Our Expert in Israel
No results available
Israel’s national cybersecurity law is moving from policy aspiration to legislative reality. The National Cyber Protection Draft Bill, 5786‑2026, published in early 2026, proposes a unified statutory framework that will impose new governance, incident-reporting and enforcement obligations on every organisation deemed part of the country’s critical infrastructure, with the financial sector squarely in the crosshairs. For Chief Compliance Officers, CISOs and Heads of Risk at banks, fintechs and payment service providers (PSPs), the draft represents both a regulatory step-change and a narrow window in which to shape internal readiness before the bill’s provisions crystallise into binding law.
This article delivers the sector-specific, prioritised cybersecurity compliance checklist that the draft demands, covering scope thresholds, breach-notification timelines, vendor-risk controls, enforcement exposure and a phased 90/180/360-day action plan.
The draft bill, formally titled the National Cyber Protection Law, 5786‑2026, was circulated for public comment in January–February 2026. It aims to replace Israel’s fragmented patchwork of government resolutions and sector-specific directives with a single, comprehensive cybersecurity statute. According to analysis published by Arnon Tadmor‑Levy, the draft establishes a statutory mandate for organisational cyber-risk management, formalises the Israel National Cyber Directorate’s (INCD) enforcement powers, and introduces mandatory incident-reporting obligations across designated sectors. The Hebrew University’s Cyber Security Research Center (HUJI CSRCL) has described the draft as “the most significant legislative development in Israel’s cyber governance since the founding of the INCD in 2015,” noting that it consolidates the Directorate’s advisory role into an explicit regulatory authority with teeth.
The bill’s architecture rests on three pillars: organisational duties (governance, risk assessment, technical controls), incident management (detection, reporting, remediation) and enforcement (administrative sanctions, criminal liability, investigatory powers). Critically for the financial sector, the draft does not displace existing Bank of Israel or Israel Securities Authority (ISA) supervisory requirements, it layers additional, cross-sector duties on top of them. The INCD, housed under the Prime Minister’s Office, becomes the lead national authority for coordinating cyber-incident response and exercising the new enforcement powers, while sectoral regulators retain supervisory jurisdiction over licensed entities. According to Barnea’s February 2026 client alert, the bill also introduces data-retention limitations and privacy safeguards governing information collected during cyber-incident investigations.
Understanding whether your organisation is captured hinges on three defined terms that recur throughout the draft:
The draft casts a wide net. Any entity that meets the “essential service operator” definition, assessed by reference to service type, scale and systemic significance, falls within scope. The INCD is empowered to designate specific organisations by order, but the draft also applies automatically to sectors and sub-sectors listed in a schedule to be annexed once enacted.
For the financial sector, industry observers expect the following categorisation to apply based on the draft’s structural logic and precedent from existing INCD guidance:
If your entity sits at step 4, the practical effect will nonetheless be substantial: covered banks and PSPs will be contractually obligated to flow down the draft’s requirements to their technology vendors, making compliance a commercial prerequisite for doing business with Israel’s financial sector.
The draft introduces a structured, dual-track breach-reporting regime. The provisions distinguish between a rapid preliminary notification designed to mobilise national response resources and a more detailed follow-up report intended for root-cause analysis and regulatory oversight. According to Barnea’s analysis of the bill, the reporting architecture mirrors European models (notably the NIS 2 Directive) but adds Israel-specific elements, including parallel notification to the INCD and the relevant sectoral regulator.
Upon becoming aware of a significant cyber incident, a covered organisation must submit a preliminary notification to the INCD without undue delay. The draft contemplates a tight initial window, with early indications from practitioner commentary suggesting the timeframe will be set in implementing regulations. This preliminary report is deliberately concise: its purpose is to alert the INCD to the nature and potential scope of the incident, not to deliver a complete forensic analysis.
A comprehensive incident report must follow within a prescribed period. According to analysis by Arnon Tadmor‑Levy, the detailed report must include the nature of the incident, affected systems, estimated impact, containment measures taken and a preliminary root-cause assessment. Covered entities in the financial sector will also need to address customer-data exposure and compliance with sectoral data-protection obligations, an area where Pearl Cohen has flagged the interaction with the draft’s own data-retention limitations.
Where a significant cyber incident involves the compromise of personal data or could affect customers’ financial accounts, the draft requires the covered entity to notify affected individuals and, where applicable, downstream service providers. The timing and form of customer notification are expected to be aligned with the Privacy Protection Authority’s existing guidance, supplemented by sector-specific instructions from the Bank of Israel or ISA.
| Entity Type | Reporting Timeframe (Draft Framework) | Reporting Authority / Notes |
|---|---|---|
| Regulated banks (licensed banking corporations) | Preliminary report: without undue delay upon detection; detailed follow-up report within the period to be prescribed in implementing regulations | Dual reporting to the INCD and the Bank of Israel Supervisor of Banks; customer notification required where personal data or account integrity is compromised |
| Fintechs and PSPs (licensed payment and financial-service companies) | Preliminary report: without undue delay; detailed follow-up within the prescribed period | Report to the INCD and the relevant sectoral regulator (ISA, Payments Authority or Bank of Israel depending on licence type); third-party dependency disclosures required |
| Payment-infrastructure providers (clearinghouses, card-scheme processors) | Immediate preliminary report; detailed follow-up within the prescribed period; continuity plans to be activated in parallel | INCD as lead authority; sectoral regulators informed; heightened obligations regarding systemic-risk assessment and cross-border notification where international payment networks are affected |
This is the operational core of the article. The cybersecurity compliance checklist below translates the draft’s provisions into discrete, prioritised tasks for banks, fintechs and PSPs. Items marked [Critical] should be initiated within the first 90 days; items marked [Important] within 180 days; and items marked [Recommended] within 360 days.
The draft bill’s emphasis on supply-chain resilience means that managing third-party cyber risk in Israel will become a regulated obligation, not merely a best practice. Covered entities will be expected to demonstrate that vendors and outsourcing partners operating critical systems meet equivalent security standards and that contractual arrangements enable rapid incident detection, notification and remediation.
Contractual controls alone are insufficient. Industry observers expect the INCD’s implementing regulations to require covered entities to maintain ongoing oversight of critical vendors, including periodic reassessment of security posture, monitoring of vendor threat-intelligence feeds and scenario planning for supply-chain disruption events. Early indications suggest that the INCD may issue sectoral guidance on vendor-monitoring frequency and methodology following the bill’s passage.
The draft significantly expands the INCD’s enforcement toolkit. According to Barnea’s client alert and the HUJI CSRCL preliminary overview, the bill empowers the INCD to issue binding administrative orders, including directives to remediate vulnerabilities, restrict system access or suspend specific services, and to impose financial penalties for non-compliance. The draft also contemplates criminal liability for the most serious breaches, such as deliberate obstruction of an INCD investigation or wilful failure to report a significant incident.
For financial-sector entities, the enforcement landscape is layered: the INCD’s administrative powers operate alongside the existing supervisory sanctions available to the Bank of Israel and the ISA. The likely practical effect will be dual-track enforcement, where a single cyber incident could trigger parallel proceedings from the INCD (under the new statute) and the sectoral regulator (under existing supervisory powers).
Mitigation strategies include:
The draft bill’s progress through the Knesset will determine the final compliance timeline, but regulated entities should not wait for enactment to begin preparation. The table below outlines a phased roadmap anchored to the current legislative trajectory.
| Phase | Timeframe | Key Activities |
|---|---|---|
| Phase 1, Foundation | 0–90 days (now) | Governance appointments; board briefing; asset inventory; gap analysis; IRP update; INCD contact established; budget secured |
| Phase 2, Build | 91–180 days | Technical-controls remediation; vendor-contract audit and renegotiation; tabletop exercises; reporting-workflow testing; Steering Committee operational |
| Phase 3, Embed | 181–360 days | Penetration testing and red-team exercises; RegTech deployment; compliance-monitoring dashboards; staff training programme; annual review cycle established |
| Legislative milestones (indicative) | 2026 | Draft published Jan–Feb 2026; public consultation period; Knesset committee review; implementing regulations expected to follow enactment |
A suggested RACI model for compliance activities: the CCO/CISO is Accountable; the Steering Committee is Responsible for workstream delivery; Legal and External Advisers are Consulted; and the Board is Informed through quarterly reporting. Budget categories to plan for include personnel (new hires or reallocation), technology (SIEM, endpoint detection, RegTech tools), external advisory (legal, forensic, penetration testing), training and awareness, and insurance (cyber-liability policy review).
The national cybersecurity draft bill Israel has published represents the most consequential regulatory development for the country’s financial sector in over a decade. The obligations it introduces, from board-level governance mandates to granular incident-reporting timelines and vendor-oversight duties, will require material investment in people, processes and technology. But the compliance window is open now, before the bill hardens into statute and the INCD begins exercising its expanded enforcement powers. Institutions that treat this period as an opportunity to build best-in-class cybersecurity compliance programmes will be better positioned not only to satisfy the new law, but to strengthen operational resilience and stakeholder trust.
For a tailored readiness assessment or to discuss how the draft bill applies to your organisation, contact Global Law Experts or browse the GLE lawyer directory to connect with a compliance specialist.
This article was produced by Global Law Experts. For specialist advice on this topic, contact Idan Levy at MITIGATE Compliance & Risk Management, a member of the Global Law Experts network.
posted 21 minutes ago
posted 46 minutes ago
posted 1 hour ago
posted 2 hours ago
posted 2 hours ago
posted 3 hours ago
posted 4 hours ago
posted 4 hours ago
posted 5 hours ago
posted 5 hours ago
posted 5 hours ago
posted 6 hours ago
No results available
Find the right Legal Expert for your business
Sign up for the latest legal briefings and news within Global Law Experts’ community, as well as a whole host of features, editorial and conference updates direct to your email inbox.
Naturally you can unsubscribe at any time.
Global Law Experts is dedicated to providing exceptional legal services to clients around the world. With a vast network of highly skilled and experienced lawyers, we are committed to delivering innovative and tailored solutions to meet the diverse needs of our clients in various jurisdictions.
Global Law Experts is dedicated to providing exceptional legal services to clients around the world. With a vast network of highly skilled and experienced lawyers, we are committed to delivering innovative and tailored solutions to meet the diverse needs of our clients in various jurisdictions.
Send welcome message