051 – 24 | with Enrico Pagliarini | Radio 24

Corrado Giustozzi will take part in the broadcast to talk about ransomware attacks toward public administration and possible prevention measures. Today at 22:45 and Sunday at 14.00 (extended version)

050 PRIVACY

On Thursday, July 20 at 5 p.m. Corrado Giustozzi will participate in the webinar “Digital Communication and the Impacts on Privacy,” which will be streamed live by Officine Dati. Corrado will speak specifically about the problem of encryption in mass communications, i.e., the difficult relationship between individual privacy and national security. Moderator: Nicola Fabiano, vice […]

049 CREST SEMINAR

Next July 17, at 5 p.m. Fabrizio Cirilli will give a Webinar presentation to our CREST software for risk assessment according to ISO/IEC 27001:2022, distributed in SaaS mode. Free access to CREST will be made available to all participants. Those interested in participating can register here.

045 Cybersecurity: NIS2 and DORA

Thursday, June 22 at 5:30 pm new meetup at Binario F in Meta.This time we will talk about Cybersecurity by analyzing together with many experts the technical and legal aspects of the new European rules (NIS2 and DORA) To participate, you must register here

044 Healthcare Security Summit 2023

On June 15, we look forward to seeing you at the third edition of Healthcare Security Summit 2023, the virtual dedicated event on cybersecurity in healthcare. Moderator: Alessandro Vallega.

043 RISCHIO CYBER 2024 – Roma

How you can help public administration and companies understand the challenges they will face in the months to come. A unique opportunity to raise awareness of the danger, to understand the sources of risk and how attackers operate, and thus to make good choices on how to deploy the limited resources available. The event is […]

042 RISCHIO CYBER 2024 – Milano

How you can help companies and public administration to understand the challenges they will face in the months to come. A unique opportunity to raise awareness of the danger, to understand the sources of risk and how attackers operate, and thus to make good choices on how to deploy the limited resources available. The event […]