-
Transactional advisory services
Find out more about the transactional advisory services of Grant Thornton Financial Advisory Services
-
Valuations
Find out more about the valuations services of Grant Thornton Financial Advisory Services
-
Mergers and acquisitions
Find out more about the merger and acquisition services of Grant Thornton Financial Advisory Services
-
Forensic and investigation services
Find out more about the forensic and investigation services of Grant Thornton Financial Advisory Services
-
Recovery & reorganisation
Find out more about the Recovery & reorganisation services of Grant Thornton Financial Advisory Services
-
Business risk services
Find out more about the business risk services of Grant Thornton Financial Advisory Services
-
Business consulting
Find out more about the business consulting services of Grant Thornton Financial Advisory Services
-
Capital market
Capital market
-
Corporate and business tax
Find out more about our corporate and business tax services.
-
Direct international tax
Find out more about our direct international tax services.
-
Global mobility services
Find out more about our global mobility services.
-
Indirect international tax
Find out more about our indirect international tax services.
-
Transfer pricing
Find out more about our transfer pricing services.
-
Litigation
Our lawyers and accountants can manage all defense measures provided not only by the Italian law, but also by EU regulations and conventions
-
Family business
Find out more about our Family business services.
-
Legal
The client can be assisted in every need and with the same care both on important operations or disputes and on simple matters
-
Back office outsourcing
Find out more about our Back office outsourcing services
-
Business process outsourcing
Find out more about our business process outsourcing services.
-
Compilation of financial statements
Find out more about our compilation of financial statements services.
-
Tax compliance
Find out more about our tax compliance services.
-
Electronic invoicing
Find out more about our electronic invoicing services
-
Electronic storage
Electronic storage is an archiving procedure that guarantees the legal validity of a digitally stored electronic document
-
Revaluation of corporate assets
Find out your civil and fiscal revaluation of tangible, intangible and financial assets
-
Human resources consulting
Find out more about our human resources consulting services.
-
Payroll
Find out more about our payroll services.
-
HR News
HR News the monthly information newsletter by Grant Thornton HR
-
Cybersecurity
GT Digital helps clients structure information security management internal functions, also through partially or totally outsourced functions
-
Agile and Programme Management
GT Digital provides support in the adoption and implementation of different portfolio management
-
Robotic Process Automation
Our “BOT Farm” can rely on digital workers able to help clients in routine activities, allowing employees to deal with more added-value activities
-
Data strategy and management
GT Digital can support clients in seizing the opportunities offered by Big Data, from the definition of strategies to the implementation of systems
-
Enterprise Resource Planning
We support clients in selecting the most appropriate ERP System according to their specific needs, helping them also understand licensing models
-
IT strategy
GT Digital supports clients in making strategic choices, identifying innovation opportunities, comparing themselves with competitors
-
IT service management
We can support with software selection and with the implementation of dedicated tools for the management of ICT processes
-
DORA and NIS 2
The entry into force of the DORA Regulation and NIS2 represents a major step towards the creation of a harmonised regulatory framework
Understanding cyber risk for asset managers and owners.
Across the world, tenants have increasing expectations of intelligent buildings, providing them access to technology and automated systems, from online storage to health and safety, communications, climate control, lighting, security and more.
As an example, around 20% of the UK’s commercial buildings are defined as ‘smart’, and the world’s smart building market is expected to be worth up to $24.73 billion by 2021. As an asset owner, huge gains can come from the automation and optimisation of services and increasing the sustainability rating of the asset.
Despite adding value, the increased connectivity of these smart services can have a negative side – they can open up those who occupy them to a higher risk of cyber attack through ‘disruption of service’ or potential gateways to data. The threat exists for all asset classes across the real estate industry: office and apartment blocks, data centres, industrial sites, and even public spaces like hospitals, universities, hotels and shopping centres.
As we describe in our recent Grant Thornton report 'Locking down the value of data' one of the biggest challenges facing today’s leaders is ensuring that their businesses can anticipate and mitigate cyber risk. As an asset manager or owner, while the risk is primarily with your tenants, the impact on the building’s reputation and your own if an attack occurs could be devastating. Therefore, the issue of cyber security should be squarely on the boardroom table of building owners and management companies.
In this article, describe why cyber risk management and data protection need to be key elements of the investment in smart buildings at all stages of the asset lifecycle.
«Smart buildings – the new frontier of commercial and residential constructions – present new challenges in managing Cyber Risks», says Renato Sesana, Partner at Grant Thornton Financial Advisory Services, «Indeed cyber risks may be one of the side effects of the new technologies applied to different fields:
Operational Technology (OT) Systems: climate control systems, fire prevention systems and elevators controllers;
- Internet Of Things (IoT): such as CCTVs, personal health protection system, building intercom systems;
- Information technology: devices such as laptops, workstations, notebooks, pads.
These systems may all be open to attacks and therefore generate risks. On one side, cyber-attacks are a threaten for users, in terms of data theft and information, frauds, privacy breaches, but also in terms of health and security. On the other side, these attacks can open up asset managers and owners to many risks, including above all reputational risks.
Therefore, it could be useful to run a proper risk analysis, that, moving on from checking the capability of systems to respond to cyber-attacks, may lead to the introduction of innovative devices to detect, monitor and fight cyber-attacks».
For more information, please contact our team of cybersecurity experts: Alessandro Leone, Renato Sesana, Nicola Seguino.