS2) and the Greek Data Protection Authority within 72 hours (under the GDPR). As there is currently no one‑stop‑shop mechanism, organisations must comply with each law’s separate procedure.
The Greek authorities encourage reporting streamlining to prevent multiple entities from reporting the same incident separately. For instance, if a telecommunications provider submits a report to ADAE, ADAE forwards it to the NCSA so the provider does not need to report twice (supported by a Memorandum of Cooperation between ADAE and the NCSA). Similarly, at the European level, the NCSA – acting as the national single point of contact – shares information with the EU CSIRT Network and, for large‑scale incidents, with the European Cyber Crisis Liaison Organisation Network (EU‑CyCLONE). Entities do not need to report directly to EU bodies, although they may be asked for further details via the NCSA.
Early warnings are used for immediate alerts and support and are treated as confidential. The NCSA must protect the security, commercial interests, and confidentiality of the information, though it may issue anonymised warnings to other entities. The final report and interim updates form part of the formal post‑incident obligations, and the NCSA may request a corrective action plan, follow‑up meeting, or audit. Beyond regulatory notifications, entities may also be required to inform service recipients/users if service provision is affected, and the NCSA may issue public notices where necessary to mitigate risks or protect the public interest.
The state, through the NCSA, develops the National Cybersecurity Strategy, which outlines the protection of critical sectors, skills development, and investment in secure technologies. The strategy is reviewed every five years, while progress is assessed every two years, with ENISA support available when required. In parallel, the state establishes the regulatory framework and, through the NCSA, issues binding technical and organisational requirements as well as guidelines. The NCSA also serves as the National Cybersecurity Certification Authority under the EU Cybersecurity Act, overseeing the implementation of certification schemes for ICT services.
The state is responsible for maintaining national prevention, detection, and response capabilities. The NCSA hosts the national CSIRT, and in cases of large-scale incidents, national cyber crisis management procedures and European co-ordination mechanisms (eg, EU-CyCLONE) are activated. In the area of Cyber Threat Intelligence (CTI), the framework encourages and protects the voluntary exchange of information – such as indicators of compromise, vulnerabilities, and incidents – and supports the establishment of Information Sharing and Analysis Center (ISAC) structures. The NCSA facilitates information exchange, issues anonymous warnings to the market when necessary, and participates in EU-level networks (such as the EU CSIRT Network) and international collaborations.
The strategy adopts a public–private partnership model. The state seeks co-operation with the private sector by forming sectoral working groups or ISACs in areas including finance, energy, and telecommunications. It regularly convenes critical infrastructure operators in dedicated forums to discuss emerging threats and jointly develop mitigation measures. Furthermore, the state invests in capacity building and operates a National Coordination Centre within the EU cybersecurity capabilities network (Regulation (EU) 2021/887). Financial incentives for cybersecurity investments and certifications are also under consideration.
In serious cases, the state may mobilise additional resources, including technical assistance from NCSA experts, and involve law enforcement authorities to provide investigative support. Similarly, the development of sectoral ISACs highlights the state’s role as convenor and the industry’s role as the primary channel for day-to-day information exchange.
In summary, the Greek state plays the roles of organiser, regulator, information provider, and supporter in the field of cybersecurity. It sets strategic direction and regulatory requirements (so private entities understand their obligations), ensures national response capabilities (so the state can intervene during major threats), actively shares threat information (so no organisation confronts risks alone), and builds strong connections with the private sector and international partners (because cybersecurity resilience is a collective effort).
DORA applies directly in Greece without requiring national transposition and serves as the primary operational resilience framework for financial entities and critical ICT third‑party providers. The following organisations fall within the scope of DORA.
A broad range of financial sector entities, including:
Critical Third‑Party ICT Providers, meaning ICT service providers that deliver critical or important services to financial institutions, such as:
DORA is structured around five core operational pillars:
1. ICT Risk Management Requirements
2. ICT Incident Reporting Rules
3. Digital Operational Resilience Testing
4. ICT Third‑Party Risk Management
5. Oversight of Critical Third‑Party ICT Providers
DORA also has significant extraterritorial reach, covering the following.
DORA defines ICT services as encompassing “a broad range of offerings, extending beyond traditional outsourced IT services”. This includes third‑party service providers, cloud and software vendors, and fintech providers. Under DORA, entities qualify as ICT service providers when they supply any of the following to financial institutions:
ICT service providers may be designated as critical based on several criteria:
This designation is carried out by the European Supervisory Authorities (ESAs), not by national authorities.
Financial institutions must embed binding contractual and supervisory requirements into their agreements with all ICT service providers. In particular, contracts must address the following areas.
Full description of services:
A clear and comprehensive description of all services and the provider’s obligations.
Subcontracting:
Explicit provisions governing subcontracting, including notification and approval requirements, as well as the obligation to ensure that subcontractors receive equivalent security, control, and co-operation commitments (“chain outsourcing”).
Data location:
Specification of the countries or regions where services are delivered and data are stored, along with an obligation to provide prior notice – and, where required, obtain consent – for any changes.
Security and confidentiality:
Clauses describing ICT security and confidentiality measures, including resilience and business continuity plans, as well as the provider’s obligation to support the financial institution in meeting its regulatory requirements.
Incident notification:
An obligation for the provider to immediately inform the financial institution of any circumstances that may have an impact on it, and to fully co-operate with both the institution and relevant supervisory authorities.
Control:
Clear service‑level targets and monitoring procedures, allowing the institution to maintain active oversight and undertake timely corrective actions.
Audit:
Rights for on‑site inspections by both the financial institution and competent supervisory authorities (and, for critical ICT third‑party providers, by the designated lead supervisor).
Exit strategy:
Clauses ensuring that, in cases of termination, cancellation, insolvency, or cessation of activity, data remains accessible and is returned in a usable format, accompanied by transition support and secure deletion once the process is complete.
Termination options:
Defined conditions and notice periods, including the option to terminate the arrangement when requested by a supervisory authority or when the provider’s risk profile becomes unacceptable.
Concentration risks:
Requirements for institutions to assess concentration risks and third‑country or jurisdictional risks, particularly where local regulations may hinder access or control.
Through Law 5193/2025, these obligations become enforceable by the Bank of Greece or the Hellenic Capital Market Commission. Institutions are expected to review existing significant contracts, and authorities may impose corrective measures where necessary.
DORA sets out obligations for governance, risk management, incident management, and incident reporting.
Governance (Tone From the Top and Accountability)
Financial entities must ensure clear management body accountability for ICT risk. This includes the responsibility to approve and oversee the ICT risk management framework, allocate appropriate roles, resources, and expertise, and ensure directors receive adequate training.
Policies and controls must cover all phases of the ICT risk life cycle: identification, protection, detection, response, recovery, and backup/restore, along with periodic review and board-level reporting.
ICT Risk Management (End-to-End)
Organisations must maintain comprehensive asset and dependency mapping, including business services, ICT assets, and third‑party dependencies.
They must establish and maintain controls for protection, prevention, and detection of ICT risks.
Business continuity and disaster recovery (BCP/DRP) plans must be in place, regularly tested, and reviewed for lessons learned.
Third‑party risk management (TPRM) requirements include:
Incident Management and Reporting
Entities must maintain an end‑to‑end incident management process covering detection, triage, containment, eradication, recovery, and post‑incident review.
Incidents must be classified using defined criteria such as service downtime, number and criticality of users affected, data loss, geographic spread, economic impact, and other material indicators.
DORA delegates specific thresholds and evidence requirements to the Regulatory Technical Standards (RTS). Classification of an incident as “major” is based primarily on its scale and criticality – for example, disruption to critical services, high user impact, long duration, significant data loss, or systemic implications. Materiality is assessed based on factors such as:
Reporting Timelines
Major ICT‑related incidents must be reported to the competent financial authority (Bank of Greece or HCMC). Reporting follows a staged model.
Additional updates are required when the situation materially changes or when requested by the authority.
The reports must enable supervisors to understand what happened, the areas affected, and how the incident is being managed. Initial notifications should provide essential information, followed by more detailed impact assessments and status updates, and finally a comprehensive root‑cause analysis, damage assessment, remediation plan, and preventive actions.
Third‑Party Providers and Cross‑Regime Considerations
DORA brings third‑party ICT providers into the same operational framework. If an incident occurs at an ICT provider (eg, cloud or outsourcing provider), the financial entity must report it as its own major incident and co-ordinate with the provider based on contractual obligations for co-operation and information sharing.
Providers designated as CTPPs (Critical Third‑Party Providers) fall under a dedicated EU‑level oversight regime. This does not limit national obligations for Greek financial institutions regarding TPRM, testing, and full incident reporting.
Financial entities may also report significant cyber threats, even before they develop into incidents, and may participate in threat‑information‑sharing arrangements consistent with the framework’s safeguards.
For entities also subject to NIS2, DORA incident reporting to financial sector supervisors exists alongside NIS2 reporting obligations to the NCSA.
DORA establishes a new EU‑level oversight framework under which designated ICT providers (eg, cloud service providers, software vendors) are subject to direct supervisory monitoring by the European Supervisory Authorities (ESAs – EBA, ESMA and EIOPA). At the same time, national supervisors (such as the Bank of Greece) continue to supervise financial entities that rely on those ICT services.
Once an ICT provider is designated as critical, the ESAs may exercise the following powers.
Information and Access Powers
On‑Site Inspections
Oversight Recommendations and Binding Instructions
Testing and Validation Requirements
Sanctioning Powers
Although DORA introduces a central EU‑level supervisory regime for critical third‑party providers (CTPPs) through the ESAs acting as Lead Overseers, national authorities continue to enforce requirements on providers indirectly. This is achieved through mandatory obligations imposed on financial entities – such as contractual clauses, oversight mechanisms, auditing and testing obligations, and exit strategies. National supervisors may also require institutions to modify or terminate outsourcing arrangements if the associated risk is deemed unacceptable.
The Bank of Greece conducts supervision via both off‑site monitoring (submitted data reports, incident reporting, information on critical assignments, and testing results) and on‑site audits focused on ICT risk and resilience. Audits typically examine:
Greek authorities may require a financial entity to mitigate third‑party risks or, if risks remain unacceptably high, to suspend or terminate a critical outsourcing arrangement.
The operational resilience rules for the financial sector in Greece operate alongside European data transfer law and the supervisory requirements that apply to outsourcing in third countries. Although these rules do not impose a general obligation to localise data, in practice financial entities must select providers that do not impede supervision, allow effective control and access, and ensure that international data transfers remain lawful.
At the DORA level, the key issue is not a “prohibition” on data transfer but the need for transparency and control. Contracts with ICT providers must clearly specify the locations (regions/countries) where services are delivered and where data is processed or stored, as well as the conditions under which these locations may change. This transparency enables both the financial entity and competent authorities to assess the risks associated with different jurisdictions.
In parallel, supervisory expectations for outsourcing require that both the financial entity and the competent authorities retain full access, inspection, and audit rights. They also require that risks arising from third‑country involvement be specifically assessed. The EBA Guidelines on Outsourcing address these requirements explicitly, covering both access/control obligations and risk management considerations related to third‑country arrangements.
From a data protection perspective, Greece operates fully within the EU’s GDPR framework. When personal data is transferred outside the EEA, the transfer must rely on an appropriate GDPR mechanism. Following Schrems II, organisations must evaluate whether the chosen transfer tool functions effectively in practice and, where necessary, adopt additional technical and organisational measures in line with the EDPB’s guidance on “supplementary measures”.
In practice, the combined effect of DORA, GDPR, and supervisory obligations often leads organisations to adopt operational strategies that resemble a form of soft data localisation. This typically results in a preference for EU/EEA data regions, the use of technical measures that ensure encryption keys remain within the EU, and contingency planning that allows critical functions to continue or be recovered without reliance on a third country that poses regulatory or operational difficulties.
Greece does not maintain its own national threat‑led penetration testing (TLPT) framework. Instead, TLPT obligations for Greek entities stem directly from DORA and the TIBER‑EU Framework, which functions as the official methodology for conducting TLPT under DORA.
DORA TLPT adopts the TIBER‑EU intelligence‑led methodology.
Threat Intelligence (TI) Requirements
Scenario Selection
Mandatory Documentation Timeline
Following notification by supervisory authorities:
Within 3 months:
Submit initiation documents (project plan, control team lead details, communication plan).
Within 6 months:
Submit the detailed Scope Specification Document (CIFs, systems, test flags).
Red Team Testers (RTTs) Requirements
RTTs must:
Threat Intelligence Providers (TIPs) Requirements
TIPs must:
Cross‑Jurisdictional Recognition
The TIBER‑EU framework is explicitly designed to avoid duplication where multiple EU jurisdictions require TLPT. A TIBER‑EU test conducted in any EU member state can satisfy DORA TLPT requirements, provided the entity also meets the formal TLPT obligations set by its competent authority.
Entities Subject to Mandatory TLPT Under DORA
Only “significant” financial entities fall under DORA’s mandatory TLPT requirement. These are defined by impact, risk, and systemic‑relevance criteria set out in the RTS. Examples include:
Indicative (non‑exhaustive) thresholds include:
Frequency of TLPT Under DORA
TLPT must be carried out at least once every three years. Supervisors may mandate more frequent testing based on identified risk.
There is currently no autonomous, unified Greek “cyber-resilience law” that horizontally covers all ICT products and services. Instead, Greece follows a multi-layered cybersecurity and cyber-resilience framework aligned with EU legislation. This framework combines the following.
The core product-focused obligations now derive from the Cyber Resilience Act (CRA), which is already in force and will be fully applicable from 11 December 2027, with some requirements taking effect earlier. NIS2 (Law 5160/2024) and DORA complement the CRA.
Together, these frameworks cover most risks arising in cloud and SaaS environments, even when a service does not strictly qualify as a “product” under the CRA.
The CRA applies to any hardware or software product with digital components (PDE), and its scope is intentionally broad. It includes:
In addition, the CRA introduces mandatory notification obligations for actively exploited vulnerabilities and for serious cybersecurity incidents, with strict reporting timelines.
Pursuant to the CRA, manufacturers and distributors of PDE in Greece must comply with a set of baseline cybersecurity obligations designed to ensure product security throughout its life cycle. The key obligations for manufacturers are outlined below.
Vulnerability Management and Reporting Obligations
Patching and Update Obligations
Post-Market Surveillance Obligations
Actively monitor PDEs after market release for:
Documentation Duties
Maintain secure and up-to-date:
Co-operation With Authorities
Manufacturers, importers, and distributors must co-operate with market surveillance authorities – including those in Greece – by providing technical information and remediation plans when requested.
Conformity Assessments
Marking and Certification
Importers and distributors also have responsibilities: they must not make available products that clearly fail to meet the requirements, must co-operate in corrective actions, and must support traceability. Where non-compliance or serious risks are identified, corrective measures may include market withdrawal or recall, with mandatory co-operation and notification to the competent market surveillance authorities.
Enforcement
Enforcement will be carried out by national market surveillance authorities (Greece must designate its authority by 11 June 2026). These authorities may:
Under the CRA, if PDEs fail to meet requirements, authorities may:
The EU Cybersecurity Act establishes an EU-wide cybersecurity certification framework for ICT products, services, and processes. Under this framework, Greece designates the National Cybersecurity Authority (NCSA) as the National Cybersecurity Certification Authority.
The European framework operates through certification schemes tailored to specific technology categories. A key example is the European Cybersecurity Certification Scheme on Common Criteria (EUCC), which consolidates Common Criteria certification at the European level for defined product categories. The EUCC has been in force since 27 February 2025, making it the most clearly active European scheme at the implementation level.
EU certification schemes may define three levels of assurance.
Although the Cybersecurity Act originally envisioned these schemes as voluntary, in practice they can become effectively mandatory in three key ways.
In addition, some sectors operate under their own established certification schemes, including the following.
In Greece, cybersecurity and personal data protection are closely interconnected, as the security of personal data is both a legal compliance requirement and a fundamental cybersecurity objective. The core framework is the GDPR, together with the Greek implementing law 4624/2019, which impose preventive security measures as well as strict obligations for managing and reporting data breaches.
A key security obligation is that controllers and processors must implement “appropriate technical and organisational measures” that are proportionate to the level of risk. In practical terms, this requires a risk-based approach: the more sensitive or critical the data, the stronger the expected safeguards. Although the GDPR does not prescribe specific security controls, demonstrating due diligence is often supported through recognised standards – such as ISO 27001 – though these are not legally mandatory. Alongside this, the GDPR embeds the principle of privacy by design and by default. This means that systems and processes handling personal data must be designed from the outset to incorporate secure defaults. In practice, any application or platform operating in Greece must collect only what is necessary, avoid exposing data through default settings, enforce role-based isolation, and integrate risk-reducing techniques wherever feasible.
In cases of personal data breaches, clear notification rules apply. Notification to the Hellenic Data Protection Authority (HDPA) must be made “without undue delay and, where feasible, within 72 hours” whenever the breach is likely to pose a risk to the rights and freedoms of individuals. The notification should include, in a practical and well-documented manner:
Notification to affected individuals is required only when the breach is likely to result in a high risk to their rights and freedoms, unless standard exceptions apply – for example, when individual notification would involve a disproportionate effort. This communication must be written in clear, accessible language and should focus on practical steps individuals can take to protect themselves, without unnecessary technical detail.
In the Greek legal system, there is no standalone national “AI law” that horizontally regulates the security of AI systems. The primary framework is Regulation (EU) 2024/1689 (the EU AI Act), published on 12 July 2024 and being implemented gradually. The main date of application is 2 August 2026, although some provisions take effect earlier (eg, from 2 February 2025).
At the core of the AI Act, cybersecurity obligations apply to high-risk AI systems, alongside requirements relating to governance, monitoring, transparency, and the reporting of serious incidents.
For high-risk AI systems, the AI Act requires providers or manufacturers to design and develop systems with an appropriate level of accuracy, robustness, and cybersecurity. In particular, they must ensure:
A second layer concerns the security of the AI supply chain. Many AI systems incorporate pre-trained models, third-party libraries, and other external components. Regulatory expectations therefore emphasise documentation, traceability, and controls that mitigate the risks of backdoors, vulnerabilities, dependencies, and supply-chain attacks. This resembles a secure development life cycle, but adapted to the specific characteristics of machine learning (ML).
Furthermore, the AI Act requires notification of serious incidents to competent authorities. For high-risk systems, such reports must generally be submitted within 15 days of the provider or user (depending on the scenario) becoming aware of the incident. This may overlap with other regulatory reporting frameworks, meaning organisations need an operationally unified incident-management process capable of addressing multiple reporting obligations within the correct timeframes.
In practice, compliance in Greece will be multi-layered, because the AI Act does not replace general cybersecurity or data-protection frameworks – it complements them.
Thus, the AI Act adds the AI-specific layer: integrity of model behaviour, protection against ML-specific attacks, and reporting of serious incidents associated with AI-related risks.
Overall, the “cyber resilience” of AI systems in Greece will be assessed on three simultaneous levels:
Organisations that develop or use high-risk AI systems therefore need a documented risk assessment that addresses ML-specific threats, technical defence measures, and incident-reporting procedures covering all parallel regulatory obligations.
AI-Related Cybersecurity Obligations in Greece
AI-related cybersecurity requirements in Greece stem from a combination of national law and EU legislation. Primarily, the following are relevant.
Law 4961/2022 – Emerging Technologies Law (AI, IoT, Blockchain)
This national law established Greece’s earliest horizontal framework for AI governance. It includes obligations relating to responsible use, risk management, and data governance, applying across sectors. It also introduces risk-control requirements relevant to cybersecurity.
EU AI Act (Regulation 2024/1689)
Applicable directly in Greece, the AI Act imposes mandatory obligations on high-risk AI systems, including cybersecurity-specific requirements.
Under the EU AI Act, high-risk AI systems must include cybersecurity by design, encompassing:
Robustness, accuracy, and resilience
High-risk systems must be resilient to:
Secure development life cycle requirements
The AI Act requires:
Supply chain security
AI operators must evaluate the security of:
Technical documentation and risk assessment
Providers must maintain:
Under Greek Law 4961/2022, organisations using AI systems that affect employees or users must also:
Common requirements under both the EU AI Act and Greek Law 4961/2022
Dataset integrity and provenance
High-risk AI systems must undergo validation of:
Model security
Both legal frameworks expect:
Third-party components
Where AI systems rely on:
the operator is still responsible for:
Cybersecurity in the Greek healthcare sector is governed by a multi-layered framework that combines:
Under NIS2, healthcare providers – such as hospitals, clinics, and diagnostic centres – are categorised as essential entities. This designation entails enhanced security and reporting duties. At a minimum, such entities must implement risk-management measures including security policies, vulnerability management, monitoring, access controls, incident-response processes, and supply-chain assurance.
A defining sector-specific element of healthcare cybersecurity is the security of medical devices, especially as they become increasingly connected and software-driven. Under the EU Medical Device Regulation (MDR 2017/745), which applies directly in Greece, medical devices are subject to mandatory cybersecurity-by-design and life cycle-security obligations, established through the General Safety and Performance Requirements (GSPRs) in Annex I.
Incident reporting is one of the most operationally demanding obligations, as many cybersecurity incidents simultaneously trigger GDPR requirements. Furthermore, if a cybersecurity incident affects a medical device, MDR vigilance obligations may also apply. This means that a single incident may generate parallel reporting obligations, such as the following.
AI Threats, New Laws, and Expanding Obligations: The Future of Cybersecurity in Greece
Introduction
Cybersecurity in Greece is entering a defining period. By early 2026, the country will have implemented a new generation of legislative and strategic reforms. These developments go beyond routine legal updates and signal a broader shift in the maturity of Greece’s cybersecurity ecosystem. At the same time, the rapid adoption of emerging technologies – particularly artificial intelligence (AI) – combined with increasingly sophisticated and complex cyber-attack methods, is fundamentally reshaping the risk landscape. Together, these factors significantly affect the obligations of both public and private sector organisations. This article examines the most important cybersecurity trends and regulatory developments expected in 2026, focusing on issues that are particularly relevant for organisations doing business in Greece or operating digital infrastructure connected to the Greek market.
The regulatory landscape
Since the start of the decade, the Greek regulatory landscape saw the adoption of numerous laws relating to the emergence of new and innovative technologies as well as to the rise of an increasingly complex cybersecurity framework. What makes 2026 particularly significant is that several of these legislative initiatives are now advancing to a new stage of implementation.
NIS2: Full enforcement, registration, and rising scrutiny
Greece’s transposition of the EU NIS2 Directive through Law 5160/2024 has moved decisively from being merely “on the books” to being fully in force and actively enforced. A key feature of the Greek approach is the emphasis on registration and post-registration scrutiny. In-scope entities are required to register with the National Cybersecurity Authority (NCSA) and submit specific data sets via the Authority’s digital platform. This registration is not a purely formal or declaratory step. Once an entity becomes visible to the NCSA, it is subject to ongoing supervisory engagement, which may include requests for documentation, desk-based reviews, and on-site or remote audits.
These supervisory powers are reinforced by binding secondary measures, such as national requirements on cybersecurity policies, asset inventories, supplier and third-party oversight, and staff training. In practice, this “register-then-supervise” continuum is already being applied and is shaping how compliance is assessed and enforced in Greece.
CER: Enforcement and the knock‑on effect for NIS2 scope
Although the Critical Entities Resilience (CER) Directive is not a cybersecurity framework, its transposition into Greek law through Law 5236/2025 is expected to have one of the most significant indirect impacts on the scope of NIS2 in the coming years. CER establishes a new national regime for the identification and supervision of critical entities across key sectors, including energy, transport, health, water, digital infrastructure, banking, public administration, and others. Its focus is on resilience against physical, natural, technological, and hybrid threats.
The relevance of CER for cybersecurity practitioners lies in the designation process. By 17 July 2026, Greece will be required to formally designate all critical entities and record them in a national register. In practice, once an organisation is designated as a “critical entity” under CER, it will almost invariably fall within the highly critical or critical sectors already covered by NIS2. As a result, CER designation effectively operates as an additional trigger for NIS2 applicability. Organisations not previously captured by the cybersecurity regulatory framework will be brought into full NIS2 scope under such designation – not because of changes to cyber rules themselves, but because of their classification as critical entities under CER.
In this way, CER is set to significantly expand the NIS2 compliance perimeter in Greece from 2026 onwards, subjecting a broader range of organisations to cybersecurity oversight through the interplay between resilience and cybersecurity regulation.
CRA: Gradual enforcement and product security obligations coming into focus
The EU Cyber Resilience Act (CRA) is the Union’s first horizontal product security regulation for products with digital elements (PDE), a category that includes almost all connected hardware and software, from IoT devices and embedded systems to firmware, operating systems, standalone applications and cloud-supported digital components. Although, the CRA became legally binding on 10 December 2024, its obligations are intentionally phased in. Starting from September 2026, manufacturers selling PDEs into Greece must begin reporting actively exploited vulnerabilities and severe incidents to national CSIRTs/ENISA.
The digital landscape
In relation to the emergence of these technologies, the digital environment of Greece has been marked by the following trends and observations.
Rapid development of technologies using AI
The relationship between AI and cybersecurity is quite tight considering that the rise in cyber threats is becoming increasingly associated with the capabilities of AI systems such as Large Language Models (LLMs), which, while becoming popular for day-to-day as well as commercial uses, may also serve the purposes of cybercrime groups (eg, for cyber-espionage or for financial gains). AI-enhanced malicious activities are also significant for malware attacks, which are quite common in Greece compared to other EU member states, particularly due to the country’s geographical location.
Rise of cyber threats
In 2025, the most significant types of cyber-attacks related to cybercrime activities such as DDoS (distributed denial of service attack) and ransomware, especially impacting public administration bodies, digital providers as well as entities operating in the health sector. Research suggests that the evolution of cybercrime in Greece shows distinctive national characteristics, primarily in cases of fraud (predominantly in the form of ransomware and business email compromise) as well as AI-enhanced attacks, although systematic annual monitoring and available datasets for cybercrime activities (as compiled by the Cyber Crime Division of the Hellenic Police) remain fragmented. Nevertheless, the nature of these threats considering the divergence in national statistics compared to global trends showcase the vulnerability of Greece’s SME-heavy economy and the lower digital maturity among local businesses. Based on recent data, Greece ranks 6th worldwide for malware detected in incoming email and 1st in Southern Europe for attacks on industrial systems of high criticality.
Lack of preparedness and online safety
Greek small and medium-sized enterprises (SMEs) remain underprepared for cyber threats, given their limited access to security expertise or infrastructure. Specifically, although Greek SMEs make up 99.9% of all businesses, they have emerged as the weakest link in the European Union with regards to cybersecurity, ranking last in terms of protective measures and comprehensive policies against cyber-attacks. In addition, Greece is among the most dangerous online environments, with ransomware and malware attacks surging more than tenfold in 2024 alone, targeting more than one in five Greeks at least once (22%).
Increase in cybersecurity investments
The cybersecurity market in Greece is expected to gain more than 50% and to exceed USD270 million in total value by 2031. Such gains are foreseen due to a number of factors, primarily regarding the increased interest of the Greek private sector in the protection of their digital infrastructure (considering their vulnerability against cyber threats, as described above), rising investments from the EU Recovery and Resilience Facility, as well as foreign investments, such as the USD1 billion investment from Microsoft for the creation and activation of three data centres on Greek territory by 2028. Such continuing digitalisation, which will affect both the private and public sectors, is expected to have a significant impact on the implementation of the NCSA’s action plan and to place cybersecurity among Greece’s top national priorities moving forward.
The strategic landscape
In parallel to the enactment of the laws mentioned in “The regulatory landscape” above, the NCSA recently published its updated National Strategy on Cybersecurity (2026–2030) in December 2025 by virtue of the Ministerial Decision No 2563/16-12-2025 (the “Strategy”). The updated Strategy came to replace the previously adopted National Strategy (2020–2025) which had been established in light of the older NIS Directive and its transposing Law 4577/2018, stressing the need for institutional changes in response to the rapid digital development as well as the emergence of novel cybersecurity threats which called for more robust cybersecurity governance systems as well as for advanced organisational readiness.
In formulating its five-year plan, the NCSA focused heavily on the report that was published in March 2024 by the European Union’s Agency for Cybersecurity (ENISA), titled “Foresight Cybersecurity Threats for 2030.” According to the report, the top ten cybersecurity threats from now to 2030 and beyond (based on total impact and likelihood) are the following.
Eventually, the Strategy aims to support the Greek state as well as its enterprises and citizens in navigating the new digital landscape by focusing on four main strategic goals, with each one of them broken down to further specifications and considerations.
Goal #1: Developing skills and raising awareness
With this goal, the NCSA focuses on the following.
Goal #2: Strengthening of national, European and international co-operation
This goal focuses on the following.
Goal #3: Systemising cybersecurity governance
This goal promotes the following.
Goal #4: Bolstering regulatory compliance / updating cybersecurity policies and procedures
The last goal aims to achieve the following.
Practical considerations
Drawing together the regulatory, digital and strategic landscapes above, the following focus areas can help organisations operating in Greece calibrate their 2026 plans.
A. Prepare for deep NIS2 supervision
B. Monitor CER designation of critical entities
C. Accelerate CRA readiness
D. Strengthen defences against AI-enabled and hybrid cyber threats
E. Address SME weakness in the supply chain
F. Invest in cyber skills, training, and governance
G. Enhance incident response capabilities across multiple regulatory regimes