Cybersecurity 2026 Comparisons

Last Updated March 17, 2026

Contributed By ICT Legal Consulting

Law and Practice

Authors



ICT Legal Consulting (ICTLC) is an international law firm that provides strategic legal and regulatory support across privacy, data protection, intellectual property, and technology, media and telecommunications (TMT) law – with a strong focus on the normative and operational aspects of cybersecurity. The firm assists organisations with designing and implementing governance, compliance and security frameworks that meet the highest international standards. With over 80 professionals and a network active in more than 65 jurisdictions, ICTLC combines global co-ordination with local insight. Through its sister company ICT Cyber Consulting, the firm offers integrated cybersecurity services, including legal–technical risk assessments, resilience planning, and alignment with frameworks such as NIS2, DORA and the Cyber Resilience Act. ICTLC’s multidisciplinary expertise enables clients to navigate complex digital regulations and strengthen trust, compliance and resilience across their global operations.

Cybersecurity regulation in Italy is structured around an integrated governance model in which national security considerations, the continuity of essential services and the harmonisation objectives of EU law converge. Cybersecurity is treated as a systemic condition for institutional stability, economic resilience and trust in digital transformation, rather than as a purely technical or sector-specific matter. This conceptual framework informs both strategic planning and legislative intervention, and underlies the gradual consolidation of cybersecurity as a core component of organisational governance. At the strategic level, Italy addresses cybersecurity through a national framework that connects prevention, preparedness, resilience and co-ordinated response. The National Cybersecurity Strategy 2022–2026 articulates cybersecurity as a public interest of systemic relevance and situates digital security within a broader vision of national resilience. Within this vision, public authorities, private operators, and research and industrial actors are regarded as participants in a shared security ecosystem, rather than as isolated recipients of regulatory obligations.

From a legislative perspective, the Italian approach rests on the coexistence of two complementary regulatory axes. One axis is oriented towards the protection of national security and strategic State interests, and addresses cybersecurity as a matter of sovereignty and resilience. The other axis reflects the EU internal market approach, which treats cybersecurity as a horizontal requirement for the reliable provision of essential and important services across sectors. These axes operate cumulatively, and their interaction determines both the scope and the intensity of compliance duties.

The national cybersecurity perimeter represents the most visible expression of the security-oriented axis. It identifies networks, information systems and ICT services that support essential State functions and links cybersecurity obligations to strategic risk, supply-chain control and centralised incident awareness. In parallel, the implementation of the NIS2 framework embodies the market-oriented axis and introduces a governance-driven model in which cybersecurity is embedded in management accountability and organisational decision-making. The regulatory intent is to ensure that cyber-risk is internalised within corporate governance structures and addressed through continuous oversight rather than episodic compliance.

Overall, the Italian cybersecurity strategy reflects a transition from reactive and fragmented measures to an integrated resilience model. Regulatory expectations focus on the capacity of organisations to anticipate risks, preserve operational continuity and engage constructively with public authorities through structured reporting and co-operation mechanisms. Cybersecurity is therefore framed as an ongoing governance obligation that permeates organisational structures, contractual relationships and operational processes.

The Italian cybersecurity legal framework is composed of EU regulations with direct applicability, EU directives implemented through national legislation and domestic instruments rooted in national security. The core of the cross-sector framework derives from the implementation of Directive (EU) 2022/2555, commonly referred to as NIS2, which establishes a harmonised regime for cybersecurity risk management and incident reporting. Through its transposition, Italy has adopted a model that applies to a wide range of public and private entities and that is explicitly grounded in proportionality, managerial accountability and risk-based governance.

The NIS2-derived framework identifies categories of entities operating in critical and important sectors and subjects them to obligations relating to governance arrangements, technical and organisational measures, supply-chain security and incident notification. Scope is defined primarily by reference to the nature and relevance of the services provided rather than by formal legal status, reflecting the EU policy choice to prioritise functional importance over institutional form. This approach ensures that cybersecurity obligations attach to activities capable of generating systemic risk, irrespective of the organisational model adopted.

Alongside the NIS2 framework, Italy maintains a distinct national regime designed to protect strategic assets and services whose disruption may prejudice national security. The national cybersecurity perimeter applies to public and private entities whose networks, information systems and ICT services support essential State functions. This regime imposes enhanced organisational and technical obligations and operates through implementing measures that specify security requirements, notification categories and supervisory interaction. The perimeter therefore introduces a security-driven layer of compliance that complements EU-derived obligations and reflects national risk priorities.

Institutional consolidation of cybersecurity governance has been achieved through the establishment of the Agency for National Cybersecurity, which centralises national functions relating to strategy, supervision and incident response. This institutional architecture supports coherence between preventative regulation and operational response, and reduces fragmentation in public intervention. The Agency operates at the intersection of policy development, supervisory oversight and technical co-ordination, reinforcing the effectiveness of the overall framework.

Sector-specific regimes further enrich the legal landscape. In the financial sector, the Digital Operational Resilience Act (DORA) applies directly and governs ICT risk management, incident reporting, resilience testing and third-party oversight. In the domain of products and digital supply chains, the Cyber Resilience Act introduces horizontal security-by-design obligations for products with digital elements, extending cybersecurity compliance beyond organisational measures to the entire product life cycle. Italian cybersecurity law is therefore characterised by the coexistence of principle-based statutory obligations and operationally decisive regulatory expectations, which together define the effective standard of diligence required from regulated entities.

Cybersecurity oversight in Italy is exercised through a co-ordinated system of authorities, within which the Agency for National Cybersecurity occupies a central position. The Agency acts as the institutional hub for national cybersecurity governance and combines strategic co-ordination, supervisory responsibilities and operational incident-response capabilities. Within the NIS2 framework, it serves as the competent authority and single point of contact, ensuring consistency in supervision and information exchange at national and European level.

The Agency also hosts and operates the national Computer Security Incident Response Team, which supports incident handling, technical co-ordination and situational awareness. This integration enables a direct link between regulatory supervision and operational response, and strengthens the effectiveness of incident notification and follow-up activities. Cybersecurity incidents are thus treated not only as compliance events but also as matters of systemic resilience requiring co-ordinated management.

Sectoral regulators retain supervisory and enforcement powers within their respective domains, and integrate cybersecurity and operational resilience requirements into existing regulatory frameworks. In regulated sectors, particularly financial services, cybersecurity obligations are assessed as part of broader governance and risk management evaluations. Supervisory scrutiny extends to ICT outsourcing arrangements, internal control systems and preparedness for cyber-incidents, reflecting the increasing convergence between cybersecurity regulation and prudential supervision.

Investigative and enforcement powers vary depending on the applicable regime but generally include information requests, audits, inspections, binding corrective measures and administrative sanctions. In regimes oriented towards national security, supervisory tools also encompass enhanced scrutiny of strategic ICT procurement and supply-chain arrangements. The Italian regulatory landscape therefore requires entities to interact with multiple authorities in a co-ordinated manner and to structure internal governance so that reporting, escalation and remediation processes remain coherent across different oversight models.

Cybersecurity obligations for essential or critical entities in Italy arise from the intersection of the NIS2 implementation framework and the national cybersecurity perimeter, supplemented by sector-specific provisions and supervisory practice. Under the NIS2-derived regime, entities fall within scope by reference to the sectors in which they operate and the relevance of the services they provide. The framework captures a broad spectrum of activities, including energy, transport, health, digital infrastructure and public administration, and applies to both public and private operators.

The national cybersecurity perimeter captures a distinct category of entities whose networks, information systems and ICT services support essential State functions and whose disruption may affect national security. Scope is determined by strategic relevance rather than by sector alone, with the result that the perimeter may extend to entities not otherwise subject to sector-specific cybersecurity regulation. This approach reflects a focus on functional criticality and systemic impact.

Digital infrastructure and managed service providers assume relevance under both regimes through different mechanisms. Under NIS2, certain digital services and infrastructures may be directly subject to obligations. Under the national perimeter, managed services become relevant in so far as they form part of the critical service chain supporting protected functions. Interpretative challenges typically arise at the boundaries between digital services and general ICT enablement, and in the classification of cloud and managed service providers whose contractual positioning varies across sectors.

In practice, scope determination is shaped by implementing measures, registration and notification processes, and institutional guidance. Supervisory assessment focuses on whether entities have correctly identified their regulatory exposure and documented the reasoning underlying classification decisions. Accurate scoping is therefore treated as a substantive compliance obligation rather than as a purely formal exercise.

Baseline cybersecurity requirements applicable to essential or critical entities in Italy are framed in risk-based terms and combine governance duties with technical and organisational controls. Under NIS2-derived frameworks, management bodies bear responsibility for approving and overseeing cybersecurity risk management measures and for ensuring that adequate resources and accountability structures are in place. Cybersecurity is therefore embedded within corporate governance rather than delegated exclusively to technical functions.

Technical and organisational measures are expected to address asset identification, risk assessment, access control, monitoring, vulnerability management and incident handling. Business continuity and disaster recovery arrangements form an integral part of this framework, particularly where service availability and integrity are critical to public interests. Emphasis is placed on demonstrable control and on the ability to adapt measures to evolving threat environments.

Supply-chain security constitutes a central component of compliance. Entities are expected to identify and manage risks arising from relationships with suppliers and service providers, including managed ICT services and cloud infrastructures. Due diligence, contractual safeguards and ongoing oversight are required to ensure that outsourcing arrangements do not undermine resilience or controllability.

Where the national cybersecurity perimeter applies, requirements acquire a national security dimension. Implementing measures specify notification categories and security obligations, and allow for technical determinations and phased implementation. Compliance therefore requires continuous alignment with supervisory acts and updated taxonomies rather than a one-off implementation of static controls.

Incident response and notification obligations in Italy depend on the applicable regime and on the classification of both the entity and the incident. Under NIS2-derived frameworks, notification duties are structured around staged communication with the competent authority. Initial notifications provide early situational awareness, while subsequent updates address technical analysis, impact assessment and remediation measures. Notifications generally cover the nature of the incident, its suspected cause, operational effects and mitigation steps.

Parallel notification obligations arise where incidents affect personal data, financial stability or national security. Under data protection law, personal data breaches are notified to the supervisory authority without undue delay and, where feasible, within 72 hours of awareness, subject to a risk-based threshold. Communication to affected individuals occurs where a high risk to rights and freedoms is identified. These obligations frequently intersect with cybersecurity reporting requirements and require co-ordinated handling.

In the financial sector, DORA introduces harmonised reporting duties for major ICT-related incidents, and requires alignment between internal incident classification and regulatory materiality thresholds. Under the national cybersecurity perimeter, incident notification supports national situational awareness and crisis co-ordination, and is linked to predefined categories reflecting strategic impact.

The coexistence of regimes requires a disciplined approach to incident governance. Mature compliance frameworks integrate technical response, legal assessment and regulatory communication into a single process that supports timely notification, progressive updates and post-incident analysis.

State responsibilities for national cyber-resilience in Italy operate through strategic direction, co-ordination of incident response, and development of common capabilities. National policy frames public-private co-operation and information sharing as structural components of cyber defence and resilience.

The Agency for National Cybersecurity acts as the principal institutional vehicle for these responsibilities, supporting prevention activities, facilitating threat intelligence exchange and operating the national Computer Security Incident Response Team (CSIRT). The State also promotes qualification and assurance mechanisms for technologies used in critical environments, and issues guidance and technical determinations that shape operational practice.

Public-private co-operation is realised through structured information exchanges, reporting frameworks and sectoral interaction, enabling authorities to develop situational awareness and disseminate alerts. These responsibilities interact with EU co-operation mechanisms under NIS2, which integrate national authorities into a networked European response architecture and reinforce the need for coherent national procedures.

Operational resilience in the Italian financial sector is primarily governed by DORA, which applies directly and structures ICT risk management, incident reporting, resilience testing and third-party oversight for a broad range of financial entities. Digital operational resilience is treated as a prudential issue and integrated into governance and risk management frameworks.

Scope is functionally defined and captures entities by reference to regulated activities rather than legal form. ICT service providers located outside Italy become relevant where they support in-scope financial entities, and supervisory focus centres on contractual enforceability, auditability and exit strategies. National authorities operationalise the framework through sectoral supervision and reporting documentation.

DORA introduces a prescriptive contractual architecture designed to ensure that financial entities retain effective control over outsourced ICT services supporting critical or important functions. The definition of ICT service providers focuses on the nature and role of services within the regulated entity’s ICT environment.

Contractual requirements address service description, data location, security safeguards, incident notification and co-operation duties. Rights of access, inspection and audit are central, as are mechanisms to control subcontracting and chain outsourcing. Exit strategies and portability arrangements are treated as core resilience elements, reflecting the need to preserve continuity and controllability.

In practice, the contractual framework required by DORA interacts closely with broader outsourcing governance and internal control expectations. Financial entities are expected to demonstrate not only the formal inclusion of mandatory clauses but also their operational effectiveness. This requires that contractual rights of access, audit and information be supported by internal processes capable of exercising those rights in a meaningful way. Supervisory scrutiny therefore extends beyond contractual drafting and focuses on whether oversight mechanisms operate in practice and are integrated into the entity’s risk and compliance functions.

The emphasis on contractual control also reflects concerns relating to concentration risk and systemic dependency on a limited number of ICT service providers. Governance arrangements increasingly require that entities map critical dependencies, assess substitutability, and document decision-making processes relating to provider selection and retention. Contractual provisions addressing termination and transition are assessed in light of these considerations and are expected to align with internal contingency planning rather than operate as abstract legal safeguards.

Key obligations encompass governance, ICT risk management, incident management and reporting, resilience testing and third-party risk management. Management bodies are responsible for the ICT risk framework and its integration into overall governance. ICT risk management covers identification, protection, detection, response and recovery.

Incident management is structured as a regulated life cycle, and reporting duties require alignment between internal classification and regulatory thresholds. Testing obligations range from basic resilience assessments to advanced threat-led penetration testing, reflecting a maturity-based approach.

Enforcement operates through supervisory processes assessing governance, controls and evidence of compliance. Measures include information requests, inspections, corrective actions and administrative sanctions. Even where critical ICT service providers fall under EU-level oversight, regulated entities remain the primary addressees of supervision.

Supervisory practice in the area of operational resilience increasingly reflects an outcome-oriented approach. Authorities assess whether governance structures, internal controls and documentation demonstrate an effective capacity to manage ICT risk under stress conditions. This assessment is not limited to formal compliance with regulatory requirements but extends to the consistency between policies, operational procedures and actual incident-handling experience. Deficiencies identified in one area, such as third-party oversight or incident escalation, may therefore have broader implications for the overall supervisory assessment of the entity.

Enforcement action in this context serves both corrective and preventative functions. Corrective measures address identified weaknesses and require remediation within defined timelines, while preventative measures aim to reduce the likelihood of future disruptions by strengthening governance and control frameworks. The supervisory dialogue accompanying these measures contributes to shaping market practice and clarifies regulatory expectations regarding acceptable resilience standards.

International data transfers intersect operational resilience where outsourcing and ICT services involve cross-border processing and remote access. Governance therefore requires transparency regarding data locations and enforceability of access and audit rights across jurisdictions. Data protection transfer rules interact with resilience obligations by requiring that availability, integrity and recoverability remain assured notwithstanding third-country risks.

Threat-led penetration testing forms part of the advanced testing framework under DORA and evaluates resilience against realistic adversarial scenarios. Testing is grounded in threat intelligence and integrated into governance so that findings translate into measurable improvements.

Cyber-resilience in Italy is increasingly shaped by horizontal EU product security regulation that addresses cybersecurity vulnerabilities as systemic supply-chain risks rather than as isolated technical flaws. This regulatory evolution reflects the recognition that digital products and services constitute critical components of economic and social infrastructures, and that weaknesses embedded at design stage may propagate across sectors and jurisdictions. Within this context, the Cyber Resilience Act establishes a comprehensive framework of essential cybersecurity requirements for products with digital elements, and introduces security-by-design and security-by-default as legal obligations tied to market access.

The scope of cyber-resilience legislation extends beyond traditional ICT products and encompasses a wide range of connected devices, software components and digital services that rely on network connectivity or remote update capabilities. Manufacturers, importers and distributors are required to ensure that products placed on the market meet baseline cybersecurity standards throughout their life cycle. Cyber-resilience is therefore treated not merely as a feature of organisational processes but as an intrinsic characteristic of products and services that may affect downstream users and critical environments.

This product-focused regime complements organisational cybersecurity frameworks by addressing risks at source and by reducing systemic exposure to vulnerabilities that may otherwise be inherited by operators. In the Italian context, cyber-resilience legislation interacts with procurement practices, particularly in critical sectors and public administration, where compliance with security requirements increasingly functions as a prerequisite for market participation. The resulting regulatory landscape connects product security, supply-chain governance and operational resilience within a unified risk management logic.

The product-focused nature of cyber-resilience legislation alters the traditional allocation of cybersecurity responsibilities by extending legal obligations upstream in the supply chain. Security considerations therefore influence design choices, component selection and update mechanisms from an early stage. This shift has practical implications for contractual relationships between manufacturers and downstream operators, as compliance with cybersecurity requirements becomes a shared concern that affects liability allocation, information sharing and incident management across the product life cycle.

In regulated and critical environments, cyber-resilience requirements also interact with procurement processes. Contracting authorities and regulated operators increasingly consider compliance with product security obligations as an element of risk assessment and vendor selection. This interaction reinforces the preventative function of cyber-resilience legislation by incentivising higher security standards at market entry and by reducing the propagation of vulnerabilities in operational environments.

Key obligations under cyber-resilience legislation focus on secure design, vulnerability handling and life cycle management. Economic operators are required to identify and address cybersecurity risks during the design and development phases and to implement processes that enable timely detection, remediation and communication of vulnerabilities. These obligations are structured to ensure that security considerations are embedded within product governance and are not relegated to post-market responses.

Post-market surveillance constitutes a central element of compliance. Operators are expected to monitor products in use, to assess emerging threats and to provide security updates and patches within appropriate timeframes. Transparency obligations require that vulnerabilities and incidents be documented and communicated to competent authorities where thresholds are met. These mechanisms support regulatory oversight and contribute to collective situational awareness.

Enforcement operates through market surveillance authorities empowered to assess conformity, require corrective actions and impose sanctions. In serious cases, measures may include restrictions on market availability. Cyber-resilience obligations therefore extend beyond compliance formalities and operate as enforceable conditions for continued market participation.

Cybersecurity certification in Italy operates primarily within the EU framework established by Regulation (EU) 2019/881, commonly referred to as the Cybersecurity Act. This framework provides for European cybersecurity certification schemes covering ICT products, services and processes, and defines assurance levels reflecting the degree of confidence in security properties. Certification schemes function as instruments of risk communication and assurance rather than as substitutes for substantive security obligations.

Certification under the EU framework is, in principle, voluntary, but it acquires practical relevance through regulatory expectations, procurement requirements and market practice. In critical sectors and public procurement, certification increasingly operates as a benchmark for acceptable security standards and may influence supplier selection and contractual allocation of risk. In this sense, certification functions as a governance tool that complements statutory obligations by providing standardised evidence of compliance.

In the Italian legal environment, cybersecurity certification interacts with sector-specific regimes and with broader regulatory frameworks governing outsourcing and supply-chain security. Certified products and services may benefit from facilitated assessment in regulated environments, but certification does not displace the responsibility of regulated entities to ensure that cybersecurity requirements are met in practice. The role of certification is therefore to support, rather than replace, comprehensive risk management and oversight.

Cybersecurity obligations in the context of personal data processing derive from the security principle enshrined in data protection law and from the associated breach notification regime. Controllers and processors are required to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk. Cyber-incidents that compromise the confidentiality, integrity or availability of personal data frequently trigger parallel obligations under cybersecurity and data protection frameworks.

The breach notification regime requires that personal data breaches be assessed promptly and, where risk thresholds are met, notified to the competent supervisory authority within prescribed timeframes. Communication to affected individuals is required where a high risk to rights and freedoms is identified. These obligations necessitate close co-ordination between cybersecurity incident response and data protection governance to ensure consistency and accuracy in assessments and communications.

The interaction between cybersecurity regulation and data protection law reinforces the need for integrated governance structures. Organisations are expected to align incident classification, escalation and reporting processes so that cybersecurity events are managed holistically and in compliance with overlapping legal regimes.

The overlap between cybersecurity incident management and personal data breach assessment requires organisations to operate integrated decision-making processes. Technical incident-response teams, legal functions and data protection governance structures must co-ordinate in real time to assess the nature and impact of incidents and to determine applicable notification obligations. Fragmented handling of cybersecurity and data protection aspects increases the risk of inconsistent assessments and delayed or inaccurate notifications.

Supervisory authorities increasingly expect that organisations document the reasoning underlying breach assessments and notification decisions. This documentation supports accountability and enables ex post review of incident handling. As a result, cybersecurity governance and data protection compliance converge in practice, reinforcing the need for aligned policies, shared escalation pathways and consistent communication strategies.

Cybersecurity obligations relating to artificial intelligence (AI) systems arise primarily from the EU’s risk-based regulatory approach to AI, and intersect with general cybersecurity and data protection requirements. Security is treated as a foundational element of trustworthy AI and encompasses robustness, resilience against manipulation, and protection of model components and data throughout the life cycle.

In practice, cybersecurity obligations in the AI context require organisations to manage risks associated with data poisoning, model theft and unauthorised access, and to ensure that supply-chain dependencies do not undermine system integrity. These obligations are implemented through organisational governance, secure development practices and continuous monitoring rather than through isolated technical controls. The convergence between AI governance and cybersecurity regulation reflects the recognition that digital risks are increasingly interconnected and require co-ordinated management.

Cybersecurity obligations in the healthcare sector arise from the convergence of cross-sector cybersecurity regimes, data protection requirements and sector-specific risk considerations. Healthcare providers and operators of health information systems are subject to organisational and technical security obligations designed to protect sensitive health data and to ensure the availability and integrity of critical services according to NIS2.

Connected medical devices and digital health technologies introduce additional cybersecurity considerations, as vulnerabilities may affect patient safety and continuity of care. Product security obligations therefore interact with healthcare regulation and procurement practices. Incident response and notification duties in healthcare environments require particular sensitivity to operational continuity and to the potential impact on patients and public trust. Cybersecurity governance in this sector integrates technical resilience with heightened ethical and regulatory expectations.

ICT Legal Consulting

ICTLC - ICT Legal Consulting
Via Borgonuovo 12
20121 Milan
Italy

+39 028 424 7194

+39 027 0051 2101

info@ictlc.com www.ictlc.com
Author Business Card

Law and Practice in Italy

Authors



ICT Legal Consulting (ICTLC) is an international law firm that provides strategic legal and regulatory support across privacy, data protection, intellectual property, and technology, media and telecommunications (TMT) law – with a strong focus on the normative and operational aspects of cybersecurity. The firm assists organisations with designing and implementing governance, compliance and security frameworks that meet the highest international standards. With over 80 professionals and a network active in more than 65 jurisdictions, ICTLC combines global co-ordination with local insight. Through its sister company ICT Cyber Consulting, the firm offers integrated cybersecurity services, including legal–technical risk assessments, resilience planning, and alignment with frameworks such as NIS2, DORA and the Cyber Resilience Act. ICTLC’s multidisciplinary expertise enables clients to navigate complex digital regulations and strengthen trust, compliance and resilience across their global operations.