SECURING ITALY FROM CYBER THREATS - gcsec.org · posizioni aperte nel campo della sicurezza...

7
CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS www.qatalystglobal.com FOCUS OF THE CONFERENCE Over recent years, cyber attacks have constituted a worrying concern for companies, institutions and governmental bodies. Reports show that the amount of malware vulnerabilities in Italy is considerably higher than the world average. The need for cyber security investment is critical as well as the necessity of increasing the global resilience and security of Italian ICT assets and designing and effective risk management process. ItaliaSec Summit represents the first event in the region for senior security thought leaders designed to help trigger productive discussion and promote best practices with the aim to put together robust policies and standards that will shape a securer future for Italian infrastructures. HIGHLIGHTS FROM THE AGENDA • The most advanced information and policies • Exclusive environment of only C-level figures • Learn from individuals with first hand experience • Recognize current and future threats • Be part of the discussion that will impact the industry SECURING ITALY FROM CYBER THREATS taliaSec 17 - 18 MAY 2017 Venue: Le Meridien Visconti, Rome, Italy # ItaliaSec EVENT SPONSORS

Transcript of SECURING ITALY FROM CYBER THREATS - gcsec.org · posizioni aperte nel campo della sicurezza...

CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS

www.qatalystglobal.com

FOCUS OF THE CONFERENCEOver recent years, cyber attacks have constituted a worrying concern for companies, institutions and governmental bodies. Reports show that the amount of malware vulnerabilities in Italy is considerably higher than the world average. The need for cyber security investment is critical as well as the necessity of increasing the global resilience and security of Italian ICT assets and designing and effective risk management process.

ItaliaSec Summit represents the first event in the region for senior security thought leaders designed to help trigger productive discussion and promote best practices with the aim to put together robust policies and standards that will shape a securer future for Italian infrastructures.

HIGHLIGHTS FROM THE AGENDA• The most advanced information and policies• Exclusive environment of only C-level figures• Learn from individuals with first hand experience• Recognize current and future threats• Be part of the discussion that will impact the industry

SECURING ITALY FROM CYBER THREATS

taliaSec

17 - 18 MAY 2017Venue: Le Meridien Visconti, Rome, Italy

#ItaliaSec

EVENT SPONSORS

OFFICIAL SPONSOR

PRESENTING SPONSORS

PLATFORM SPONSORS

NETWORKING SPONSOR

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com

ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec02 03

Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored. We ensure that company and government data is secure and trusted in any environment – on premise, in the cloud, in data centers and in big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance.

Westcon-Comstor (WestconGroup Inc.) is a value-added technology distributor of category-leading solutions in Security, Collaboration, Networking and Data Center. We are transforming the technology supply chain through our global capabilities in Cloud, Global Deployment and Services. Through a unique physical and digital distribution network, we extend our partners’ global reach while providing the local expertise needed to successfully navigate worldwide opportunities. We combine expert technical and market knowledge with industry-leading partner enablement programs. Collaborating with our partners in a unique engagement model, we strive to provide an exceptional partner experience by delivering results together.

Over 25 years, SonicWall has been the industry’s trusted security partner protecting millions of networks worldwide. From network security to access security to email security, we have continuously evolved our product portfolio to fit in quickly and seamlessly, enabling organizations to innovate, accelerate and grow.

We are a European company focusing exclusively on Cyber Security. We are fully independent, thus not controlled by a global software vendor or an international professional services group. We cover the three main areas of Cyber Security: Security Assessment, Managed Security Services and Security Software.Emaze is controlled by its management and has 75 full-time employees hired after an extensive background check. We do not use external staff for clients assignments.All our processes are ISO 27001 & ISO 9001 certified. Our software are PCI & ASV compliant. We are a regional research lab as well as an excellence centre for university bodies. Since 17 years, our independence is our strength and a security guarantee to our selected clients.

STEERING COMMITTEEYURI RASSEGA CISO, Enel

PIERLUIGI PAGANINI Member of Cyber G7 2017, MAE

ALESSANDRO PERILLI GM Cloud Management Strategy, Red Hat

ANDREA FOSCHINI Head Information Security Governance, Terna SpA

FABRIZIO RENZI Director Technology and Innovation, IBM

MATTEO BOGANA CEO, Cleafy

MARCO RAMILLI Founder & CTO, Yoroi

LUISA FRANCHINA Director, AIIC (Italian Association of Critical Infrastructure)

Cisco is the global technology leader that transforms the way people connect, communicate and collaborate. Cisco offers solutions, services and systems to business that facilitate the digital transformation of our world, with technology that promises to connect everything securely, making the impossible possible. Cisco has been in Italy since 1994 under the guidance of Agostino Santoni. The company headquarters and research labs are located in Vimercate, and has further offices in Rome and Padua.

Guidance Software is the gold standard in digital investigations & endpoint security, helping to lower business risk through complete data visibility. 4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics to our customers. Our combined experience of years in the field conducting and training personnel in digital forensics make us second to none. Our mission is to be fully trained and ready to provide the highest level of operational support for our customers.

Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. We are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core—enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.

Proofpoint Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.

MobileIron is the leader in mobile enterprise security. The MobileIron platform is designed to secure data-at-rest on mobile devices, in apps, and in cloud storage and secure data-in-motion as it moves between the corporate network, devices and storage repositories. With MobileIron, IT can secure corporate information wherever it lives while preserving the sanctity of employee privacy.

RSA helps leading organizations around the world take command of their security posture by partnering to build and implement business-driven security strategies.

Why RSA?Protecting communication, enhancing secure collaboration and fostering innovation in the digital world. The constant march of advanced cyber threats. The rising specter of technology disruption. New competition emerging from every corner. Those are just a few of the complex challenges organizations face daily. We know because we help industry-leading companies address those and other issues- and because we face those very challenges, too. Your business is our business. Your mission is our mission. Your success is our reward.

STEFANO MELE Director “InfoWarfare and Emerging Technologies”,Istituto di Studi Strategici Machiavelli

DIEGO CILEA IT Director, Fondazione San Camillo

NICOLA SOTIRA Director, Global Cyber Security Center (Poste Italiane)

ANTONIO IERANO’ CSO, Ex Huawei

ASSOCIATE SPONSORFor fifteen years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on Arbor Networks for traffic visibility, ad-vanced threat detection and DDoS mitigation. Through a combination of mar-ket-leading technology, elite security research, intuitive workflows and power-ful data visualizations, Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence.

SPEAKERS

SERGIO ANTONICA Head of IT and System Division IVASS

FRANCO CERUTTI IT Operational Security DirectorCosta Crociere

MAURIZIO LA PUCA Cyber Security Advisor MoD

LUCA LUIGI MANUELLI Chief Digital Officer Ansaldo Energia

NICOLA RIVEZZI CIO Metropolitana Milanese

SERGIO PAGNOZZI Senior Security AnalystESA

GIUSEPPE ROSELLI Head of Trusted Security Services ENI

GIAMPAOLO SCAFURO FounderDigital Innovation & Cyber Security Academy

MASSIMO VULPIANI Regional Director Europe SouthRSA

MICHELE BANFOSales Manager, Mediterranean RegionArbor

SPEAKERProofpoint

CLAUDIO SERAFINISouthern Europe Sales Engineering Team Leader, CISSPThales

STEFANO MELE Director “InfoWarfare and Emerging Technologies” Istituto di Studi Strategici Machiavelli

COSIMO SENNICyber Security Program Manager Magneti Marelli

STEFANO VOLPI Area Sales ManagerCisco

SPEAKEREmaze Italy

ALESSANDRO DELLA NEGRAPractice Leader Security & Services - Sales Director Westcon-Comstor

MARCO TULLIANI Chief Security Officer AXA

ENRICO VENUTO CISO Politecnico

NICOLA SOTIRA Director Global Cyber Security Center

IT Operational Security Director

PIERLUIGI PAGANINI Member of Cyber G7 2017 MAE

ANDREA BALDIIT Security OfficerESA

RICCARDO CANETTA Regional Sales Director MobileIron

ISABELLA CORRADINI President Themis

ANDREA GUARINO Head of Security, Privacy and ComplianceACEA

DAVIDE DEL VECCHIOHead of Enterprise SecurityYoox Net a Porter Group

CRISTIANO CAFFERATARegional Manager ItalySonicWALL

CHAIRMAN

LUISA FRANCHINADirector, AIIC

Luisa Franchina is the President of the Italian Association of Critical Infrastructures’ Experts (AIIC). She holds a PhD and a post-doctoral in Electronic Engineering (University of Rome, La Sapienza) and a Masters in Geopolitics (CASD). Luisa has been Director of the Secreteriat for Critical Infrastructure (Presidency of the Council of Ministers from 2010 to 2013) and Director of the Operations Unit for Chemical, Biological, Radiological and Nuclear (CBRN) Threats (Civil Protection Department).

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com04 05

ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec

For further information on speaker profi les and steering committee please visit: www.cs4ca.com/italiasec

08:00

08:50

09:00 14:00

11:40

14:40

12:30

12:20

16:40

16:00

09:40

10:20

15:30

13:00

17:20

17:30

REGISTRAZIONE PARTECIPANTI

SALUTI INTRODUTTIVI DEL CHAIRMAN E APERTURA DEI LAVORILuisa Franchina, President, AIIC

OPENING PANEL CASE STUDY

KEYNOTE

KEYNOTE

KEYNOTE

PLATFORM

GROUP DISCUSSION

KEYNOTE

KEYNOTE

KEYNOTE:

BREAK POMERIDIANO E NETWORKING

SALUTI CONCLUSIVI DEL CHAIRMANLuisa Franchina, President, AIIC

NETWORKING DRINKS

PRANZO OFFERTO DA

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com06 07

CONFERENCE DAY ONEMERCOLEDI 17 MAGGIO 2017

L’Opening Panel esaminera’ l’evoluzione e lo stato dell’arte del panorama italiano sulla Cyber Security alla luce di due drivers fondamentali: il Framework Nazionale e la direttiva NIS. Inoltre si cerchera’ di analizzare quali sono le nuove minacce e quali le prossime sfide da affrontare

I CERT stanno diventando sempre più elementi fondamentali nella protezione delle infrastrutture informatiche e delle informazioni. La loro importanza è tanto più vitale quanto il rapporto di collaborazione con il SOC interno è forte. Il coordinamento dei due elementi da’ vita ad una capability ancora più spinta che nell’ambito militare viene definita Cyber Defense Situational Awareness, obiettivo a cui il settore civile deve tendere anche in vista di potenziali scenari di hybrid warfare

- Gruppo Acea: digitalizzazione dei processi e innovazione continua.- Analisi del contesto: il panorama italiano e le minacce cyber verso le utility.- Gap analysis: soluzioni disponibili e desiderate.- Il progetto Panoptesec: un caso di successo.- Cosa abbiamo imparato; gli sviluppi futuri

• Approccio strategico seguito dai principali Stati nel campo della cooperazione pubblico-privato per il settore della cyber-security• Criticità e punti di forza della cooperazione pubblico- privato per il settore della cyber-security• Elementi essenziali per pianificare e strutturare un’efficiente ed efficace partnership in questo settore

• Mobile app per accedere a servizi cloud: perché è importante gestirle e proteggerle?• Governare il cambiamento: sicurezza e user-experience devono andare di pari passo

• Modello Operativo• Analisi dei Rischi nel contesto Assicurativo• Metodologia da utilizzare

• L’importanza di monitorare la minaccia: cyber intelligence e cooperazione con le autorita’• Identificare gli obiettivi sensibili e interconnessioni con le altre infrastrutture critiche: analisi di scenario e valutazione degli impatti• Determinare interventi migliorativi e di razionalizzazione dei costi di sicurezza

Il panorama Italiano. Stato dell’arte: Cyber Regulation, Legislation e Policy. La Strategia Nazionale Italiana

Cert: i Fondamentali per Crescere

Il progetto PANOPTESEC: Dynamic Risk Approach for Automated Cyber Defence

Cooperazione tra Settore Pubblivo e Privato per la Protezione delle Infrastrutture Critiche Nazionali

Servizi Cloud e Mobile App: Problemi di Sicurezza e Possibili Soluzioni

Dove stiamo andando? Dall’Orientamento alla Sensibilizzazione. Un approccio interdisciplinare

Rafforzare e definire la giusta cultura del Rischio: l’impatto della Cyber Security sul TOM (Target Operating Model)

Il ruolo del Framework Nazionale nel Processo di Gestione e Trattamento del Rischio Cyber

Innovazione, Minaccia Cyber e Resilienza. Ridefiniamo le Pratiche di Gestione del Rischio

- Moderatore: Nicola Rivezzi, CIO, MM - Giuseppe Roselli, Head of Trusted Security Services, ENI- Franco Cerutti, IT Security & Compliance Director, Costa Crociere - Sergio Antonica, Head of IT and Systems Division, IVASS- Michele Banfo, Sales Manager, Mediterranean Region, Arbor Networks

- Nicola Sotira, Director, GCSC

- Andrea Guarino, Head of Security, Privacy & Compliance, ACEA

- Stefano Mele, Director of the Observatory on InfoWarfare and Emerging Technologies, Istituto di Studi Strategici Niccolo’ Machiavelli

- Stefano Volpi, Area Sales Manager, Cisco

- Riccardo Canetta, Regional Sales Director, Mediterranean, MobileIron

- Isabella Corradini, President, Themis- Giampaolo Scafuro, Founder, DiCSAcademy- Luisa Franchina, President, AIIC

- Marco Tulliani, Chief Security Officer, AXA

- Luisa Franchina, President, AIIC

- Massimo Vulpiani, Regional Director Europe South, RSA

ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec

11:00 COLAZIONE & SPEED NETWORKING

15:20

PLATFORM

- Proofpoint

08:30

08:50

09:00

14:00

14:40

11:00

11:50

09:40

15:50

12:30

09:50

10:20

13:00

17:10

17:20

REGISTRAZIONE PARTECIPANTI

SALUTI INTRODUTTIVI DEL CHAIRMAN E APERTURA DEI LAVORILuisa Franchina, President, AIIC

OPENING PANEL

CASE STUDY

KEYNOTE

CASE STUDY

KEYNOTE

PLATFORM

KEYNOTE

CASE STUDY

KEYNOTE

COLAZIONE & SPEED NETWORKING

SALUTI CONCLUSIVI DEL CHAIRMANLuisa Franchina, President, AIIC

FINE DEL SUMMIT

PRANZO

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com08 09

CONFERENCE DAY TWOGIOVEDI 18 MAGGIO 2017

La carenza di personale qualificato necessario per colmare le posizioni aperte nel campo della sicurezza informatica, è un fenomeno che deve essere risolto. Il panel esplorerà I rischi e le implicazioni relative all’incapacita’ di molte industrie di riempire il gap tra necessita’ e competenze degli specialisti. Ci si interroghera’, inoltre, sull’esigenza di lavorare con le universita’ per per combattere questa lacuna.

• La trasformazione digitale a supporto dello sviluppo globale di Ansaldo Energia nel Power Generation• Sicurezza dei sistemi e delle informazioni per la salvaguardia della proprietà intellettuale• 4.0 e IoT: cyber security come eco-sistema integrato verso clienti e fornitori

• Analisi dell’esistente• Strumenti per Costruire una strategia completa e semplificare la complessità• Soluzioni ai problemi di tutti i giorni

La prima parte della presentazione si focalizzerá sul ruolo di ESACERT all’interno dell’organizzazione, analizzando le principali interfacce interne ed esterne, le sfide da affrontare e il valore aggiunto che ESACERT apporta all’ESA. Durante la seconda parte dell’intervento si esamineranno le tecnologie e gli strumenti usati per fronteggiare gli attacchi informatici e assicurare l’efficacia dei controlli di sicurezza per ridurre il rischio di minaccia.

• Panoramica dei rischi e delle minacce attuali • L’importanza di identificare gli attori e individuare tattiche, tecniche e procedure (TTP)• Le contromisure da adottare

• Ssh ed ssl sono il 50% delle connessioni• La posta elettronica persino pec sta permettendo agli attaccanti ed ai criminali di manipolare le reti a livello mondiale• Gli errori umani ancora creano disservizi mondiali• L’importanza di fornire cultura e consapevolezza

• Trasformazione digitale e Industria 4.0: un fenomeno in costante evoluzione• Capire cosa sono oggi le “Cose” dell’Internet of Things e come usarle• IoT, BYOD e WYOD: quali difese? Ridefinizione e Riprogettzione dei meccanismi di monitoraggio e protezione.

Recruting for Cyber Security - Come Colmare il Gap tra le Reali Necessita’ e le Competenze degli Specialisti?

Cyber Security a Supporto della Trasformazione Digitale nel Settore Energetico in Ansaldo

Costruire Una Strategia di Sicurezza Efficace In Un’Azienda in Continuo Cambiamento

ESA Best Practices and Lessons Learned: Esploring the ESACERT

Minacce Cyber e Infrastrutture Critiche. Lo Scenario Attuale.

Nel 2017 i malware la fanno ancora da padroni, così come l’uso dei sistemi non è facile come dovrebbe.L’approccio di Sonicwall e le soluzioni e giuste per cambiare prospettiva ed abbattere i silos.

Internet delle Cose e Rivoluzione Digitale. Le Sfide della Digitalizzazione e la Sicurezza del Cloud

Ottimizzare la Sicurezza Attraverso la Progettazione di Nuove Implementazioni Garantendo un ambiente SCADA resiliente, flessibile e a prova di futuro

Dinamica e Dinamismo degli Attacchi. Come Accadono, Come Si Sono Evoluti. E domani?

- Moderatore: Enrico Venuto, CISO, Politecnico- Maurizio La Puca, Cyber Security Advisor, MoD Francesco - Cosimo Senni, Cyber Security Program Manager, Magneti Marelli- Giuseppe Roselli, Head of Trusted Security Services, ENI- Massimo Vulpiani, Regional Director Europe South, RSA

- Luca Luigi Manuelli, Chief Digital Officer and SVP Quality, IT & Process Impovement, Ansaldo Energia

- Davide Del Vecchio, Head of Enterprise Security, Yoox NET A PORTER GROUP

- Enrico Venuto, CISO, Politecnico- Andrea Baldi, IT Security Officer, ESA- Sergio Pagnozzi, Senior Security Analyst, ESA

- Pierluigi Paganini, Member of Cyber G7 2017, MAE

- Cristiano Cafferata, Regional Sales Manager, SonicWALL

- Claudio Serafini, Southern Europe Sales Engineering Team Leader, Thales

- Alessandro Della Negra, Practice Leader Security & Services - Sales Director, Westcon-Comstor

ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec

11:40

PLATFORM

- Emaze Italy

15:20 BREAK POMERIDIANO E NETWORKING

16:30

GROUP DISCUSSION

Cyber Sicurezza e Trasformazione Digitale: Modelli e Strumenti per un Digital Journey Sicuro ed Efficiente

- Claudio Cilli, President, Isaca Rome Chapter (TBC)

08:00

08:50

09:00

14:00

11:40

14:40

12:30

09:40

10:20

15:30

13:00REGISTRATION

OPENING ADDRESS FROM THE CHAIRMANLuisa Franchina, President, AIIC

OPENING PANEL

CASE STUDY

KEYNOTE

KEYNOTE

KEYNOTE

KEYNOTE

KEYNOTE:BREAK & NETWORKING

LUNCH HOSTED BY

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com10 11

CONFERENCE DAY ONEWEDNESDAY 17 MAY 2017

An Overview of the Current Cyber Security Landscape in Italy - Cyber Regulation, Legislation and Policy.

CERT: The Key To Growth

PANOPTESEC Project: Dynamic Risk Approach for Automated Cyber Defence

Cooperation between the Public and Private Sector for the Protection of Critical Infrastructure

The Italian National Framework for Managing the Cyber Risk

Innovation, Cyber Threat And Resilience. Reshaping Our Cyber Risk Management Practices

- Moderatore: Nicola Rivezzi, CIO, MM - Giuseppe Roselli, Head of Trusted Security Services, ENI- Franco Cerutti, IT Security & Compliance Director, Costa Crociere - Sergio Antonica, Head of IT and Systems Division, IVASS- Michele Banfo, Sales Manager, Mediterranean Region, Arbor Networks

- Nicola Sotira, Director, GCSC

- Andrea Guarino, Head of Security, Privacy & Compliance, Acea

- Stefano Mele, Director of the Observatory on “InfoWarfare and Emerging Technologies”, Istituto di Studi Strategici Machiavelli

- Stefano Volpi, Area Sales Manager, Cisco

- Luisa Franchina, President, AIIC

- Massimo Vulpiani, Regional Director Europe South, RSA

ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec

17:20

17:30

CHAIRMAN’S CLOSING ADDRESSLuisa Franchina, President, AIIC

NETWORKING DRINKS

16:00

16:40

KEYNOTE

GROUP DISCUSSION

Establishing a Robust Operational RiskManagement Culture Within the Organization: How Cyber Security is impacting Our Target Operating Models

Where are we going? Orientation, Risk Analysis and Awareness: An Interdisciplinary Approach

- Marco Tulliani, Chief Security Officer, AXA

- Isabella Corradini, President, Themis- Giampaolo Scafuro, Founder, DiCSAcademy- Luisa Franchina, President, AIIC

11:00 BREAK & SPEED NETWORKING

12:20

09:40

PLATFORM

PLATFORM

Cloud Services and Mobile App: Security Issues and Solutions

In 2017 malware still take over and rule the roots allowing cyber attacks to prosper. The SonicWALL approach and the appropriate solutions for changing prospective and breakdown silos.

- Riccardo Canetta, Regional Sales Director, Mediterranean, MobileIron

- Cristiano Cafferata, Regional Sales Manager, SonicWALL

CONFERENCE DAY TWOTHURSDAY 18 MAY 2017

08:30

08:50

09:00

09:50

10:20

REGISTRATION

OPENING ADDRESS FROM THE CHAIRMANLuisa Franchina, President, AIIC

OPENING PANEL

KEYNOTE

Recruiting for cyber security - How to Fill the Cyber Security Skills Gap

Dynamic evolution of previous attacks and the outlook for the future

- Moderatore: Enrico Venuto, CISO, Politecnico- Maurizio La Puca, Cyber Security Advisor, MoD Francesco - Cosimo Senni, Cyber Security Program Manager, Magneti Marelli- Giuseppe Roselli, Head of Trusted Security Services, ENI- Massimo Vulpiani, Regional Director Europe South, RSA

- Alessandro Della Negra, Practice Leader Security & Services - Sales Director, Westcon-Comstor

11:00

11:50

12:30

CASE STUDY

KEYNOTE

CASE STUDY

BREAKFAST & NETWORKING

ESA Best Practices and Lessons Learned: Esploring the ESACERT

Cyber Threat and Critical Infrastructure. The Current Landscape

How to Increase Safety when Designing and Implementing a Resilient, Flexible and Future-proof SCADA Environment

- Pierluigi Paganini, Member of Cyber G7 2017, MAE

- Claudio Serafini, Southern Europe Sales Engineering Team Leader, Thales

13:00 LUNCH

- Andrea Baldi, IT Security Officer, ESA- Sergio Pagnozzi, Senior Security Analyst, ESA

14:00

14:40

17:50

16:30

15:20

17:10

17:20

CASE STUDY

KEYNOTE

KEYNOTE

GROUP DISCUSSION

BREAK & NETWORKING

CHAIRMAN’S CLOSING ADDRESSLuisa Franchina, President, AIIC

END OF CONFERENCE

Cyber Security to support Digital Transformation in Power Generation. Lessons from Ansaldo

Build an effective Enterprise Security strategy in a fast paced environment

Digital Revolution and IoT. The Challenges of Digitisation and Cloud Security

How To Manage the Risks On Your Digital Journey

- Luca Luigi Manuelli, Chief Digital Officer and SVP Quality, IT & Process Impovement, Ansaldo Energia

- Davide Del Vecchio, Head of Enterprise Security, Yoox NET A PORTER GROUP

- Enrico Venuto, CISO, Politecnico

- Claudio Cilli, President, Isaca Rome Chapter (TBC)

15:20

PLATFORM

- Proofpoint

11:40

PLATFORM

- Emaze Italy

CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS

www.qatalystglobal.com

SECURING ITALY FROM CYBER THREATS

taliaSec

17 - 18 MAY 2017Venue: Le Meridien Visconti, Rome, Italy

UPCOMING EVENTSMEDIA PARTNERS

CYBER SECURITYFOR CRITICAL ASSETS 13th - 14th March 2018

4th - 5th October 2017

10th - 11th October 2017

USA - HOUSTON

EUROPE - LONDON

USA - CHICAGO

18th - 19th April 2018

8th - 9th November 2017

USA - CHICAGO

EUROPE - MUNICH

of

Industrial nternet

Things

CYBER SECURITY

CYBER SECURITY FOR CRITICAL MANUFACTURING

MANUSEC

MENA - DUBAI11th - 12th September 2017

#ItaliaSec