SECURING ITALY FROM CYBER THREATS - gcsec.org · posizioni aperte nel campo della sicurezza...
Transcript of SECURING ITALY FROM CYBER THREATS - gcsec.org · posizioni aperte nel campo della sicurezza...
CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS
www.qatalystglobal.com
FOCUS OF THE CONFERENCEOver recent years, cyber attacks have constituted a worrying concern for companies, institutions and governmental bodies. Reports show that the amount of malware vulnerabilities in Italy is considerably higher than the world average. The need for cyber security investment is critical as well as the necessity of increasing the global resilience and security of Italian ICT assets and designing and effective risk management process.
ItaliaSec Summit represents the first event in the region for senior security thought leaders designed to help trigger productive discussion and promote best practices with the aim to put together robust policies and standards that will shape a securer future for Italian infrastructures.
HIGHLIGHTS FROM THE AGENDA• The most advanced information and policies• Exclusive environment of only C-level figures• Learn from individuals with first hand experience• Recognize current and future threats• Be part of the discussion that will impact the industry
SECURING ITALY FROM CYBER THREATS
taliaSec
17 - 18 MAY 2017Venue: Le Meridien Visconti, Rome, Italy
#ItaliaSec
EVENT SPONSORS
OFFICIAL SPONSOR
PRESENTING SPONSORS
PLATFORM SPONSORS
NETWORKING SPONSOR
A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com
ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec02 03
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored. We ensure that company and government data is secure and trusted in any environment – on premise, in the cloud, in data centers and in big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance.
Westcon-Comstor (WestconGroup Inc.) is a value-added technology distributor of category-leading solutions in Security, Collaboration, Networking and Data Center. We are transforming the technology supply chain through our global capabilities in Cloud, Global Deployment and Services. Through a unique physical and digital distribution network, we extend our partners’ global reach while providing the local expertise needed to successfully navigate worldwide opportunities. We combine expert technical and market knowledge with industry-leading partner enablement programs. Collaborating with our partners in a unique engagement model, we strive to provide an exceptional partner experience by delivering results together.
Over 25 years, SonicWall has been the industry’s trusted security partner protecting millions of networks worldwide. From network security to access security to email security, we have continuously evolved our product portfolio to fit in quickly and seamlessly, enabling organizations to innovate, accelerate and grow.
We are a European company focusing exclusively on Cyber Security. We are fully independent, thus not controlled by a global software vendor or an international professional services group. We cover the three main areas of Cyber Security: Security Assessment, Managed Security Services and Security Software.Emaze is controlled by its management and has 75 full-time employees hired after an extensive background check. We do not use external staff for clients assignments.All our processes are ISO 27001 & ISO 9001 certified. Our software are PCI & ASV compliant. We are a regional research lab as well as an excellence centre for university bodies. Since 17 years, our independence is our strength and a security guarantee to our selected clients.
STEERING COMMITTEEYURI RASSEGA CISO, Enel
PIERLUIGI PAGANINI Member of Cyber G7 2017, MAE
ALESSANDRO PERILLI GM Cloud Management Strategy, Red Hat
ANDREA FOSCHINI Head Information Security Governance, Terna SpA
FABRIZIO RENZI Director Technology and Innovation, IBM
MATTEO BOGANA CEO, Cleafy
MARCO RAMILLI Founder & CTO, Yoroi
LUISA FRANCHINA Director, AIIC (Italian Association of Critical Infrastructure)
Cisco is the global technology leader that transforms the way people connect, communicate and collaborate. Cisco offers solutions, services and systems to business that facilitate the digital transformation of our world, with technology that promises to connect everything securely, making the impossible possible. Cisco has been in Italy since 1994 under the guidance of Agostino Santoni. The company headquarters and research labs are located in Vimercate, and has further offices in Rome and Padua.
Guidance Software is the gold standard in digital investigations & endpoint security, helping to lower business risk through complete data visibility. 4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics to our customers. Our combined experience of years in the field conducting and training personnel in digital forensics make us second to none. Our mission is to be fully trained and ready to provide the highest level of operational support for our customers.
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. We are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core—enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.
Proofpoint Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.
MobileIron is the leader in mobile enterprise security. The MobileIron platform is designed to secure data-at-rest on mobile devices, in apps, and in cloud storage and secure data-in-motion as it moves between the corporate network, devices and storage repositories. With MobileIron, IT can secure corporate information wherever it lives while preserving the sanctity of employee privacy.
RSA helps leading organizations around the world take command of their security posture by partnering to build and implement business-driven security strategies.
Why RSA?Protecting communication, enhancing secure collaboration and fostering innovation in the digital world. The constant march of advanced cyber threats. The rising specter of technology disruption. New competition emerging from every corner. Those are just a few of the complex challenges organizations face daily. We know because we help industry-leading companies address those and other issues- and because we face those very challenges, too. Your business is our business. Your mission is our mission. Your success is our reward.
STEFANO MELE Director “InfoWarfare and Emerging Technologies”,Istituto di Studi Strategici Machiavelli
DIEGO CILEA IT Director, Fondazione San Camillo
NICOLA SOTIRA Director, Global Cyber Security Center (Poste Italiane)
ANTONIO IERANO’ CSO, Ex Huawei
ASSOCIATE SPONSORFor fifteen years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on Arbor Networks for traffic visibility, ad-vanced threat detection and DDoS mitigation. Through a combination of mar-ket-leading technology, elite security research, intuitive workflows and power-ful data visualizations, Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence.
SPEAKERS
SERGIO ANTONICA Head of IT and System Division IVASS
FRANCO CERUTTI IT Operational Security DirectorCosta Crociere
MAURIZIO LA PUCA Cyber Security Advisor MoD
LUCA LUIGI MANUELLI Chief Digital Officer Ansaldo Energia
NICOLA RIVEZZI CIO Metropolitana Milanese
SERGIO PAGNOZZI Senior Security AnalystESA
GIUSEPPE ROSELLI Head of Trusted Security Services ENI
GIAMPAOLO SCAFURO FounderDigital Innovation & Cyber Security Academy
MASSIMO VULPIANI Regional Director Europe SouthRSA
MICHELE BANFOSales Manager, Mediterranean RegionArbor
SPEAKERProofpoint
CLAUDIO SERAFINISouthern Europe Sales Engineering Team Leader, CISSPThales
STEFANO MELE Director “InfoWarfare and Emerging Technologies” Istituto di Studi Strategici Machiavelli
COSIMO SENNICyber Security Program Manager Magneti Marelli
STEFANO VOLPI Area Sales ManagerCisco
SPEAKEREmaze Italy
ALESSANDRO DELLA NEGRAPractice Leader Security & Services - Sales Director Westcon-Comstor
MARCO TULLIANI Chief Security Officer AXA
ENRICO VENUTO CISO Politecnico
NICOLA SOTIRA Director Global Cyber Security Center
IT Operational Security Director
PIERLUIGI PAGANINI Member of Cyber G7 2017 MAE
ANDREA BALDIIT Security OfficerESA
RICCARDO CANETTA Regional Sales Director MobileIron
ISABELLA CORRADINI President Themis
ANDREA GUARINO Head of Security, Privacy and ComplianceACEA
DAVIDE DEL VECCHIOHead of Enterprise SecurityYoox Net a Porter Group
CRISTIANO CAFFERATARegional Manager ItalySonicWALL
CHAIRMAN
LUISA FRANCHINADirector, AIIC
Luisa Franchina is the President of the Italian Association of Critical Infrastructures’ Experts (AIIC). She holds a PhD and a post-doctoral in Electronic Engineering (University of Rome, La Sapienza) and a Masters in Geopolitics (CASD). Luisa has been Director of the Secreteriat for Critical Infrastructure (Presidency of the Council of Ministers from 2010 to 2013) and Director of the Operations Unit for Chemical, Biological, Radiological and Nuclear (CBRN) Threats (Civil Protection Department).
A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com04 05
ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec
For further information on speaker profi les and steering committee please visit: www.cs4ca.com/italiasec
08:00
08:50
09:00 14:00
11:40
14:40
12:30
12:20
16:40
16:00
09:40
10:20
15:30
13:00
17:20
17:30
REGISTRAZIONE PARTECIPANTI
SALUTI INTRODUTTIVI DEL CHAIRMAN E APERTURA DEI LAVORILuisa Franchina, President, AIIC
OPENING PANEL CASE STUDY
KEYNOTE
KEYNOTE
KEYNOTE
PLATFORM
GROUP DISCUSSION
KEYNOTE
KEYNOTE
KEYNOTE:
BREAK POMERIDIANO E NETWORKING
SALUTI CONCLUSIVI DEL CHAIRMANLuisa Franchina, President, AIIC
NETWORKING DRINKS
PRANZO OFFERTO DA
A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com06 07
CONFERENCE DAY ONEMERCOLEDI 17 MAGGIO 2017
L’Opening Panel esaminera’ l’evoluzione e lo stato dell’arte del panorama italiano sulla Cyber Security alla luce di due drivers fondamentali: il Framework Nazionale e la direttiva NIS. Inoltre si cerchera’ di analizzare quali sono le nuove minacce e quali le prossime sfide da affrontare
I CERT stanno diventando sempre più elementi fondamentali nella protezione delle infrastrutture informatiche e delle informazioni. La loro importanza è tanto più vitale quanto il rapporto di collaborazione con il SOC interno è forte. Il coordinamento dei due elementi da’ vita ad una capability ancora più spinta che nell’ambito militare viene definita Cyber Defense Situational Awareness, obiettivo a cui il settore civile deve tendere anche in vista di potenziali scenari di hybrid warfare
- Gruppo Acea: digitalizzazione dei processi e innovazione continua.- Analisi del contesto: il panorama italiano e le minacce cyber verso le utility.- Gap analysis: soluzioni disponibili e desiderate.- Il progetto Panoptesec: un caso di successo.- Cosa abbiamo imparato; gli sviluppi futuri
• Approccio strategico seguito dai principali Stati nel campo della cooperazione pubblico-privato per il settore della cyber-security• Criticità e punti di forza della cooperazione pubblico- privato per il settore della cyber-security• Elementi essenziali per pianificare e strutturare un’efficiente ed efficace partnership in questo settore
• Mobile app per accedere a servizi cloud: perché è importante gestirle e proteggerle?• Governare il cambiamento: sicurezza e user-experience devono andare di pari passo
• Modello Operativo• Analisi dei Rischi nel contesto Assicurativo• Metodologia da utilizzare
• L’importanza di monitorare la minaccia: cyber intelligence e cooperazione con le autorita’• Identificare gli obiettivi sensibili e interconnessioni con le altre infrastrutture critiche: analisi di scenario e valutazione degli impatti• Determinare interventi migliorativi e di razionalizzazione dei costi di sicurezza
Il panorama Italiano. Stato dell’arte: Cyber Regulation, Legislation e Policy. La Strategia Nazionale Italiana
Cert: i Fondamentali per Crescere
Il progetto PANOPTESEC: Dynamic Risk Approach for Automated Cyber Defence
Cooperazione tra Settore Pubblivo e Privato per la Protezione delle Infrastrutture Critiche Nazionali
Servizi Cloud e Mobile App: Problemi di Sicurezza e Possibili Soluzioni
Dove stiamo andando? Dall’Orientamento alla Sensibilizzazione. Un approccio interdisciplinare
Rafforzare e definire la giusta cultura del Rischio: l’impatto della Cyber Security sul TOM (Target Operating Model)
Il ruolo del Framework Nazionale nel Processo di Gestione e Trattamento del Rischio Cyber
Innovazione, Minaccia Cyber e Resilienza. Ridefiniamo le Pratiche di Gestione del Rischio
- Moderatore: Nicola Rivezzi, CIO, MM - Giuseppe Roselli, Head of Trusted Security Services, ENI- Franco Cerutti, IT Security & Compliance Director, Costa Crociere - Sergio Antonica, Head of IT and Systems Division, IVASS- Michele Banfo, Sales Manager, Mediterranean Region, Arbor Networks
- Nicola Sotira, Director, GCSC
- Andrea Guarino, Head of Security, Privacy & Compliance, ACEA
- Stefano Mele, Director of the Observatory on InfoWarfare and Emerging Technologies, Istituto di Studi Strategici Niccolo’ Machiavelli
- Stefano Volpi, Area Sales Manager, Cisco
- Riccardo Canetta, Regional Sales Director, Mediterranean, MobileIron
- Isabella Corradini, President, Themis- Giampaolo Scafuro, Founder, DiCSAcademy- Luisa Franchina, President, AIIC
- Marco Tulliani, Chief Security Officer, AXA
- Luisa Franchina, President, AIIC
- Massimo Vulpiani, Regional Director Europe South, RSA
ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec
11:00 COLAZIONE & SPEED NETWORKING
15:20
PLATFORM
- Proofpoint
08:30
08:50
09:00
14:00
14:40
11:00
11:50
09:40
15:50
12:30
09:50
10:20
13:00
17:10
17:20
REGISTRAZIONE PARTECIPANTI
SALUTI INTRODUTTIVI DEL CHAIRMAN E APERTURA DEI LAVORILuisa Franchina, President, AIIC
OPENING PANEL
CASE STUDY
KEYNOTE
CASE STUDY
KEYNOTE
PLATFORM
KEYNOTE
CASE STUDY
KEYNOTE
COLAZIONE & SPEED NETWORKING
SALUTI CONCLUSIVI DEL CHAIRMANLuisa Franchina, President, AIIC
FINE DEL SUMMIT
PRANZO
A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com08 09
CONFERENCE DAY TWOGIOVEDI 18 MAGGIO 2017
La carenza di personale qualificato necessario per colmare le posizioni aperte nel campo della sicurezza informatica, è un fenomeno che deve essere risolto. Il panel esplorerà I rischi e le implicazioni relative all’incapacita’ di molte industrie di riempire il gap tra necessita’ e competenze degli specialisti. Ci si interroghera’, inoltre, sull’esigenza di lavorare con le universita’ per per combattere questa lacuna.
• La trasformazione digitale a supporto dello sviluppo globale di Ansaldo Energia nel Power Generation• Sicurezza dei sistemi e delle informazioni per la salvaguardia della proprietà intellettuale• 4.0 e IoT: cyber security come eco-sistema integrato verso clienti e fornitori
• Analisi dell’esistente• Strumenti per Costruire una strategia completa e semplificare la complessità• Soluzioni ai problemi di tutti i giorni
La prima parte della presentazione si focalizzerá sul ruolo di ESACERT all’interno dell’organizzazione, analizzando le principali interfacce interne ed esterne, le sfide da affrontare e il valore aggiunto che ESACERT apporta all’ESA. Durante la seconda parte dell’intervento si esamineranno le tecnologie e gli strumenti usati per fronteggiare gli attacchi informatici e assicurare l’efficacia dei controlli di sicurezza per ridurre il rischio di minaccia.
• Panoramica dei rischi e delle minacce attuali • L’importanza di identificare gli attori e individuare tattiche, tecniche e procedure (TTP)• Le contromisure da adottare
• Ssh ed ssl sono il 50% delle connessioni• La posta elettronica persino pec sta permettendo agli attaccanti ed ai criminali di manipolare le reti a livello mondiale• Gli errori umani ancora creano disservizi mondiali• L’importanza di fornire cultura e consapevolezza
• Trasformazione digitale e Industria 4.0: un fenomeno in costante evoluzione• Capire cosa sono oggi le “Cose” dell’Internet of Things e come usarle• IoT, BYOD e WYOD: quali difese? Ridefinizione e Riprogettzione dei meccanismi di monitoraggio e protezione.
Recruting for Cyber Security - Come Colmare il Gap tra le Reali Necessita’ e le Competenze degli Specialisti?
Cyber Security a Supporto della Trasformazione Digitale nel Settore Energetico in Ansaldo
Costruire Una Strategia di Sicurezza Efficace In Un’Azienda in Continuo Cambiamento
ESA Best Practices and Lessons Learned: Esploring the ESACERT
Minacce Cyber e Infrastrutture Critiche. Lo Scenario Attuale.
Nel 2017 i malware la fanno ancora da padroni, così come l’uso dei sistemi non è facile come dovrebbe.L’approccio di Sonicwall e le soluzioni e giuste per cambiare prospettiva ed abbattere i silos.
Internet delle Cose e Rivoluzione Digitale. Le Sfide della Digitalizzazione e la Sicurezza del Cloud
Ottimizzare la Sicurezza Attraverso la Progettazione di Nuove Implementazioni Garantendo un ambiente SCADA resiliente, flessibile e a prova di futuro
Dinamica e Dinamismo degli Attacchi. Come Accadono, Come Si Sono Evoluti. E domani?
- Moderatore: Enrico Venuto, CISO, Politecnico- Maurizio La Puca, Cyber Security Advisor, MoD Francesco - Cosimo Senni, Cyber Security Program Manager, Magneti Marelli- Giuseppe Roselli, Head of Trusted Security Services, ENI- Massimo Vulpiani, Regional Director Europe South, RSA
- Luca Luigi Manuelli, Chief Digital Officer and SVP Quality, IT & Process Impovement, Ansaldo Energia
- Davide Del Vecchio, Head of Enterprise Security, Yoox NET A PORTER GROUP
- Enrico Venuto, CISO, Politecnico- Andrea Baldi, IT Security Officer, ESA- Sergio Pagnozzi, Senior Security Analyst, ESA
- Pierluigi Paganini, Member of Cyber G7 2017, MAE
- Cristiano Cafferata, Regional Sales Manager, SonicWALL
- Claudio Serafini, Southern Europe Sales Engineering Team Leader, Thales
- Alessandro Della Negra, Practice Leader Security & Services - Sales Director, Westcon-Comstor
ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec
11:40
PLATFORM
- Emaze Italy
15:20 BREAK POMERIDIANO E NETWORKING
16:30
GROUP DISCUSSION
Cyber Sicurezza e Trasformazione Digitale: Modelli e Strumenti per un Digital Journey Sicuro ed Efficiente
- Claudio Cilli, President, Isaca Rome Chapter (TBC)
08:00
08:50
09:00
14:00
11:40
14:40
12:30
09:40
10:20
15:30
13:00REGISTRATION
OPENING ADDRESS FROM THE CHAIRMANLuisa Franchina, President, AIIC
OPENING PANEL
CASE STUDY
KEYNOTE
KEYNOTE
KEYNOTE
KEYNOTE
KEYNOTE:BREAK & NETWORKING
LUNCH HOSTED BY
A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com10 11
CONFERENCE DAY ONEWEDNESDAY 17 MAY 2017
An Overview of the Current Cyber Security Landscape in Italy - Cyber Regulation, Legislation and Policy.
CERT: The Key To Growth
PANOPTESEC Project: Dynamic Risk Approach for Automated Cyber Defence
Cooperation between the Public and Private Sector for the Protection of Critical Infrastructure
The Italian National Framework for Managing the Cyber Risk
Innovation, Cyber Threat And Resilience. Reshaping Our Cyber Risk Management Practices
- Moderatore: Nicola Rivezzi, CIO, MM - Giuseppe Roselli, Head of Trusted Security Services, ENI- Franco Cerutti, IT Security & Compliance Director, Costa Crociere - Sergio Antonica, Head of IT and Systems Division, IVASS- Michele Banfo, Sales Manager, Mediterranean Region, Arbor Networks
- Nicola Sotira, Director, GCSC
- Andrea Guarino, Head of Security, Privacy & Compliance, Acea
- Stefano Mele, Director of the Observatory on “InfoWarfare and Emerging Technologies”, Istituto di Studi Strategici Machiavelli
- Stefano Volpi, Area Sales Manager, Cisco
- Luisa Franchina, President, AIIC
- Massimo Vulpiani, Regional Director Europe South, RSA
ITALIASEC SECURING ITALY FROM CYBER THREATS17 - 18 May 2017 | Italy | www.cs4ca.com/italiasec
17:20
17:30
CHAIRMAN’S CLOSING ADDRESSLuisa Franchina, President, AIIC
NETWORKING DRINKS
16:00
16:40
KEYNOTE
GROUP DISCUSSION
Establishing a Robust Operational RiskManagement Culture Within the Organization: How Cyber Security is impacting Our Target Operating Models
Where are we going? Orientation, Risk Analysis and Awareness: An Interdisciplinary Approach
- Marco Tulliani, Chief Security Officer, AXA
- Isabella Corradini, President, Themis- Giampaolo Scafuro, Founder, DiCSAcademy- Luisa Franchina, President, AIIC
11:00 BREAK & SPEED NETWORKING
12:20
09:40
PLATFORM
PLATFORM
Cloud Services and Mobile App: Security Issues and Solutions
In 2017 malware still take over and rule the roots allowing cyber attacks to prosper. The SonicWALL approach and the appropriate solutions for changing prospective and breakdown silos.
- Riccardo Canetta, Regional Sales Director, Mediterranean, MobileIron
- Cristiano Cafferata, Regional Sales Manager, SonicWALL
CONFERENCE DAY TWOTHURSDAY 18 MAY 2017
08:30
08:50
09:00
09:50
10:20
REGISTRATION
OPENING ADDRESS FROM THE CHAIRMANLuisa Franchina, President, AIIC
OPENING PANEL
KEYNOTE
Recruiting for cyber security - How to Fill the Cyber Security Skills Gap
Dynamic evolution of previous attacks and the outlook for the future
- Moderatore: Enrico Venuto, CISO, Politecnico- Maurizio La Puca, Cyber Security Advisor, MoD Francesco - Cosimo Senni, Cyber Security Program Manager, Magneti Marelli- Giuseppe Roselli, Head of Trusted Security Services, ENI- Massimo Vulpiani, Regional Director Europe South, RSA
- Alessandro Della Negra, Practice Leader Security & Services - Sales Director, Westcon-Comstor
11:00
11:50
12:30
CASE STUDY
KEYNOTE
CASE STUDY
BREAKFAST & NETWORKING
ESA Best Practices and Lessons Learned: Esploring the ESACERT
Cyber Threat and Critical Infrastructure. The Current Landscape
How to Increase Safety when Designing and Implementing a Resilient, Flexible and Future-proof SCADA Environment
- Pierluigi Paganini, Member of Cyber G7 2017, MAE
- Claudio Serafini, Southern Europe Sales Engineering Team Leader, Thales
13:00 LUNCH
- Andrea Baldi, IT Security Officer, ESA- Sergio Pagnozzi, Senior Security Analyst, ESA
14:00
14:40
17:50
16:30
15:20
17:10
17:20
CASE STUDY
KEYNOTE
KEYNOTE
GROUP DISCUSSION
BREAK & NETWORKING
CHAIRMAN’S CLOSING ADDRESSLuisa Franchina, President, AIIC
END OF CONFERENCE
Cyber Security to support Digital Transformation in Power Generation. Lessons from Ansaldo
Build an effective Enterprise Security strategy in a fast paced environment
Digital Revolution and IoT. The Challenges of Digitisation and Cloud Security
How To Manage the Risks On Your Digital Journey
- Luca Luigi Manuelli, Chief Digital Officer and SVP Quality, IT & Process Impovement, Ansaldo Energia
- Davide Del Vecchio, Head of Enterprise Security, Yoox NET A PORTER GROUP
- Enrico Venuto, CISO, Politecnico
- Claudio Cilli, President, Isaca Rome Chapter (TBC)
15:20
PLATFORM
- Proofpoint
11:40
PLATFORM
- Emaze Italy
CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS
www.qatalystglobal.com
SECURING ITALY FROM CYBER THREATS
taliaSec
17 - 18 MAY 2017Venue: Le Meridien Visconti, Rome, Italy
UPCOMING EVENTSMEDIA PARTNERS
CYBER SECURITYFOR CRITICAL ASSETS 13th - 14th March 2018
4th - 5th October 2017
10th - 11th October 2017
USA - HOUSTON
EUROPE - LONDON
USA - CHICAGO
18th - 19th April 2018
8th - 9th November 2017
USA - CHICAGO
EUROPE - MUNICH
of
Industrial nternet
Things
CYBER SECURITY
CYBER SECURITY FOR CRITICAL MANUFACTURING
MANUSEC
MENA - DUBAI11th - 12th September 2017
#ItaliaSec