The regulatory environment is changing alongside technology expansion, with governments worldwide introducing increasingly stringent regulations to address the growing complexities of cybersecurity and data privacy. For organisations, navigating this complex web of compliance requirements can be daunting.
Across Europe, four major frameworks are reshaping the way organisations manage their technology, risk, and resilience obligations: NIS2, DORA, CRA, and the EU AI Act.
As regulatory requirements are becoming increasingly detailed and prescriptive, a lack of visibility of the IT asset estate is impacting the ability for organisations and security teams to comply with these frameworks.
NIS2: Cybersecurity and Operational Resilience
The NIS2 Directive significantly strengthens cybersecurity requirements for operators of essential services and critical infrastructure within the EU by introducing stricter governance, enhanced risk management measures, and mandatory incident reporting. NIS2 expands the number of covered sectors from 7 to 15, and had a 2024 deadline for member states to transpose the directive into national law.1
Requirements of NIS2 include10:
Key deadlines:
DORA: Digital Operational Resilience
The Digital Operational Resilience Act (DORA) establishes a uniform framework for managing information and Communication Technology risks across the financial sector. This applies to banks, insurers, payment providers, investment firms, and other regulated entities. DORA focuses on strengthening operational resilience by setting clear requirements for risk management, incident reporting, resilience testing, third party risk management, and ICT critical third-party oversight planning2,3.
Requirements of DORA include2,3:
Key deadlines:
CRA: Security by Design
CRA establishes mandatory cybersecurity requirements for all hardware and software products placed on the EU market, with full compliance required by December 2027.4 It introduces a “security by design” approach, requiring manufacturers and vendors to ensure that products are secure throughout their lifecycle. The CRA also sets obligations for vulnerability management, incident reporting, and supply chain security, aiming to improve overall digital resilience and protect consumers and businesses from emerging cyber threats.
The CRA applies to IOT device manufacturers, software developers, and importers/distributors/resellers, with mandatory requirements including:13
Key deadlines:
EU AI Act: Responsible AI Governance
The rapid advancement of AI is leading to the development of regulations aimed at promoting responsible AI development and deployment. The EU AI Act, planned for full implementation by August 2026, categorises AI systems into four risk tiers: prohibited, high-risk, limited-risk, and minimal-risk.
Key deadlines:
IT Asset Management (ITAM) manages and tracks an organisation's IT assets throughout their lifecycle - from introduction through to use and disposal. This includes everything from hardware (e.g. computers, servers, mobile devices) to software licences and cloud services. To meet the growing complexity of regulatory requirements, ITAM is a powerful ally that supports cyber security and regulatory compliance teams through providing visibility and control of IT assets. Indeed, 81% of organisations view compliance with new digital regulations (DORA, NIS2, AI Act) as an opportunity to strengthen ITAM practices.9
ITAM enables cyber-resilience, regulatory alignment, and real-time risk response in several ways:
1. Providing a clear picture of IT assets: ITAM offers a comprehensive view of IT assets throughout their lifecycle, enabling organisations to track and categorise assets, prioritise remediation efforts, and understand the potential impact of disruptions on business functions. ITAM eliminates siloes between IT teams and systems with respect to IT assets by consolidating IT asset information into a single tool and framework.
2. Security over onboarding of new IT assets: ITAM engages with cyber security teams when new assets are onboarded to the organisation, ensuring security reviews are completed before introducing a new asset into the organisation’s environment.
3. Proactive management of vulnerable IT assets: ITAM provides the data necessary to identify and report outdated software to security teams to enable proactive removal of vulnerable assets. Additionally, this data ensures the application of timely updates, reducing the organisation's attack surface and allowing for real-time patching visibility.
4. Incident response acceleration: as ITAM centralises the IT asset inventory, providing data on software and software versions installed on every device used within the organisation, incident response time is accelerated, allowing for quick identification of vulnerable assets during security events. Deloitte’s 2025 Global ITAM Survey indicated that almost half of the organisations who involve ITAM in resilience planning rely on it to provide trustworthy inventories of critical assets during cybersecurity attacks or outages; and 30% use ITAM to map configurations and dependencies for faster recovery.9
5. Third-party dependency mapping: NIS2 and DORA require oversight of suppliers. ITAM enables this by providing clear visibility into vendor-linked assets.
6. Free and open-source software (FOSS) management: open-source risk is a glaring blind spot, despite its rising importance. This is an area where ITAM’s visibility and governance role can expand rapidly under regulatory pressure, through leveraging source-code scanning to assess the licence and vulnerability risks of FOSS components.
7. AI asset lifecycle tracking: while the management of AI assets is still being defined, the fundamental principles of ITAM will apply: monitoring AI assets throughout their lifecycle and managing the necessary data to track AI assets, allowing organisations to understand what assets are in use and identifying potential vulnerabilities.
8. Audit readiness: ITAM provides organisations with information on IT assets to evidence compliance during audits.
With digital regulation expanding rapidly, ITAM leaders must act now to embed compliance into every layer of asset intelligence, or risk becoming the weakest link in the resilience chain.
If you can’t see your IT assets, you can’t govern them.
_____________________________________________________________
References
2. Digital Operational Resilience Act (DORA)
3. The Digital Operational Resilience Act (DORA) | Deloitte UK
6. Gartner Research. “Software Asset Management Market Trends” (2024)
7. GDPR Enforcement Tracker 2024
8. Deloitte ITAM Benchmark Study. “AI & Regulatory Governance Gaps” (2024)
9. Deloitte 2025 Global ITAM Survey.
10. NIS2 Requirements | 10 Minimum Measures to Address
11. NIS2 Directive Transposition Tracker - ECSO