NIS2
|ACN
|conformità
|GV.SC
|rischio di terze parti
|sicurezza della supply chain
|registro dei fornitori
|gestione dei fornitori
NIS2 supplier register and supply-chain controls: practical guide for an auditable vendor inventory
February 02, 2026
NIS2 baseline includes supply-chain security as a dedicated control area (GV.SC). This guide covers what a NIS2-ready supplier register must contain,…
NIS2
|UE
|GRC
|risposta agli incidenti
|sicurezza informatica
|catena di fornitura
|Italia
|Cybersecurity Act
|DORA
|ENISA
|sicurezza perimetrale
|VPN
|ransomware
|sanità
|rischio di terze parti
|resilienza digitale
|certificazione
Cybersecurity Monthly Report – January 2026 (Italy, EU, Global)
January 31, 2026
Aegister’s January 2026 monthly cybersecurity report: EU cybersecurity package with Cybersecurity Act revision and NIS2 simplification amendments, DO…
conformità
|CSIRT
|sicurezza informatica
|resilienza
|DORA
|rischio di terze parti
|finanza
|regolamentazione
|segnalazione degli incidenti
|Banca d'Italia
|Consob
|IVASS
|COVIP
|test di penetrazione
|CISO virtuale
DORA Implementation in Italy: A New Era for Financial Cyber Resilience
June 03, 2025
Italy transposes the EU's Digital Operational Resilience Act (DORA) with new obligations for financial institutions on ICT risk, incident response, a…
NIS2
|ACN
|UE
|GRC
|risposta agli incidenti
|sicurezza informatica
|Italia
|DORA
|ransomware
|rischio di terze parti
|resilienza digitale
|DDoS
|CSIRT Italia
|Ivanti
|sicurezza VPN
|hacktivismo
Cybersecurity Monthly Report – January 2025 (Italy, EU, Global)
January 31, 2025
Aegister's January 2025 monthly cybersecurity report: DORA goes live, NIS2 registration milestones, key vulnerabilities (VPN/edge), ransomware policy…
