Cybersecurity 2026

Last Updated March 17, 2026

Italy

Law and Practice

Authors



ICT Legal Consulting (ICTLC) is an international law firm that provides strategic legal and regulatory support across privacy, data protection, intellectual property, and technology, media and telecommunications (TMT) law – with a strong focus on the normative and operational aspects of cybersecurity. The firm assists organisations with designing and implementing governance, compliance and security frameworks that meet the highest international standards. With over 80 professionals and a network active in more than 65 jurisdictions, ICTLC combines global co-ordination with local insight. Through its sister company ICT Cyber Consulting, the firm offers integrated cybersecurity services, including legal–technical risk assessments, resilience planning, and alignment with frameworks such as NIS2, DORA and the Cyber Resilience Act. ICTLC’s multidisciplinary expertise enables clients to navigate complex digital regulations and strengthen trust, compliance and resilience across their global operations.

Cybersecurity regulation in Italy is structured around an integrated governance model in which national security considerations, the continuity of essential services and the harmonisation objectives of EU law converge. Cybersecurity is treated as a systemic condition for institutional stability, economic resilience and trust in digital transformation, rather than as a purely technical or sector-specific matter. This conceptual framework informs both strategic planning and legislative intervention, and underlies the gradual consolidation of cybersecurity as a core component of organisational governance. At the strategic level, Italy addresses cybersecurity through a national framework that connects prevention, preparedness, resilience and co-ordinated response. The National Cybersecurity Strategy 2022–2026 articulates cybersecurity as a public interest of systemic relevance and situates digital security within a broader vision of national resilience. Within this vision, public authorities, private operators, and research and industrial actors are regarded as participants in a shared security ecosystem, rather than as isolated recipients of regulatory obligations.

From a legislative perspective, the Italian approach rests on the coexistence of two complementary regulatory axes. One axis is oriented towards the protection of national security and strategic State interests, and addresses cybersecurity as a matter of sovereignty and resilience. The other axis reflects the EU internal market approach, which treats cybersecurity as a horizontal requirement for the reliable provision of essential and important services across sectors. These axes operate cumulatively, and their interaction determines both the scope and the intensity of compliance duties.

The national cybersecurity perimeter represents the most visible expression of the security-oriented axis. It identifies networks, information systems and ICT services that support essential State functions and links cybersecurity obligations to strategic risk, supply-chain control and centralised incident awareness. In parallel, the implementation of the NIS2 framework embodies the market-oriented axis and introduces a governance-driven model in which cybersecurity is embedded in management accountability and organisational decision-making. The regulatory intent is to ensure that cyber-risk is internalised within corporate governance structures and addressed through continuous oversight rather than episodic compliance.

Overall, the Italian cybersecurity strategy reflects a transition from reactive and fragmented measures to an integrated resilience model. Regulatory expectations focus on the capacity of organisations to anticipate risks, preserve operational continuity and engage constructively with public authorities through structured reporting and co-operation mechanisms. Cybersecurity is therefore framed as an ongoing governance obligation that permeates organisational structures, contractual relationships and operational processes.

The Italian cybersecurity legal framework is composed of EU regulations with direct applicability, EU directives implemented through national legislation and domestic instruments rooted in national security. The core of the cross-sector framework derives from the implementation of Directive (EU) 2022/2555, commonly referred to as NIS2, which establishes a harmonised regime for cybersecurity risk management and incident reporting. Through its transposition, Italy has adopted a model that applies to a wide range of public and private entities and that is explicitly grounded in proportionality, managerial accountability and risk-based governance.

The NIS2-derived framework identifies categories of entities operating in critical and important sectors and subjects them to obligations relating to governance arrangements, technical and organisational measures, supply-chain security and incident notification. Scope is defined primarily by reference to the nature and relevance of the services provided rather than by formal legal status, reflecting the EU policy choice to prioritise functional importance over institutional form. This approach ensures that cybersecurity obligations attach to activities capable of generating systemic risk, irrespective of the organisational model adopted.

Alongside the NIS2 framework, Italy maintains a distinct national regime designed to protect strategic assets and services whose disruption may prejudice national security. The national cybersecurity perimeter applies to public and private entities whose networks, information systems and ICT services support essential State functions. This regime imposes enhanced organisational and technical obligations and operates through implementing measures that specify security requirements, notification categories and supervisory interaction. The perimeter therefore introduces a security-driven layer of compliance that complements EU-derived obligations and reflects national risk priorities.

Institutional consolidation of cybersecurity governance has been achieved through the establishment of the Agency for National Cybersecurity, which centralises national functions relating to strategy, supervision and incident response. This institutional architecture supports coherence between preventative regulation and operational response, and reduces fragmentation in public intervention. The Agency operates at the intersection of policy development, supervisory oversight and technical co-ordination, reinforcing the effectiveness of the overall framework.

Sector-specific regimes further enrich the legal landscape. In the financial sector, the Digital Operational Resilience Act (DORA) applies directly and governs ICT risk management, incident reporting, resilience testing and third-party oversight. In the domain of products and digital supply chains, the Cyber Resilience Act introduces horizontal security-by-design obligations for products with digital elements, extending cybersecurity compliance beyond organisational measures to the entire product life cycle. Italian cybersecurity law is therefore characterised by the coexistence of principle-based statutory obligations and operationally decisive regulatory expectations, which together define the effective standard of diligence required from regulated entities.

Cybersecurity oversight in Italy is exercised through a co-ordinated system of authorities, within which the Agency for National Cybersecurity occupies a central position. The Agency acts as the institutional hub for national cybersecurity governance and combines strategic co-ordination, supervisory responsibilities and operational incident-response capabilities. Within the NIS2 framework, it serves as the competent authority and single point of contact, ensuring consistency in supervision and information exchange at national and European level.

The Agency also hosts and operates the national Computer Security Incident Response Team, which supports incident handling, technical co-ordination and situational awareness. This integration enables a direct link between regulatory supervision and operational response, and strengthens the effectiveness of incident notification and follow-up activities. Cybersecurity incidents are thus treated not only as compliance events but also as matters of systemic resilience requiring co-ordinated management.

Sectoral regulators retain supervisory and enforcement powers within their respective domains, and integrate cybersecurity and operational resilience requirements into existing regulatory frameworks. In regulated sectors, particularly financial services, cybersecurity obligations are assessed as part of broader governance and risk management evaluations. Supervisory scrutiny extends to ICT outsourcing arrangements, internal control systems and preparedness for cyber-incidents, reflecting the increasing convergence between cybersecurity regulation and prudential supervision.

Investigative and enforcement powers vary depending on the applicable regime but generally include information requests, audits, inspections, binding corrective measures and administrative sanctions. In regimes oriented towards national security, supervisory tools also encompass enhanced scrutiny of strategic ICT procurement and supply-chain arrangements. The Italian regulatory landscape therefore requires entities to interact with multiple authorities in a co-ordinated manner and to structure internal governance so that reporting, escalation and remediation processes remain coherent across different oversight models.

Cybersecurity obligations for essential or critical entities in Italy arise from the intersection of the NIS2 implementation framework and the national cybersecurity perimeter, supplemented by sector-specific provisions and supervisory practice. Under the NIS2-derived regime, entities fall within scope by reference to the sectors in which they operate and the relevance of the services they provide. The framework captures a broad spectrum of activities, including energy, transport, health, digital infrastructure and public administration, and applies to both public and private operators.

The national cybersecurity perimeter captures a distinct category of entities whose networks, information systems and ICT services support essential State functions and whose disruption may affect national security. Scope is determined by strategic relevance rather than by sector alone, with the result that the perimeter may extend to entities not otherwise subject to sector-specific cybersecurity regulation. This approach reflects a focus on functional criticality and systemic impact.

Digital infrastructure and managed service providers assume relevance under both regimes through different mechanisms. Under NIS2, certain digital services and infrastructures may be directly subject to obligations. Under the national perimeter, managed services become relevant in so far as they form part of the critical service chain supporting protected functions. Interpretative challenges typically arise at the boundaries between digital services and general ICT enablement, and in the classification of cloud and managed service providers whose contractual positioning varies across sectors.

In practice, scope determination is shaped by implementing measures, registration and notification processes, and institutional guidance. Supervisory assessment focuses on whether entities have correctly identified their regulatory exposure and documented the reasoning underlying classification decisions. Accurate scoping is therefore treated as a substantive compliance obligation rather than as a purely formal exercise.

Baseline cybersecurity requirements applicable to essential or critical entities in Italy are framed in risk-based terms and combine governance duties with technical and organisational controls. Under NIS2-derived frameworks, management bodies bear responsibility for approving and overseeing cybersecurity risk management measures and for ensuring that adequate resources and accountability structures are in place. Cybersecurity is therefore embedded within corporate governance rather than delegated exclusively to technical functions.

Technical and organisational measures are expected to address asset identification, risk assessment, access control, monitoring, vulnerability management and incident handling. Business continuity and disaster recovery arrangements form an integral part of this framework, particularly where service availability and integrity are critical to public interests. Emphasis is placed on demonstrable control and on the ability to adapt measures to evolving threat environments.

Supply-chain security constitutes a central component of compliance. Entities are expected to identify and manage risks arising from relationships with suppliers and service providers, including managed ICT services and cloud infrastructures. Due diligence, contractual safeguards and ongoing oversight are required to ensure that outsourcing arrangements do not undermine resilience or controllability.

Where the national cybersecurity perimeter applies, requirements acquire a national security dimension. Implementing measures specify notification categories and security obligations, and allow for technical determinations and phased implementation. Compliance therefore requires continuous alignment with supervisory acts and updated taxonomies rather than a one-off implementation of static controls.

Incident response and notification obligations in Italy depend on the applicable regime and on the classification of both the entity and the incident. Under NIS2-derived frameworks, notification duties are structured around staged communication with the competent authority. Initial notifications provide early situational awareness, while subsequent updates address technical analysis, impact assessment and remediation measures. Notifications generally cover the nature of the incident, its suspected cause, operational effects and mitigation steps.

Parallel notification obligations arise where incidents affect personal data, financial stability or national security. Under data protection law, personal data breaches are notified to the supervisory authority without undue delay and, where feasible, within 72 hours of awareness, subject to a risk-based threshold. Communication to affected individuals occurs where a high risk to rights and freedoms is identified. These obligations frequently intersect with cybersecurity reporting requirements and require co-ordinated handling.

In the financial sector, DORA introduces harmonised reporting duties for major ICT-related incidents, and requires alignment between internal incident classification and regulatory materiality thresholds. Under the national cybersecurity perimeter, incident notification supports national situational awareness and crisis co-ordination, and is linked to predefined categories reflecting strategic impact.

The coexistence of regimes requires a disciplined approach to incident governance. Mature compliance frameworks integrate technical response, legal assessment and regulatory communication into a single process that supports timely notification, progressive updates and post-incident analysis.

State responsibilities for national cyber-resilience in Italy operate through strategic direction, co-ordination of incident response, and development of common capabilities. National policy frames public-private co-operation and information sharing as structural components of cyber defence and resilience.

The Agency for National Cybersecurity acts as the principal institutional vehicle for these responsibilities, supporting prevention activities, facilitating threat intelligence exchange and operating the national Computer Security Incident Response Team (CSIRT). The State also promotes qualification and assurance mechanisms for technologies used in critical environments, and issues guidance and technical determinations that shape operational practice.

Public-private co-operation is realised through structured information exchanges, reporting frameworks and sectoral interaction, enabling authorities to develop situational awareness and disseminate alerts. These responsibilities interact with EU co-operation mechanisms under NIS2, which integrate national authorities into a networked European response architecture and reinforce the need for coherent national procedures.

Operational resilience in the Italian financial sector is primarily governed by DORA, which applies directly and structures ICT risk management, incident reporting, resilience testing and third-party oversight for a broad range of financial entities. Digital operational resilience is treated as a prudential issue and integrated into governance and risk management frameworks.

Scope is functionally defined and captures entities by reference to regulated activities rather than legal form. ICT service providers located outside Italy become relevant where they support in-scope financial entities, and supervisory focus centres on contractual enforceability, auditability and exit strategies. National authorities operationalise the framework through sectoral supervision and reporting documentation.

DORA introduces a prescriptive contractual architecture designed to ensure that financial entities retain effective control over outsourced ICT services supporting critical or important functions. The definition of ICT service providers focuses on the nature and role of services within the regulated entity’s ICT environment.

Contractual requirements address service description, data location, security safeguards, incident notification and co-operation duties. Rights of access, inspection and audit are central, as are mechanisms to control subcontracting and chain outsourcing. Exit strategies and portability arrangements are treated as core resilience elements, reflecting the need to preserve continuity and controllability.

In practice, the contractual framework required by DORA interacts closely with broader outsourcing governance and internal control expectations. Financial entities are expected to demonstrate not only the formal inclusion of mandatory clauses but also their operational effectiveness. This requires that contractual rights of access, audit and information be supported by internal processes capable of exercising those rights in a meaningful way. Supervisory scrutiny therefore extends beyond contractual drafting and focuses on whether oversight mechanisms operate in practice and are integrated into the entity’s risk and compliance functions.

The emphasis on contractual control also reflects concerns relating to concentration risk and systemic dependency on a limited number of ICT service providers. Governance arrangements increasingly require that entities map critical dependencies, assess substitutability, and document decision-making processes relating to provider selection and retention. Contractual provisions addressing termination and transition are assessed in light of these considerations and are expected to align with internal contingency planning rather than operate as abstract legal safeguards.

Key obligations encompass governance, ICT risk management, incident management and reporting, resilience testing and third-party risk management. Management bodies are responsible for the ICT risk framework and its integration into overall governance. ICT risk management covers identification, protection, detection, response and recovery.

Incident management is structured as a regulated life cycle, and reporting duties require alignment between internal classification and regulatory thresholds. Testing obligations range from basic resilience assessments to advanced threat-led penetration testing, reflecting a maturity-based approach.

Enforcement operates through supervisory processes assessing governance, controls and evidence of compliance. Measures include information requests, inspections, corrective actions and administrative sanctions. Even where critical ICT service providers fall under EU-level oversight, regulated entities remain the primary addressees of supervision.

Supervisory practice in the area of operational resilience increasingly reflects an outcome-oriented approach. Authorities assess whether governance structures, internal controls and documentation demonstrate an effective capacity to manage ICT risk under stress conditions. This assessment is not limited to formal compliance with regulatory requirements but extends to the consistency between policies, operational procedures and actual incident-handling experience. Deficiencies identified in one area, such as third-party oversight or incident escalation, may therefore have broader implications for the overall supervisory assessment of the entity.

Enforcement action in this context serves both corrective and preventative functions. Corrective measures address identified weaknesses and require remediation within defined timelines, while preventative measures aim to reduce the likelihood of future disruptions by strengthening governance and control frameworks. The supervisory dialogue accompanying these measures contributes to shaping market practice and clarifies regulatory expectations regarding acceptable resilience standards.

International data transfers intersect operational resilience where outsourcing and ICT services involve cross-border processing and remote access. Governance therefore requires transparency regarding data locations and enforceability of access and audit rights across jurisdictions. Data protection transfer rules interact with resilience obligations by requiring that availability, integrity and recoverability remain assured notwithstanding third-country risks.

Threat-led penetration testing forms part of the advanced testing framework under DORA and evaluates resilience against realistic adversarial scenarios. Testing is grounded in threat intelligence and integrated into governance so that findings translate into measurable improvements.

Cyber-resilience in Italy is increasingly shaped by horizontal EU product security regulation that addresses cybersecurity vulnerabilities as systemic supply-chain risks rather than as isolated technical flaws. This regulatory evolution reflects the recognition that digital products and services constitute critical components of economic and social infrastructures, and that weaknesses embedded at design stage may propagate across sectors and jurisdictions. Within this context, the Cyber Resilience Act establishes a comprehensive framework of essential cybersecurity requirements for products with digital elements, and introduces security-by-design and security-by-default as legal obligations tied to market access.

The scope of cyber-resilience legislation extends beyond traditional ICT products and encompasses a wide range of connected devices, software components and digital services that rely on network connectivity or remote update capabilities. Manufacturers, importers and distributors are required to ensure that products placed on the market meet baseline cybersecurity standards throughout their life cycle. Cyber-resilience is therefore treated not merely as a feature of organisational processes but as an intrinsic characteristic of products and services that may affect downstream users and critical environments.

This product-focused regime complements organisational cybersecurity frameworks by addressing risks at source and by reducing systemic exposure to vulnerabilities that may otherwise be inherited by operators. In the Italian context, cyber-resilience legislation interacts with procurement practices, particularly in critical sectors and public administration, where compliance with security requirements increasingly functions as a prerequisite for market participation. The resulting regulatory landscape connects product security, supply-chain governance and operational resilience within a unified risk management logic.

The product-focused nature of cyber-resilience legislation alters the traditional allocation of cybersecurity responsibilities by extending legal obligations upstream in the supply chain. Security considerations therefore influence design choices, component selection and update mechanisms from an early stage. This shift has practical implications for contractual relationships between manufacturers and downstream operators, as compliance with cybersecurity requirements becomes a shared concern that affects liability allocation, information sharing and incident management across the product life cycle.

In regulated and critical environments, cyber-resilience requirements also interact with procurement processes. Contracting authorities and regulated operators increasingly consider compliance with product security obligations as an element of risk assessment and vendor selection. This interaction reinforces the preventative function of cyber-resilience legislation by incentivising higher security standards at market entry and by reducing the propagation of vulnerabilities in operational environments.

Key obligations under cyber-resilience legislation focus on secure design, vulnerability handling and life cycle management. Economic operators are required to identify and address cybersecurity risks during the design and development phases and to implement processes that enable timely detection, remediation and communication of vulnerabilities. These obligations are structured to ensure that security considerations are embedded within product governance and are not relegated to post-market responses.

Post-market surveillance constitutes a central element of compliance. Operators are expected to monitor products in use, to assess emerging threats and to provide security updates and patches within appropriate timeframes. Transparency obligations require that vulnerabilities and incidents be documented and communicated to competent authorities where thresholds are met. These mechanisms support regulatory oversight and contribute to collective situational awareness.

Enforcement operates through market surveillance authorities empowered to assess conformity, require corrective actions and impose sanctions. In serious cases, measures may include restrictions on market availability. Cyber-resilience obligations therefore extend beyond compliance formalities and operate as enforceable conditions for continued market participation.

Cybersecurity certification in Italy operates primarily within the EU framework established by Regulation (EU) 2019/881, commonly referred to as the Cybersecurity Act. This framework provides for European cybersecurity certification schemes covering ICT products, services and processes, and defines assurance levels reflecting the degree of confidence in security properties. Certification schemes function as instruments of risk communication and assurance rather than as substitutes for substantive security obligations.

Certification under the EU framework is, in principle, voluntary, but it acquires practical relevance through regulatory expectations, procurement requirements and market practice. In critical sectors and public procurement, certification increasingly operates as a benchmark for acceptable security standards and may influence supplier selection and contractual allocation of risk. In this sense, certification functions as a governance tool that complements statutory obligations by providing standardised evidence of compliance.

In the Italian legal environment, cybersecurity certification interacts with sector-specific regimes and with broader regulatory frameworks governing outsourcing and supply-chain security. Certified products and services may benefit from facilitated assessment in regulated environments, but certification does not displace the responsibility of regulated entities to ensure that cybersecurity requirements are met in practice. The role of certification is therefore to support, rather than replace, comprehensive risk management and oversight.

Cybersecurity obligations in the context of personal data processing derive from the security principle enshrined in data protection law and from the associated breach notification regime. Controllers and processors are required to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk. Cyber-incidents that compromise the confidentiality, integrity or availability of personal data frequently trigger parallel obligations under cybersecurity and data protection frameworks.

The breach notification regime requires that personal data breaches be assessed promptly and, where risk thresholds are met, notified to the competent supervisory authority within prescribed timeframes. Communication to affected individuals is required where a high risk to rights and freedoms is identified. These obligations necessitate close co-ordination between cybersecurity incident response and data protection governance to ensure consistency and accuracy in assessments and communications.

The interaction between cybersecurity regulation and data protection law reinforces the need for integrated governance structures. Organisations are expected to align incident classification, escalation and reporting processes so that cybersecurity events are managed holistically and in compliance with overlapping legal regimes.

The overlap between cybersecurity incident management and personal data breach assessment requires organisations to operate integrated decision-making processes. Technical incident-response teams, legal functions and data protection governance structures must co-ordinate in real time to assess the nature and impact of incidents and to determine applicable notification obligations. Fragmented handling of cybersecurity and data protection aspects increases the risk of inconsistent assessments and delayed or inaccurate notifications.

Supervisory authorities increasingly expect that organisations document the reasoning underlying breach assessments and notification decisions. This documentation supports accountability and enables ex post review of incident handling. As a result, cybersecurity governance and data protection compliance converge in practice, reinforcing the need for aligned policies, shared escalation pathways and consistent communication strategies.

Cybersecurity obligations relating to artificial intelligence (AI) systems arise primarily from the EU’s risk-based regulatory approach to AI, and intersect with general cybersecurity and data protection requirements. Security is treated as a foundational element of trustworthy AI and encompasses robustness, resilience against manipulation, and protection of model components and data throughout the life cycle.

In practice, cybersecurity obligations in the AI context require organisations to manage risks associated with data poisoning, model theft and unauthorised access, and to ensure that supply-chain dependencies do not undermine system integrity. These obligations are implemented through organisational governance, secure development practices and continuous monitoring rather than through isolated technical controls. The convergence between AI governance and cybersecurity regulation reflects the recognition that digital risks are increasingly interconnected and require co-ordinated management.

Cybersecurity obligations in the healthcare sector arise from the convergence of cross-sector cybersecurity regimes, data protection requirements and sector-specific risk considerations. Healthcare providers and operators of health information systems are subject to organisational and technical security obligations designed to protect sensitive health data and to ensure the availability and integrity of critical services according to NIS2.

Connected medical devices and digital health technologies introduce additional cybersecurity considerations, as vulnerabilities may affect patient safety and continuity of care. Product security obligations therefore interact with healthcare regulation and procurement practices. Incident response and notification duties in healthcare environments require particular sensitivity to operational continuity and to the potential impact on patients and public trust. Cybersecurity governance in this sector integrates technical resilience with heightened ethical and regulatory expectations.

ICT Legal Consulting

ICTLC - ICT Legal Consulting
Via Borgonuovo 12
20121 Milan
Italy

+39 028 424 7194

+39 027 0051 2101

info@ictlc.com www.ictlc.com
Author Business Card

Trends and Developments


Authors



ICT Legal Consulting (ICTLC) is an international law firm that provides strategic legal and regulatory support across privacy, data protection, intellectual property, and technology, media and telecommunications (TMT) law – with a strong focus on the normative and operational aspects of cybersecurity. The firm assists organisations with designing and implementing governance, compliance and security frameworks that meet the highest international standards. With over 80 professionals and a network active in more than 65 jurisdictions, ICTLC combines global co-ordination with local insight. Through its sister company ICT Cyber Consulting, the firm offers integrated cybersecurity services, including legal–technical risk assessments, resilience planning, and alignment with frameworks such as NIS2, DORA and the Cyber Resilience Act. ICTLC’s multidisciplinary expertise enables clients to navigate complex digital regulations and strengthen trust, compliance and resilience across their global operations.

Background

The Italian cybersecurity landscape is currently characterised by a phase of regulatory consolidation in which the focus has progressively shifted from legislative design to practical implementation and operational readiness. After several years marked by the adoption of new EU instruments and the reorganisation of national governance structures, market participants now face the challenge of translating principle-based requirements into sustainable compliance models. This transition has material implications for governance, risk allocation and investment priorities across sectors.

One of the most significant developments lies in the entry into force and operationalisation of the NIS2 framework at national level. While the underlying obligations are familiar in their risk-based logic, their scope and intensity have reshaped the compliance perimeter for many organisations that were previously subject to lighter or sector-specific requirements. Entities newly classified as essential or important are required to formalise governance arrangements, clarify internal accountability and develop structured incident management capabilities that extend beyond ad hoc technical responses.

This phase of consolidation is also characterised by heightened regulatory engagement. Supervisory authorities increasingly focus on registration, scoping and preparedness, rather than on punitive enforcement. The emphasis is placed on whether organisations have correctly identified their regulatory status, mapped applicable obligations and initiated remediation plans capable of reaching maturity within reasonable timeframes. As a result, cybersecurity compliance is treated as a dynamic process rather than as a static checklist.

At the same time, national security considerations continue to exert a strong influence on the regulatory environment. The coexistence of EU-driven frameworks and national security instruments requires organisations to manage overlapping obligations and to ensure that reporting, escalation and decision-making processes remain coherent. This interaction has become a defining feature of the Italian cybersecurity landscape and shapes how both public authorities and private operators approach resilience and risk management.

This phase of implementation has also highlighted differences in preparedness across sectors. Larger organisations and regulated entities have generally approached the new requirements through structured programmes supported by external advisers and internal project teams. Smaller operators, including entities newly captured by the extended scope of cybersecurity regulation, have encountered greater challenges in interpreting obligations and allocating resources. This divergence has contributed to a more heterogeneous compliance landscape and has reinforced the role of guidance and supervisory clarification in supporting consistent application of the rules.

In addition, regulatory consolidation has influenced internal investment decisions. Cybersecurity budgets are increasingly justified in terms of regulatory exposure and risk mitigation rather than purely technical enhancement. This has supported greater alignment between compliance, risk management and strategic planning functions, but has also required organisations to prioritise initiatives and to balance short-term remediation efforts with longer-term resilience objectives.

Governance and Responsibilities

A notable trend in the Italian market concerns the increasing centrality of governance and senior management accountability in cybersecurity compliance. Regulatory frameworks applicable in 2026 consistently frame cybersecurity as a matter for boards and top management, rather than as an issue confined to IT or security departments. This shift has practical consequences for organisational structures and decision-making processes.

Senior management is expected to demonstrate informed oversight of cybersecurity risks and to integrate cyber considerations into broader enterprise risk management. In practice, this has led to a reassessment of internal reporting lines, the formalisation of roles and responsibilities, and the involvement of legal and compliance functions in cybersecurity governance. The emphasis is placed on documentation, traceability of decisions and the ability to evidence that cybersecurity risks are identified, assessed and addressed at appropriate organisational levels.

This governance-driven approach also affects how organisations engage with regulators. Supervisory dialogue increasingly revolves around governance arrangements, internal controls and the effectiveness of oversight mechanisms. Technical measures are assessed within the broader context of organisational maturity and risk awareness, rather than in isolation. As a result, entities that invest in governance frameworks and cross-functional co-ordination tend to be better positioned in supervisory interactions.

The growing importance of accountability has also influenced market expectations. Boards and senior executives increasingly view cybersecurity as a strategic risk capable of affecting reputation, operational continuity and value creation. This perception supports greater investment in resilience and fosters a cultural shift in which cybersecurity is embedded in business planning and operational strategy.

The growing emphasis on accountability has led to a reassessment of how cybersecurity responsibilities are distributed within organisations. In many cases, formal governance structures have been updated to ensure that cybersecurity risks are discussed at board or executive level with sufficient regularity and depth. This has included the introduction of formal reporting cycles, risk dashboards and escalation criteria designed to support informed decision-making.

From a practical perspective, this governance evolution has also affected interactions with external stakeholders. Investors, business partners and customers increasingly expect transparency regarding cybersecurity posture and incident management capabilities. As a result, governance arrangements are not only assessed through a regulatory lens but also influence commercial relationships and reputational positioning.

Incident Management

Incident management remains a central area of focus in the Italian cybersecurity landscape, particularly in light of expanded reporting obligations and increasing supervisory scrutiny. Regulatory regimes applicable in 2026 emphasise timely communication, accuracy of information and co-ordination between technical response and legal assessment. Organisations are expected to move beyond reactive notification and to adopt structured incident governance frameworks.

One of the key developments concerns the alignment of internal incident classification with regulatory thresholds. Multiple regimes may apply to the same event, including cybersecurity, data protection and sector-specific rules. Market practice increasingly reflects the need for integrated assessment processes capable of determining, in a coherent manner, whether notification obligations arise and which authorities must be informed. Fragmented or sequential approaches have shown their limits and are viewed unfavourably by supervisors.

Supervisory authorities place particular emphasis on early engagement and on the quality of information provided. Initial notifications are expected to support situational awareness, while subsequent communications refine technical understanding and remediation measures. This approach incentivises organisations to invest in internal co-ordination and to prepare escalation procedures that operate effectively under pressure.

From a market perspective, incident management capabilities have become a differentiating factor. Organisations with mature response frameworks, tested communication channels and documented decision-making processes are better positioned to manage regulatory interactions and to mitigate reputational impact. This trend reinforces the perception of cybersecurity as a governance and operational resilience issue rather than as a purely technical challenge.

Another relevant development concerns the growing importance of post-incident analysis and remediation. Supervisory authorities and market participants increasingly focus on lessons learned and on the ability of organisations to demonstrate that incidents lead to tangible improvements in controls and processes. This expectation reinforces the need for structured incident reviews and for governance mechanisms capable of translating technical findings into organisational change.

Other Key Trends

The handling of communications has also gained prominence. Organisations are required to manage communications with regulators, affected stakeholders and, where applicable, the public, in a coherent and consistent manner. This has elevated the role of legal and communications functions in incident-response planning and has underscored the reputational dimension of cybersecurity incidents.

A further defining trend in the Italian cybersecurity context concerns the increasing sophistication and diversification of cyber-threats. Organisations across sectors report a shift from opportunistic attacks towards more targeted and persistent campaigns, often characterised by a combination of technical exploitation, social engineering and supply-chain compromise. This evolution has heightened awareness of the need for continuous monitoring and adaptive defence strategies rather than reliance on static security controls.

The growing reliance on cloud services, remote access solutions and interconnected digital ecosystems has expanded attack surfaces and increased dependency on third-party technologies. As a result, cybersecurity risk is no longer confined within organisational boundaries but extends across complex networks of providers and partners. This has practical implications for risk assessment, incident response and contractual governance, as vulnerabilities originating outside the organisation may have direct operational and regulatory consequences.

Artificial intelligence and automation technologies also play an ambivalent role in this evolving landscape. On the one hand, they support more effective detection, analysis and response capabilities. On the other hand, they are increasingly leveraged by threat actors to scale attacks and evade traditional controls. Market practice reflects growing attention to the security implications of technological innovation and to the need for governance frameworks capable of addressing both opportunities and risks associated with advanced digital tools.

Supply-chain security has emerged as one of the most significant trends shaping cybersecurity strategies in Italy. Regulatory frameworks applicable in 2026 consistently emphasise the management of risks arising from outsourcing and reliance on ICT service providers. This focus reflects the recognition that systemic vulnerabilities often originate within third-party relationships rather than within core infrastructures.

Organisations increasingly adopt structured approaches to supplier risk assessment, combining contractual safeguards with ongoing oversight mechanisms. Due diligence processes are refined to address not only technical capabilities but also governance, incident management maturity and alignment with regulatory expectations. This trend has led to more detailed contractual arrangements and to closer collaboration between procurement, legal and security functions.

At the same time, market participants face practical challenges in balancing regulatory expectations with commercial realities. Concentration risk and limited substitutability of certain service providers constrain exit strategies and require careful planning. As a result, supply-chain governance increasingly focuses on transparency, contingency planning and engagement with critical providers to ensure resilience and continuity of services.

Market practice indicates an increasing focus on collaborative approaches to supply-chain security. Rather than relying exclusively on contractual enforcement, organisations engage more actively with critical service providers to align security expectations, incident-response processes and information-sharing arrangements. This trend reflects the practical limits of purely contractual risk transfer in highly interconnected digital environments.

At the same time, regulatory attention to outsourcing has influenced negotiation dynamics. Service providers are more frequently asked to demonstrate compliance maturity and to accept enhanced transparency obligations. This has contributed to a gradual standardisation of cybersecurity clauses and has reinforced the role of cybersecurity as a key element of commercial negotiations in technology-intensive sectors.

Another relevant development concerns the evolution of enforcement and supervisory practice. Italian authorities continue to favour a graduated approach that prioritises guidance, remediation and dialogue, particularly in the early stages of implementation of new regulatory frameworks. Supervisory activity increasingly concentrates on preparedness, governance and the effectiveness of internal controls rather than on isolated technical deficiencies.

This approach sends clear signals to the market regarding regulatory priorities. Organisations that demonstrate proactive engagement, documented risk assessments and credible implementation plans tend to benefit from more constructive supervisory interactions. Conversely, lack of preparation or fragmented governance structures attract increased scrutiny and corrective measures.

Over time, enforcement practice contributes to shaping market standards by clarifying acceptable levels of maturity and by reinforcing the expectation that cybersecurity be managed as an integral component of organisational governance. This dynamic supports gradual convergence towards higher resilience benchmarks across sectors.

The convergence of regulatory consolidation, evolving threats and heightened supervisory expectations defines the strategic environment for cybersecurity in Italy. Organisations increasingly recognise that compliance, resilience and business continuity are interconnected objectives requiring co-ordinated governance and sustained investment. Cybersecurity strategies are therefore aligned more closely with enterprise risk management and operational planning.

Market expectations reflect a growing emphasis on integration, accountability and adaptability. Successful approaches are characterised by the ability to combine regulatory compliance with practical risk management, and to respond effectively to technological and threat developments. This trend reinforces the view of cybersecurity as a strategic function that supports long-term organisational stability and trust in digital transformation.

Supervisory practice also reflects an increasing reliance on comparative assessment. Authorities draw on information gathered across sectors to identify common weaknesses and emerging risks, which in turn informs guidance and supervisory priorities. This approach supports a more consistent application of regulatory expectations and contributes to the gradual convergence of market practices.

For organisations, this trend underscores the importance of benchmarking and continuous improvement. Awareness of supervisory focus areas and of enforcement signals enables entities to anticipate regulatory expectations and to adjust compliance strategies accordingly. In this context, enforcement activity serves not only a corrective function but also a signalling role that shapes future behaviour.

The emphasis on strategic alignment also reinforces the importance of internal capabilities. Organisations increasingly invest in training, awareness and cross-functional collaboration to ensure that cybersecurity considerations are embedded in day-to-day operations. This focus on internal capacity building supports more resilient responses to evolving risks and strengthens the link between compliance obligations and operational effectiveness.

ICT Legal Consulting

ICTLC - ICT Legal Consulting
Via Borgonuovo 12
20121 Milan
Italy

+39 028 424 7194

+39 027 0051 2101

info@ictlc.com www.ictlc.com
Author Business Card

Law and Practice

Authors



ICT Legal Consulting (ICTLC) is an international law firm that provides strategic legal and regulatory support across privacy, data protection, intellectual property, and technology, media and telecommunications (TMT) law – with a strong focus on the normative and operational aspects of cybersecurity. The firm assists organisations with designing and implementing governance, compliance and security frameworks that meet the highest international standards. With over 80 professionals and a network active in more than 65 jurisdictions, ICTLC combines global co-ordination with local insight. Through its sister company ICT Cyber Consulting, the firm offers integrated cybersecurity services, including legal–technical risk assessments, resilience planning, and alignment with frameworks such as NIS2, DORA and the Cyber Resilience Act. ICTLC’s multidisciplinary expertise enables clients to navigate complex digital regulations and strengthen trust, compliance and resilience across their global operations.

Trends and Developments

Authors



ICT Legal Consulting (ICTLC) is an international law firm that provides strategic legal and regulatory support across privacy, data protection, intellectual property, and technology, media and telecommunications (TMT) law – with a strong focus on the normative and operational aspects of cybersecurity. The firm assists organisations with designing and implementing governance, compliance and security frameworks that meet the highest international standards. With over 80 professionals and a network active in more than 65 jurisdictions, ICTLC combines global co-ordination with local insight. Through its sister company ICT Cyber Consulting, the firm offers integrated cybersecurity services, including legal–technical risk assessments, resilience planning, and alignment with frameworks such as NIS2, DORA and the Cyber Resilience Act. ICTLC’s multidisciplinary expertise enables clients to navigate complex digital regulations and strengthen trust, compliance and resilience across their global operations.

Compare law and practice by selecting locations and topic(s)

{{searchBoxHeader}}

Select Topic(s)

loading ...
{{topic.title}}

Please select at least one chapter and one topic to use the compare functionality.