{"id":9759,"date":"2026-03-03T12:12:52","date_gmt":"2026-03-03T12:12:52","guid":{"rendered":"https:\/\/mbg.legal\/?p=9759"},"modified":"2026-03-03T12:12:52","modified_gmt":"2026-03-03T12:12:52","slug":"cyber-risk-and-creditworthiness-the-new-supervisory-paradigm-of-the-bank-of-italy","status":"publish","type":"post","link":"https:\/\/mbg.legal\/en\/cyber-risk-and-creditworthiness-the-new-supervisory-paradigm-of-the-bank-of-italy\/","title":{"rendered":"Cyber risk and creditworthiness \u2013 The Bank of Italy&#039;s new supervisory paradigm"},"content":{"rendered":"<p><\/p>\n\n\n\n<p>The evolution of the <strong>compliance<\/strong> corporate governance and risk assessment models has reached a turning point with the recent publication (19 January) of a new document from the <strong>Bank of Italy<\/strong>. According to the sources, the <strong>cyber risk<\/strong> officially ceases to be a purely technical question and takes on the nature of <strong>structural factor of credit risk<\/strong>.<\/p>\n\n\n\n<p>Below is a brief analysis of the legal and strategic implications for non-financial companies.<\/p>\n\n\n\n<p><strong>1. Going beyond accounting data: analyzing unstructured data<\/strong><\/p>\n\n\n\n<p>The Supervisory Authority has noted that traditional balance sheets are no longer sufficient to represent a company&#039;s actual risk exposure. The new Bank of Italy model uses risk assessment techniques. <strong>Natural Language Processing (NLP)<\/strong> and the Large Language Model <strong>Microsoft Phi-4<\/strong> to analyze millions of documents, including press articles, specialized web sources, and financial reports.<\/p>\n\n\n\n<p>The goal is to transform descriptive language into <strong>quantitative signals<\/strong>, intercepting information on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mitigating elements:<\/strong> investments in defense technologies, adoption of structured processes and possession of <strong>safety certifications<\/strong> (like ISO standards).<\/li>\n\n\n\n<li><strong>Risk factors:<\/strong> disclosure of cyber incidents and past vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Implications for governance and business continuity<\/strong><\/p>\n\n\n\n<p>From a legal and regulatory perspective <strong>corporate governance<\/strong>, the integration of cyber risk into management models <em>credit assessment<\/em> (specifically in the system <strong>ICAS \u2013 Italian Credit Assessment System<\/strong>) highlights how a cyber attack can compromise the financial stability of the institution.<\/p>\n\n\n\n<p>Sources emphasize that a cyber event is no longer just an \u201cextraordinary cost,\u201d but a threat that can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>interrupt the <strong>business continuity<\/strong>.<\/li>\n\n\n\n<li>generate <strong>disputes<\/strong> significant and reputational damage.<\/li>\n\n\n\n<li>Impact, even directly, the company&#039;s ability to repay the debt incurred.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. The \u201cpersistence of risk\u201d and critical sectors<\/strong><\/p>\n\n\n\n<p>The analysis highlights a phenomenon of particular importance for the <em>due diligence<\/em> legal: the so-called <strong>\u201ccyber \u201dscar\u201d<\/strong>. A sustained cyber attack leaves a persistent mark on the company&#039;s risk profile, often weighing more than the corrective measures introduced. <em>ex post<\/em>.<\/p>\n\n\n\n<p>The sectors requiring the most stringent monitoring are manufacturing (due to the high interconnectivity of Industry 4.0), professional services, and commerce. The dominant threats identified include: <em>ransomware<\/em>, <em>data breach<\/em> And <em>phishing<\/em>.<\/p>\n\n\n\n<p><strong>4. Conclusions: Cybersecurity as a financial lever<\/strong><\/p>\n\n\n\n<p>For companies, complying with cybersecurity requirements is becoming a prerequisite for protecting their ratings and accessing capital markets. Investing in transparency, governance, and data protection is no longer just a regulatory compliance requirement, but a financial lever capable of directly impacting the cost of money.<\/p>\n\n\n\n<p>In conclusion, in the current digital landscape, the failure to implement adequate cybersecurity measures can be considered a genuine breach of due diligence, with direct impacts on a company&#039;s solvency and creditworthiness.<\/p>\n\n\n\n<p>Content by the Lawyer. <a href=\"https:\/\/mbg.legal\/en\/lawyers\/gianmaria-pesce\/\" title=\"Gianmaria Pesce\">Gianmaria Pesce<\/a><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>The evolution of corporate compliance and risk assessment models has reached a\u2026 <a title=\"Cyber risk and creditworthiness \u2013 The Bank of Italy&#039;s new supervisory paradigm\" class=\"read-more\" href=\"https:\/\/mbg.legal\/en\/cyber-risk-and-creditworthiness-the-new-supervisory-paradigm-of-the-bank-of-italy\/\" aria-label=\"Read more about Cyber Risk and Creditworthiness \u2013 The Bank of Italy&#039;s New Supervisory Paradigm\">Read more<\/a><\/p>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"slim_seo":{"title":"Cyber Risk and Creditworthiness \u2013 The Bank of Italy&#039;s New Supervisory Paradigm - Milan Law Firm | MBG Legal | Mondini Bonora Geneva","description":"The evolution of corporate compliance and risk assessment models has reached a turning point with the recent publication (January 19) of a"},"footnotes":""},"categories":[7],"tags":[],"class_list":["post-9759","post","type-post","status-publish","format-standard","hentry","category-diritto-bancario-finanziario-e-delle-assicurazioni","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"acf":[],"_links":{"self":[{"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/posts\/9759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/comments?post=9759"}],"version-history":[{"count":1,"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/posts\/9759\/revisions"}],"predecessor-version":[{"id":9760,"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/posts\/9759\/revisions\/9760"}],"wp:attachment":[{"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/media?parent=9759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/categories?post=9759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mbg.legal\/en\/wp-json\/wp\/v2\/tags?post=9759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}