10

ICT Risk Management

ICT Risk Management: Governing Digital and IT Risk efficiently and effectively

In today’s context, characterized by increasing digitalization and stringent cybersecurity regulations—such as EBA Guidelines on ICT risk, the DORA Regulation for the financial sector, the NIS2 Directive covering a broad range of organizations including non-financial entities (around 20,000 in Italy), and international standards like ISO 27001 and NIST—even for organizations not directly regulated—ICT risk management has become a pillar of every company’s Internal Control and Risk Management System and overall organizational resilience.
Organizations are now required to understand, assess, and mitigate in a structured way the risks that could compromise the privacy, integrity, availability, and authenticity of the data and information they manage.

Cybersel supports companies in building and managing an integrated ICT Risk Management model that transforms risk into a governance and compliance tool, reducing complexity and improving decision-making capabilities.

What is ICT Risk Management

ICT Risk Management is the process that enables organizations to identify, assess, mitigate, and monitor risks associated with information technologies and IT assets. A structured approach allows organizations to:

  • Ensure regulatory compliance with applicable laws, standards, and best practices such as DORA, ISO 27001, NIST, and internal policies.
  • Improve operational resilience and reduce response times to incidents or disruptions.
  • Optimize security investments by focusing on areas with the highest impact.
  • Increase risk awareness at both the governance and asset level across the organization.
  • Provide an integrated and measurable view of the company’s risk exposure.

An Integrated View of Risk

 

Today, ICT risk management requires a perspective that brings together the technological, regulatory, and governance dimensions. Cybersel’s solution is based on an advanced technological platform that manages the entire ICT risk lifecycle in an integrated way—from scenario definition to assessment and monitoring. The model is built around a set of core components that interact in a structured and interrelated way, providing a complete and measurable view of organizational risk:

Risk Scenarios

Events or circumstances that could compromise IT assets or business processes

Threat Library

A structured repository of relevant threats for the sector and organizational perimeter

Controls Library

A set of security measures and practices mapped to international frameworks such as NIST, ISO 27001, DORA, and the Secure Control Framework (SCF)

Policies

Internal regulatory baseline guiding the selection and applicability of controls

Regulations

External regulatory framework guiding the selection and applicability of controls

Dashboards & Workflows

Dynamic tools enabling stakeholder collaboration, with executive and operational views to monitor risk exposure and program status

This architecture ensures a coherent, configurable, and scalable model adaptable to the specific methodologies and processes of each organization.

Operational approach – The ICT Risk Management Process

Cybersel’s ICT risk management methodology is based on a structured, sequential approach that translates regulatory and technological complexity into a measurable and operational process.

The process is managed through a configurable workflow, considering the company’s organizational structure (roles and responsibilities):
Framework Setup
This phase establishes the foundations of the risk model. Applicable regulations and standards (ISO 27001, NIST, DORA) are identified, control and threat libraries are built, and ICT assets are classified by type and criticality. Each control is linked to the threats it can mitigate, and the likelihood of each risk is estimated, creating a coherent framework aligned with organizational needs.
Inherent Risk Evaluation
Control Environment Assessment
Residual Risk Evaluation, Acceptance and Treatment