How secure are Italian companies?

Cybersecurity data and trends in Italy to prepare for the challenges of 2026

A clear picture, based on real data, of the state of information security in Italian companies.

Analysis methodology

The report is based on the analysis of 1,200,000 IT assets of Italian companies, selected by size and sector to provide a representative view of the national cybersecurity landscape.

The organizations were monitored throughout the year through Certego’s proprietary ecosystem and the PanOptikon® platform, which ensured the collection, correlation, and unified analysis of data from heterogeneous attack surfaces.

Technology and human expertise

The analysis combines technology and specialized expertise, bringing together continuous monitoring and expert interpretation of events.

The data collected in 2025 was normalized and correlated to ensure consistency over time and to distinguish anomalies, false positives, and real incidents, providing a contextualized view of risk.

What you will find in the report

  • Introduction
  • Research methodology
    • An approach based on technology and human expertise
  • The geopolitical and operational context of cybersecurity in 2025
  • Artificial intelligence and cybersecurity
  • The pressure of cybersecurity in 2025
    • Cyber alerts: operational impact and workload for security teams
    • Managed incidents: when an alert turns into an attack
    • Attack surfaces and compromise attempts
  • Severity of cyberattacks and impact on business risk
  • Distribution of cyberattacks by industry sector
    • Tailored defenses beyond the one-size-fits-all approach
    • Regulations, critical sectors, and operational resilience
    • Suppliers and supply chain: the extension of the risk perimeter
  • Cyberattacks: a cross-cutting risk for companies of every size, including SMEs
  • Cybersecurity between the public and private sectors
  • Attack techniques
    • Malware
    • Phishing and credential compromise
    • Vulnerability exploitation
    • DDoS and other attack techniques
  • Origin of attacks
  • From data to action: preparing for cybersecurity in 2026
    • Operational workload and sustainability of defenses
    • Malware, phishing, and the human factor
    • No organization is too small
    • Closing the gap with cybercriminals
  • Towards resilient cybersecurity

Download the full report

Fill out the form to receive the content directly in your inbox.

Clicking Submit, I agree to the use of my personal data in accordance with Certego Privacy Policy  for the purpose sub. 2 paragraph “Purposes of the Data processing and legal basis”. 

I consent to the sharing of my personal data with third parties, namely partners collaborating in the organization of the event, for the purpose of receiving commercial communications from them and, more generally, for the performance of marketing activities by such third parties, as described under the purpose 'Communication to third parties for marketing purposes' in the privacy notice.