-
Transactional advisory services
Find out more about the transactional advisory services of Grant Thornton Financial Advisory Services
-
Valuations
Find out more about the valuations services of Grant Thornton Financial Advisory Services
-
Mergers and acquisitions
Find out more about the merger and acquisition services of Grant Thornton Financial Advisory Services
-
Forensic and investigation services
Find out more about the forensic and investigation services of Grant Thornton Financial Advisory Services
-
Recovery & reorganisation
Find out more about the Recovery & reorganisation services of Grant Thornton Financial Advisory Services
-
Business risk services
Find out more about the business risk services of Grant Thornton Financial Advisory Services
-
Business consulting
Find out more about the business consulting services of Grant Thornton Financial Advisory Services
-
Capital market
Capital market
-
Corporate and business tax
Find out more about our corporate and business tax services.
-
Direct international tax
Find out more about our direct international tax services.
-
Global mobility services
Find out more about our global mobility services.
-
Indirect international tax
Find out more about our indirect international tax services.
-
Transfer pricing
Find out more about our transfer pricing services.
-
Litigation
Our lawyers and accountants can manage all defense measures provided not only by the Italian law, but also by EU regulations and conventions
-
Family business
Find out more about our Family business services.
-
Legal
The client can be assisted in every need and with the same care both on important operations or disputes and on simple matters

-
Back office outsourcing
Find out more about our Back office outsourcing services
-
Business process outsourcing
Find out more about our business process outsourcing services.
-
Compilation of financial statements
Find out more about our compilation of financial statements services.
-
Tax compliance
Find out more about our tax compliance services.
-
Electronic invoicing
Find out more about our electronic invoicing services
-
Electronic storage
Electronic storage is an archiving procedure that guarantees the legal validity of a digitally stored electronic document
-
Revaluation of corporate assets
Find out your civil and fiscal revaluation of tangible, intangible and financial assets
-
Payroll
Complete and customized payroll service, integrated with digital solutions and compliant with Italian and international regulations.
-
Labor consultancy
We help Italian and international companies manage all aspects of their workforce.
-
HR & Payroll Advisory Services
We review contracts, payroll, and risks for extraordinary transactions and we assess tax, labor, and safety risks in outsourcing contracts.
-
Extended services
We provide integrated digital tools to simplify HR management.
-
HR Infinity Portal
The HR Infinity Portal is Zucchetti’s platform designed to centralize communication between the company and its employees.
-
Cybersecurity
GT Digital helps clients structure information security management internal functions, also through partially or totally outsourced functions
-
Agile and Programme Management
GT Digital provides support in the adoption and implementation of different portfolio management
-
Robotic Process Automation
Our “BOT Farm” can rely on digital workers able to help clients in routine activities, allowing employees to deal with more added-value activities
-
Data strategy and management
GT Digital can support clients in seizing the opportunities offered by Big Data, from the definition of strategies to the implementation of systems
-
Enterprise Resource Planning
We support clients in selecting the most appropriate ERP System according to their specific needs, helping them also understand licensing models
-
IT strategy
GT Digital supports clients in making strategic choices, identifying innovation opportunities, comparing themselves with competitors
-
IT service management
We can support with software selection and with the implementation of dedicated tools for the management of ICT processes
-
DORA and NIS 2
The entry into force of the DORA Regulation and NIS2 represents a major step towards the creation of a harmonised regulatory framework

Due to the increasingly pervasive digitization, cybersecurity is no longer an option: it has become a necessity. Indeed, the expansion of digital technologies and services means that the attack surface for cybercriminals is increasing exponentially, and the most serious issue is that users are not always fully aware of this. According to the most recent CLUSIT Report, 3,541 serious cyber-attacks were recorded globally in 2024, the highest number ever recorded, with a 27% growth compared to the previous year[1]. In Italy, the picture is particularly alarming: the country suffered 10% of global attacks, despite representing only 1.8% of global GDP. With 357 known serious attacks in 2024, Italy is permanently in the signs of cyber criminals. Cybercrime is responsible for approximately 86% of cyber-attacks globally, a phenomenon that is constantly growing. Among the main factors fuelling this trend is the spread of low-cost “as-a-Service” tools on the dark web, which make illicit activities accessible even to individuals with limited technical skills.
Cybersecurity governance represents a coordinated set of policies, standards, organizational arrangements and compliance mechanisms aimed at ensuring a rigorous supervision of digital security. Areas such as energy, healthcare, finance, telecommunications and transport are recurrent targets of increasingly complex and persistent cyber threats. Moreover, it is not only large corporations or critical infrastructures that are affected, but also and above all small and medium-sized enterprises, which are often less structured and therefore more vulnerable. An effective governance model creates a protected digital environment, protects sensitive information, ensures continuity of essential services, and contributes to economic stability. Because of its systemic impact, cybersecurity is now increasingly recognized as a priority: governments and regulatory authorities have for some years now been promoting the application of international regulations and standards, which serve as a reference for the development of mature and sustainable security strategies.
These were the topics discussed during the meeting held in Milan, 14-16 May, between the cybersecurity teams of the member firms of the Grant Thornton international network. The event represented an important opportunity for discussing and sharing different perspectives and operational experiences, focusing on the main current cybersecurity challenges. Among the most discussed topics, the NIS2 (Network Information Security) Directive and the ISO/IEC 27001:2022 standard were particularly relevant, confirming their importance in the definition of effective and scalable cyber governance models.
The first NIS Directive (2016/1148) defined an EU-wide regulatory framework designed to improve supranational coordination in the management of network and information system security, with the aim of protecting services that are essential for the functioning of the EU economy and society[2]. Following the rapid evolution of the digital ecosystem, the European Commission initiated a review process that led to the adoption of the NIS2 Directive, which came into force in January 2023. Member states were required to transpose the new directive into their national legislation by 17 October 2024[3]. NIS2 aims to standardise and further strengthen cybersecurity within the European Union by introducing more stringent risk management and incident reporting requirements and extending them to a larger number of public and private entities (NIS affected around 300 Italian companies, NIS2 involves over ten thousand). Furthermore, the Directive lays down rules to improve cooperation between Member States, to promote information sharing and to ensure a more effective application of protection measures at national and European level[4].
At the same time, many companies are choosing to voluntarily adopt international standards such as ISO/IEC 27001:2022, which defines an information security management model (ISMS). This approach makes it possible to map risks, plan countermeasures, monitor the effectiveness of controls and pursue continuous improvement. The ISO/IEC 27002:2022 standard, complementary to 27001, provides detailed operational guidance for the implementation of security controls. The integration of these standards within business processes is often seen as best practice, strengthening security, improving stakeholder confidence and facilitating compliance with regulations such as NIS2 and GDPR.
[1] Ibid, pages 30–31.
[2] European Commission, Questions and answers on NIS directive – Strengthening network and information system security in the EU, n.d.
[3] National Cybersecurity Agency (ACN), NIS Directive, n.d.
[4] European Commission, NIS2 Directive, n.d.
